Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
documentos.exe

Overview

General Information

Sample name:documentos.exe
Analysis ID:1447922
MD5:257e48b2852805583552ce20132e3c0d
SHA1:fad6747e82e6fdd330cf3da35c7d178b30d7a21a
SHA256:822e8ac1653b10c7062998adf7db838bd515dc3cd43047a4d12bc9d2c2080696
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • documentos.exe (PID: 1444 cmdline: "C:\Users\user\Desktop\documentos.exe" MD5: 257E48B2852805583552CE20132E3C0D)
    • RegSvcs.exe (PID: 4068 cmdline: "C:\Users\user\Desktop\documentos.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.midhcodistribuciones.com", "Username": "v3doo@midhcodistribuciones.com", "Password": ",A7}+JV4KExQ"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.2603244336.0000000002E35000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x33a3b:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x33aad:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x33b37:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x33bc9:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x33c33:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x33ca5:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x33d3b:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x33dcb:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x30ca6:$s2: GetPrivateProfileString
                  • 0x3033c:$s3: get_OSFullName
                  • 0x3197d:$s5: remove_Key
                  • 0x31af3:$s5: remove_Key
                  • 0x32a22:$s6: FtpWebRequest
                  • 0x33a1d:$s7: logins
                  • 0x33f8f:$s7: logins
                  • 0x36d08:$s7: logins
                  • 0x36d52:$s7: logins
                  • 0x38651:$s7: logins
                  • 0x378ec:$s9: 1.85 (Hash, version 2, native byte-order)
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: documentos.exeAvira: detected
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.midhcodistribuciones.com", "Username": "v3doo@midhcodistribuciones.com", "Password": ",A7}+JV4KExQ"}
                  Source: documentos.exeReversingLabs: Detection: 68%
                  Source: documentos.exeVirustotal: Detection: 70%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                  Source: documentos.exeJoe Sandbox ML: detected
                  Source: documentos.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: documentos.exe, 00000000.00000003.1354518336.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, documentos.exe, 00000000.00000003.1355080245.0000000004120000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: documentos.exe, 00000000.00000003.1354518336.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, documentos.exe, 00000000.00000003.1355080245.0000000004120000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00BD4696
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00BDC9C7
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDC93C FindFirstFileW,FindClose,0_2_00BDC93C
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BDF200
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BDF35D
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BDF65E
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BD3A2B
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BD3D4E
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BDBF27

                  Networking

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.documentos.exe.3ba0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BE25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00BE25E2
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: RegSvcs.exe, 00000002.00000002.2603244336.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002EE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002EC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: documentos.exe, 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2602976383.000000000122F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002EC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000002.00000002.2603244336.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002EC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: documentos.exe, 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, FaJzHLniypp.cs.Net Code: UZ6rXXVq3Ow
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BE425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00BE425A
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BE4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00BE4458
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BE425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00BE425A
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00BD0219
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BFCDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00BFCDAC

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.documentos.exe.3ba0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.documentos.exe.3ba0000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\documentos.exeCode function: This is a third-party compiled AutoIt script.0_2_00B73B4C
                  Source: documentos.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: documentos.exe, 00000000.00000000.1344586831.0000000000C25000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bc0e827c-c
                  Source: documentos.exe, 00000000.00000000.1344586831.0000000000C25000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a85745c9-2
                  Source: documentos.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_91793ca2-d
                  Source: documentos.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_f593b72f-8
                  Source: initial sampleStatic PE information: Filename: documentos.exe
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD40B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00BD40B1
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BC8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00BC8858
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00BD545F
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B7E8000_2_00B7E800
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B9DBB50_2_00B9DBB5
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B7E0600_2_00B7E060
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BF804A0_2_00BF804A
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B841400_2_00B84140
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B924050_2_00B92405
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BA65220_2_00BA6522
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BA267E0_2_00BA267E
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BF06650_2_00BF0665
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B9283A0_2_00B9283A
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B868430_2_00B86843
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BA89DF0_2_00BA89DF
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BA6A940_2_00BA6A94
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BF0AE20_2_00BF0AE2
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B88A0E0_2_00B88A0E
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD8B130_2_00BD8B13
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BCEB070_2_00BCEB07
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B9CD610_2_00B9CD61
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BA70060_2_00BA7006
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B831900_2_00B83190
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B8710E0_2_00B8710E
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B712870_2_00B71287
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B933C70_2_00B933C7
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B9F4190_2_00B9F419
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B856800_2_00B85680
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B916C40_2_00B916C4
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B978D30_2_00B978D3
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B858C00_2_00B858C0
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B91BB80_2_00B91BB8
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BA9D050_2_00BA9D05
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B7FE400_2_00B7FE40
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B9BFE60_2_00B9BFE6
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B91FD00_2_00B91FD0
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_025736700_2_02573670
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0116A5F02_2_0116A5F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01164A802_2_01164A80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01163E682_2_01163E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011641B02_2_011641B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0116DC282_2_0116DC28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059825C82_2_059825C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059814182_2_05981418
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059836782_2_05983678
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05983D602_2_05983D60
                  Source: C:\Users\user\Desktop\documentos.exeCode function: String function: 00B90D27 appears 70 times
                  Source: C:\Users\user\Desktop\documentos.exeCode function: String function: 00B77F41 appears 35 times
                  Source: C:\Users\user\Desktop\documentos.exeCode function: String function: 00B98B40 appears 42 times
                  Source: documentos.exe, 00000000.00000003.1356968784.00000000043ED000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs documentos.exe
                  Source: documentos.exe, 00000000.00000003.1354331912.0000000004243000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs documentos.exe
                  Source: documentos.exe, 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameed6d94e2-6208-4795-9a94-d4ceaf934adf.exe4 vs documentos.exe
                  Source: documentos.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.documentos.exe.3ba0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.documentos.exe.3ba0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, Tk7F6W0v.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, ivMw3WGb8.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, ivMw3WGb8.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, cdw.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.documentos.exe.3ba0000.1.raw.unpack, cdw.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDA2D5 GetLastError,FormatMessageW,0_2_00BDA2D5
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BC8713 AdjustTokenPrivileges,CloseHandle,0_2_00BC8713
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BC8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00BC8CC3
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00BDB59E
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BEF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00BEF121
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BE86D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00BE86D0
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B74FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00B74FE9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\documentos.exeFile created: C:\Users\user\AppData\Local\Temp\aut4FBD.tmpJump to behavior
                  Source: documentos.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.2603244336.0000000002F13000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002F00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: documentos.exeReversingLabs: Detection: 68%
                  Source: documentos.exeVirustotal: Detection: 70%
                  Source: unknownProcess created: C:\Users\user\Desktop\documentos.exe "C:\Users\user\Desktop\documentos.exe"
                  Source: C:\Users\user\Desktop\documentos.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\documentos.exe"
                  Source: C:\Users\user\Desktop\documentos.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\documentos.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: documentos.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: documentos.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: documentos.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: documentos.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: documentos.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: documentos.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: documentos.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: documentos.exe, 00000000.00000003.1354518336.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, documentos.exe, 00000000.00000003.1355080245.0000000004120000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: documentos.exe, 00000000.00000003.1354518336.00000000042C0000.00000004.00001000.00020000.00000000.sdmp, documentos.exe, 00000000.00000003.1355080245.0000000004120000.00000004.00001000.00020000.00000000.sdmp
                  Source: documentos.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: documentos.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: documentos.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: documentos.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: documentos.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BEC304 LoadLibraryA,GetProcAddress,0_2_00BEC304
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B98B85 push ecx; ret 0_2_00B98B98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0598C1C0 push es; ret 2_2_0598C1D0
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B74A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00B74A35
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BF55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00BF55FD
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B933C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B933C7
                  Source: C:\Users\user\Desktop\documentos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: documentos.exe PID: 1444, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: documentos.exe, 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002E35000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002EE3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\documentos.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-99300
                  Source: C:\Users\user\Desktop\documentos.exeAPI coverage: 4.7 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00BD4696
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00BDC9C7
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDC93C FindFirstFileW,FindClose,0_2_00BDC93C
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BDF200
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BDF35D
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BDF65E
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BD3A2B
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BD3D4E
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BDBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BDBF27
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B74AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B74AFE
                  Source: RegSvcs.exe, 00000002.00000002.2603244336.0000000002EE3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegSvcs.exe, 00000002.00000002.2603898253.00000000061F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlly
                  Source: RegSvcs.exe, 00000002.00000002.2603244336.0000000002EE3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: C:\Users\user\Desktop\documentos.exeAPI call chain: ExitProcess graph end nodegraph_0-98268

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01167060 CheckRemoteDebuggerPresent,2_2_01167060
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BE41FD BlockInput,0_2_00BE41FD
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B73B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B73B4C
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BA5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00BA5CCC
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BEC304 LoadLibraryA,GetProcAddress,0_2_00BEC304
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_02573560 mov eax, dword ptr fs:[00000030h]0_2_02573560
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_02573500 mov eax, dword ptr fs:[00000030h]0_2_02573500
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_02571ED0 mov eax, dword ptr fs:[00000030h]0_2_02571ED0
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BC81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00BC81F7
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B9A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B9A395
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B9A364 SetUnhandledExceptionFilter,0_2_00B9A364
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\documentos.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: C3E008Jump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BC8C93 LogonUserW,0_2_00BC8C93
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B73B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B73B4C
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B74A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00B74A35
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD4EF5 mouse_event,0_2_00BD4EF5
                  Source: C:\Users\user\Desktop\documentos.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\documentos.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BC81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00BC81F7
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BD4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00BD4C03
                  Source: documentos.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: documentos.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B9886B cpuid 0_2_00B9886B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BA50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00BA50D7
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BB2230 GetUserNameW,0_2_00BB2230
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BA418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00BA418A
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00B74AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B74AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.documentos.exe.3ba0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.documentos.exe.3ba0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: documentos.exe PID: 1444, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4068, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: documentos.exeBinary or memory string: WIN_81
                  Source: documentos.exeBinary or memory string: WIN_XP
                  Source: documentos.exeBinary or memory string: WIN_XPe
                  Source: documentos.exeBinary or memory string: WIN_VISTA
                  Source: documentos.exeBinary or memory string: WIN_7
                  Source: documentos.exeBinary or memory string: WIN_8
                  Source: documentos.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.documentos.exe.3ba0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.documentos.exe.3ba0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2603244336.0000000002E35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: documentos.exe PID: 1444, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4068, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.documentos.exe.3ba0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.documentos.exe.3ba0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: documentos.exe PID: 1444, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4068, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BE6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00BE6596
                  Source: C:\Users\user\Desktop\documentos.exeCode function: 0_2_00BE6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00BE6A5A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS38
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets551
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials22
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  documentos.exe68%ReversingLabsWin32.Spyware.Negasteal
                  documentos.exe70%VirustotalBrowse
                  documentos.exe100%AviraTR/AD.ShellcodeCrypter.cdudx
                  documentos.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  ip-api.com0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://account.dyn.com/0%URL Reputationsafe
                  https://account.dyn.com/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                  http://ip-api.com0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://ip-api.com/line/?fields=hostingfalse
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://account.dyn.com/documentos.exe, 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2603244336.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002EC8000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ip-api.comRegSvcs.exe, 00000002.00000002.2603244336.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002EE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2603244336.0000000002EC8000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  208.95.112.1
                  ip-api.comUnited States
                  53334TUT-ASUStrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1447922
                  Start date and time:2024-05-27 12:30:28 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 53s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:10
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:documentos.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 55
                  • Number of non-executed functions: 272
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  208.95.112.1PI-236031.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  INV 0983 OSY 240524_PDF.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  99200032052824.bat.exeGet hashmaliciousGuLoaderBrowse
                  • ip-api.com/line/?fields=hosting
                  PO_27052024.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  Reiven RFQ-27-05-2024.exeGet hashmaliciousAgentTeslaBrowse
                  • ip-api.com/line/?fields=hosting
                  ev1NIvTd6f.exeGet hashmaliciousUnknownBrowse
                  • /json/
                  https://mega.nz/file/wncXiYhZ#ABJEpmoiGH0hIeVVKQy7V_ALtGclDnJ4rFrDjwZ8kDEGet hashmaliciousDCRatBrowse
                  • ip-api.com/line/?fields=hosting
                  uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
                  • ip-api.com/line/?fields=hosting
                  uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
                  • ip-api.com/line/?fields=hosting
                  SecuriteInfo.com.FileRepMalware.1834.13764.exeGet hashmaliciousDiscord Token Stealer, XWormBrowse
                  • ip-api.com/line/?fields=hosting
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ip-api.comPI-236031.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  INV 0983 OSY 240524_PDF.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  99200032052824.bat.exeGet hashmaliciousGuLoaderBrowse
                  • 208.95.112.1
                  PO_27052024.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  Reiven RFQ-27-05-2024.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  ev1NIvTd6f.exeGet hashmaliciousUnknownBrowse
                  • 208.95.112.1
                  https://mega.nz/file/wncXiYhZ#ABJEpmoiGH0hIeVVKQy7V_ALtGclDnJ4rFrDjwZ8kDEGet hashmaliciousDCRatBrowse
                  • 208.95.112.1
                  uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
                  • 208.95.112.1
                  uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
                  • 208.95.112.1
                  SecuriteInfo.com.FileRepMalware.1834.13764.exeGet hashmaliciousDiscord Token Stealer, XWormBrowse
                  • 208.95.112.1
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  TUT-ASUSPI-236031.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  INV 0983 OSY 240524_PDF.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  99200032052824.bat.exeGet hashmaliciousGuLoaderBrowse
                  • 208.95.112.1
                  PO_27052024.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  Reiven RFQ-27-05-2024.exeGet hashmaliciousAgentTeslaBrowse
                  • 208.95.112.1
                  ev1NIvTd6f.exeGet hashmaliciousUnknownBrowse
                  • 208.95.112.1
                  https://mega.nz/file/wncXiYhZ#ABJEpmoiGH0hIeVVKQy7V_ALtGclDnJ4rFrDjwZ8kDEGet hashmaliciousDCRatBrowse
                  • 208.95.112.1
                  uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
                  • 208.95.112.1
                  uChcvn3L6R.exeGet hashmaliciousDCRatBrowse
                  • 208.95.112.1
                  SecuriteInfo.com.FileRepMalware.1834.13764.exeGet hashmaliciousDiscord Token Stealer, XWormBrowse
                  • 208.95.112.1
                  No context
                  No context
                  Process:C:\Users\user\Desktop\documentos.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):144078
                  Entropy (8bit):7.741622614039229
                  Encrypted:false
                  SSDEEP:3072:1dkXYeWVUU5kYph7258DSodE7/zqjhrBk0XIvt3ao++YvL7Lq3MXHur:PkAWcba8Soy7Lqj7ksx+0LmMXHu
                  MD5:C6BF2D15800DB251C01553BFDC04B6E9
                  SHA1:DD160B5B244E933628A6613BE703F1B39BA0A69E
                  SHA-256:E63B84C4B094413EC97FA0B481CF60308148214E7E060533ED447DB86B6AB71B
                  SHA-512:286147D624BE70559FA218D6F583A20067B95F5D029221E0D3C0C183A7F65029750AB946F201E873054DF9D6F3A1A52F59A1068281ADD102C65DA1AC76CB7A73
                  Malicious:false
                  Reputation:low
                  Preview:EA06......8s....5.R...:.R.Q.s....x..)..eJ..!........+..L.....#?*$....N.s[..O-...2{,.[_.Od.i.R.0....9]..~...R.O......@.s....5..-R...mhT..N.S2...J...:.N.D@..5@.@.Mg....gL.U.$3<....1...(1N..:.*5.cU...5Zu2B...(..u.Z..4. ...T.....k .P....@Q..;0.. ....O..i......h. ...F...=l..&W...6../...... P...U<......X..A"...*...H..)...~....C&4....b...4......z..kp..g`..6cL..x.......|.7....M.tIt.#t.HzS-....L.p.......H.....m2z.]....../......o5..Z...]>.k..J....f?%..f\zG3.i.].e..T.{e8...e...(v..c...X......:.E#.^..G..g....yY.."..UB};..53......g=8^_.w>.Z......X..<...~.T....-....J.0....4.0/.....@............. .... G@.....v. ..oJ..ZI..........\..x.........9I.V]...q2/.......Yn.wr.Euz...C).w..u"...Ujt...E.M..z\.e..\.. ...C`.}m.L.....j#......9....ly.-h...s&....gR.Q......5..$...R.&..5I4.AC......".Je`8............I4.O.s...J......z<r.N.S......g.[.TZU.GN.Ch.9.@..R-..d.P.n*.j...F.@).....l....P...g.S....{..).Y...M....=..T.A...U....U.Q......D...A..r.Q.3.P....Q,..ub.p.T..(
                  Process:C:\Users\user\Desktop\documentos.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):9920
                  Entropy (8bit):7.595256317557242
                  Encrypted:false
                  SSDEEP:192:eyaFcTokwRLMN/6EuuOF8+sXHJSZNr0SYLeSJkF8ArSpW+jmfmpzGpNo:AFxkwRwTSmUieykFd+c+qfmpim
                  MD5:EF743923219241FDFC0B6663596D4E2D
                  SHA1:CEA013D643BF6A5381386F6C634596604AD5813A
                  SHA-256:2EE09C61F1EDFDDC79847AADBDBA33C8E51C7A9CA5AE465FBADA532F75DCBF39
                  SHA-512:7F8CBA97051131A81419494355AF54309915D2DA680135172229C52C357EC17F847845FD01E8529F2BEF4B134C776587290CA16490C667BCBD77F0449E18A7FE
                  Malicious:false
                  Reputation:low
                  Preview:EA06..t4.M(...aD..fT)..D.Mh.z,.gA....5.......B.Mh..%.mF.Mf....qb.....-..c.L...$.m5...k..c0.M....k8.X.3i...l..%.o2....A8.6,.........3k....e.N&s0.oNf.)...k.K$.eb....5..f.........6.0.o.p....l39....V0...S..$.if...6....f.I...@.....i8........X@.4.1..........$.P...0z.5..$}3Y.....=5..`d....!d..V...7f.[$..8...|.I..W.d...|vI..W.d...|vK..W.d...|vK(.W.e...|vY..W,.O...k.`..X@..9..^.8..F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn.
                  Process:C:\Users\user\Desktop\documentos.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):241664
                  Entropy (8bit):6.560113800757645
                  Encrypted:false
                  SSDEEP:6144:bpgYsqwty/09CdJMOQ8VhxIJqyM1G65HoCtVn1/u9m:bBsqd7MOQ8VhxIJqyAT5HoCtB09m
                  MD5:0752ED2666E68CCA6FB7B68FC0A4B8FC
                  SHA1:739A689A5DF1770AC073A48D31AC50CBF1F2F858
                  SHA-256:FB8C68A169FA078E1BB74E5A4732FA96E9125A43A07F9557F8FF367AEA3C9EE6
                  SHA-512:BC9887F8E9E0C3769C82F7B3136811A5011542F96F36597DE042153A2ED2906CE24CE489A6E61D314ACC4F54A1652C5A9B777987745247AC67D97A9612D04B9C
                  Malicious:false
                  Reputation:low
                  Preview:...1VBL5<JEN..LR.FS1UBL5xJENL1LRRFS1UBL58JENL1LRRFS1UBL58JEN.1LR\Y.?U.E...D....:;5sA'-+GY'e--_"=&f1Tu09[.#+n.~.r?)7T{OA?.JENL1LR..S1.CO5..j(L1LRRFS1.BN43KNNL.ORRNS1UBL5v.FNL.LRR.P1UB.58jENL3LRVFS1UBL5<JENL1LRRfW1U@L58JENN1..RFC1URL58JUNL!LRRFS1EBL58JENL1LR..P1.BL58.FN.4LRRFS1UBL58JENL1LRRFW1YBL58JENL1LRRFS1UBL58JENL1LRRFS1UBL58JENL1LRRFS1UBL58jEND1LRRFS1UBL50jEN.1LRRFS1UBL5.> 681LR..P1UbL58.FNL3LRRFS1UBL58JENl1L2|4 C6BL5~OENL.ORR@S1U.O58JENL1LRRFS1.BLu.8 "#RLR^FS1UBH58HENL.ORRFS1UBL58JEN.1L.RFS1UBL58JENL1LRb.P1UBL5pJENN1IR..Q15pM5;JENM1LTRFS1UBL58JENL1LRRFS1UBL58JENL1LRRFS1UBL58JENL1LRO......p7{D.6.t.!.2.._..3..CpY.)R....A.....kDJ..F.>e...1...D.ZW?R....*N?BY.%}I2.H..i.wd:.z.T<.)...2..$Cj.....`p...:L....E..1)>.42<Y]d./*P>;.D.0UBL5......;>.kxAC+.X=...fT+g...FJEN(1LR FS14BL5.JEN#1LR<FS1+BL5FJEN.1LR.FS1bBL5.JEN!1LRvFS1+BL5.7JA..;!.1UBL5...~.\..........I.;......".z..If.E-.;r....]..)../..Ho..US@W4WEH64wK...sPBW4WEH64wK...s.`..l..I....K..RFS1UB.58.ENL..R.FS1.B.5..ENL..R.F.1...5
                  Process:C:\Users\user\Desktop\documentos.exe
                  File Type:ASCII text, with very long lines (29748), with no line terminators
                  Category:dropped
                  Size (bytes):29748
                  Entropy (8bit):3.546152728717839
                  Encrypted:false
                  SSDEEP:768:ViTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbiE+I76Md4vfF3if6gyx:ViTZ+2QoioGRk6ZklputwjpjBkCiw2RY
                  MD5:CF974E92863A4C5CB0F5D7BE8BF30B7A
                  SHA1:858BADB212AE1B759FC3139605BA27188DD2BC83
                  SHA-256:D5C222706F9673E2E1B78C1C6200E26936EDE3CD2ECEAA0315304D35C31A81A5
                  SHA-512:504EA497FA37388A6F425A602B78E93E636D46D6F20C1883A35DB8559C9DF036358962180B0F30AA5966B142996355DE19EE393A52A8AD14EE1E7A2195944887
                  Malicious:false
                  Reputation:low
                  Preview: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
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.9232336703936905
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:documentos.exe
                  File size:1'029'632 bytes
                  MD5:257e48b2852805583552ce20132e3c0d
                  SHA1:fad6747e82e6fdd330cf3da35c7d178b30d7a21a
                  SHA256:822e8ac1653b10c7062998adf7db838bd515dc3cd43047a4d12bc9d2c2080696
                  SHA512:b20c6a0c51390f80ad49799967a83ce096e124d6cc4652222a530a36aa7573ad2df078707bf9517969e90896d38dd71710feaf26dd5e35fdcea87efa2c101a32
                  SSDEEP:24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaxGxllnKr8si75:Jh+ZkldoPK8YaxGx7E89
                  TLSH:F2259D0273D1C036FFAB92739B6AF24556BC79254123852F13982DB9BD701B2263E763
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                  Icon Hash:aaf3e3e3938382a0
                  Entrypoint:0x42800a
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                  Time Stamp:0x664CBB0B [Tue May 21 15:17:31 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:afcdf79be1557326c854b6e20cb900a7
                  Instruction
                  call 00007FDEA905B48Dh
                  jmp 00007FDEA904E244h
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push edi
                  push esi
                  mov esi, dword ptr [esp+10h]
                  mov ecx, dword ptr [esp+14h]
                  mov edi, dword ptr [esp+0Ch]
                  mov eax, ecx
                  mov edx, ecx
                  add eax, esi
                  cmp edi, esi
                  jbe 00007FDEA904E3CAh
                  cmp edi, eax
                  jc 00007FDEA904E72Eh
                  bt dword ptr [004C41FCh], 01h
                  jnc 00007FDEA904E3C9h
                  rep movsb
                  jmp 00007FDEA904E6DCh
                  cmp ecx, 00000080h
                  jc 00007FDEA904E594h
                  mov eax, edi
                  xor eax, esi
                  test eax, 0000000Fh
                  jne 00007FDEA904E3D0h
                  bt dword ptr [004BF324h], 01h
                  jc 00007FDEA904E8A0h
                  bt dword ptr [004C41FCh], 00000000h
                  jnc 00007FDEA904E56Dh
                  test edi, 00000003h
                  jne 00007FDEA904E57Eh
                  test esi, 00000003h
                  jne 00007FDEA904E55Dh
                  bt edi, 02h
                  jnc 00007FDEA904E3CFh
                  mov eax, dword ptr [esi]
                  sub ecx, 04h
                  lea esi, dword ptr [esi+04h]
                  mov dword ptr [edi], eax
                  lea edi, dword ptr [edi+04h]
                  bt edi, 03h
                  jnc 00007FDEA904E3D3h
                  movq xmm1, qword ptr [esi]
                  sub ecx, 08h
                  lea esi, dword ptr [esi+08h]
                  movq qword ptr [edi], xmm1
                  lea edi, dword ptr [edi+08h]
                  test esi, 00000007h
                  je 00007FDEA904E425h
                  bt esi, 03h
                  Programming Language:
                  • [ASM] VS2013 build 21005
                  • [ C ] VS2013 build 21005
                  • [C++] VS2013 build 21005
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2008 SP1 build 30729
                  • [ASM] VS2013 UPD5 build 40629
                  • [RES] VS2013 build 21005
                  • [LNK] VS2013 UPD5 build 40629
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x30fc4.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xf90000x7134.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0xc80000x30fc40x310001a049610a9db0e94734488c1ae1b5c5eFalse0.866455078125data7.734659260972017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xf90000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                  RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                  RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                  RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                  RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                  RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                  RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                  RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                  RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                  RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                  RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                  RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                  RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                  RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                  RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                  RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                  RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                  RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                  RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                  RT_RCDATA0xd07b80x2828adata1.0003708432123533
                  RT_GROUP_ICON0xf8a440x76dataEnglishGreat Britain0.6610169491525424
                  RT_GROUP_ICON0xf8abc0x14dataEnglishGreat Britain1.25
                  RT_GROUP_ICON0xf8ad00x14dataEnglishGreat Britain1.15
                  RT_GROUP_ICON0xf8ae40x14dataEnglishGreat Britain1.25
                  RT_VERSION0xf8af80xdcdataEnglishGreat Britain0.6181818181818182
                  RT_MANIFEST0xf8bd40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                  DLLImport
                  WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                  VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                  MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                  WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                  PSAPI.DLLGetProcessMemoryInfo
                  IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                  USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                  UxTheme.dllIsThemeActive
                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                  USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                  GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                  COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                  SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                  OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                  Language of compilation systemCountry where language is spokenMap
                  EnglishGreat Britain
                  TimestampSource PortDest PortSource IPDest IP
                  May 27, 2024 12:31:18.892251968 CEST4970580192.168.2.8208.95.112.1
                  May 27, 2024 12:31:18.897175074 CEST8049705208.95.112.1192.168.2.8
                  May 27, 2024 12:31:18.897239923 CEST4970580192.168.2.8208.95.112.1
                  May 27, 2024 12:31:18.898046970 CEST4970580192.168.2.8208.95.112.1
                  May 27, 2024 12:31:18.902877092 CEST8049705208.95.112.1192.168.2.8
                  May 27, 2024 12:31:19.374452114 CEST8049705208.95.112.1192.168.2.8
                  May 27, 2024 12:31:19.421833992 CEST4970580192.168.2.8208.95.112.1
                  May 27, 2024 12:32:26.157812119 CEST8049705208.95.112.1192.168.2.8
                  May 27, 2024 12:32:26.158060074 CEST4970580192.168.2.8208.95.112.1
                  May 27, 2024 12:32:59.391531944 CEST4970580192.168.2.8208.95.112.1
                  May 27, 2024 12:32:59.396536112 CEST8049705208.95.112.1192.168.2.8
                  TimestampSource PortDest PortSource IPDest IP
                  May 27, 2024 12:31:18.880284071 CEST5639753192.168.2.81.1.1.1
                  May 27, 2024 12:31:18.887387037 CEST53563971.1.1.1192.168.2.8
                  May 27, 2024 12:32:02.211647034 CEST5349821162.159.36.2192.168.2.8
                  May 27, 2024 12:32:02.698704958 CEST53623251.1.1.1192.168.2.8
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  May 27, 2024 12:31:18.880284071 CEST192.168.2.81.1.1.10x2473Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  May 27, 2024 12:31:18.887387037 CEST1.1.1.1192.168.2.80x2473No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                  • ip-api.com
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.849705208.95.112.1804068C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  TimestampBytes transferredDirectionData
                  May 27, 2024 12:31:18.898046970 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                  Host: ip-api.com
                  Connection: Keep-Alive
                  May 27, 2024 12:31:19.374452114 CEST175INHTTP/1.1 200 OK
                  Date: Mon, 27 May 2024 10:31:19 GMT
                  Content-Type: text/plain; charset=utf-8
                  Content-Length: 6
                  Access-Control-Allow-Origin: *
                  X-Ttl: 28
                  X-Rl: 42
                  Data Raw: 66 61 6c 73 65 0a
                  Data Ascii: false


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:06:31:16
                  Start date:27/05/2024
                  Path:C:\Users\user\Desktop\documentos.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\documentos.exe"
                  Imagebase:0xb70000
                  File size:1'029'632 bytes
                  MD5 hash:257E48B2852805583552CE20132E3C0D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.1361495342.0000000003BA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:true

                  Target ID:2
                  Start time:06:31:16
                  Start date:27/05/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\documentos.exe"
                  Imagebase:0xaf0000
                  File size:45'984 bytes
                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2602308052.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2603244336.0000000002E35000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:3.9%
                    Dynamic/Decrypted Code Coverage:0.4%
                    Signature Coverage:5.5%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:152
                    execution_graph 98193 b71016 98198 b74ad2 98193->98198 98208 b90ff6 98198->98208 98200 b74ada 98201 b7101b 98200->98201 98218 b74a94 98200->98218 98205 b92f80 98201->98205 98308 b92e84 98205->98308 98207 b71025 98211 b90ffe 98208->98211 98210 b91018 98210->98200 98211->98210 98213 b9101c std::exception::exception 98211->98213 98246 b9594c 98211->98246 98263 b935e1 DecodePointer 98211->98263 98264 b987db RaiseException 98213->98264 98215 b91046 98265 b98711 58 API calls _free 98215->98265 98217 b91058 98217->98200 98219 b74aaf 98218->98219 98220 b74a9d 98218->98220 98222 b74afe 98219->98222 98221 b92f80 __cinit 67 API calls 98220->98221 98221->98219 98274 b777c7 98222->98274 98226 b74b59 98235 b74b86 98226->98235 98292 b77e8c 98226->98292 98228 b74b7a 98296 b77886 98228->98296 98230 b74bf1 GetCurrentProcess IsWow64Process 98231 b74c0a 98230->98231 98233 b74c20 98231->98233 98234 b74c89 GetSystemInfo 98231->98234 98232 badc8d 98288 b74c95 98233->98288 98236 b74c56 98234->98236 98235->98230 98235->98232 98236->98201 98239 b74c32 98242 b74c95 2 API calls 98239->98242 98240 b74c7d GetSystemInfo 98241 b74c47 98240->98241 98241->98236 98243 b74c4d FreeLibrary 98241->98243 98244 b74c3a GetNativeSystemInfo 98242->98244 98243->98236 98244->98241 98247 b959c7 98246->98247 98259 b95958 98246->98259 98272 b935e1 DecodePointer 98247->98272 98249 b959cd 98273 b98d68 58 API calls __getptd_noexit 98249->98273 98252 b9598b RtlAllocateHeap 98253 b959bf 98252->98253 98252->98259 98253->98211 98255 b959b3 98270 b98d68 58 API calls __getptd_noexit 98255->98270 98259->98252 98259->98255 98260 b959b1 98259->98260 98261 b95963 98259->98261 98269 b935e1 DecodePointer 98259->98269 98271 b98d68 58 API calls __getptd_noexit 98260->98271 98261->98259 98266 b9a3ab 58 API calls 2 library calls 98261->98266 98267 b9a408 58 API calls 8 library calls 98261->98267 98268 b932df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98261->98268 98263->98211 98264->98215 98265->98217 98266->98261 98267->98261 98269->98259 98270->98260 98271->98253 98272->98249 98273->98253 98275 b90ff6 Mailbox 59 API calls 98274->98275 98276 b777e8 98275->98276 98277 b90ff6 Mailbox 59 API calls 98276->98277 98278 b74b16 GetVersionExW 98277->98278 98279 b77d2c 98278->98279 98280 b77da5 98279->98280 98281 b77d38 __wsetenvp 98279->98281 98282 b77e8c 59 API calls 98280->98282 98283 b77d73 98281->98283 98284 b77d4e 98281->98284 98287 b77d56 _memmove 98282->98287 98301 b78189 98283->98301 98300 b78087 59 API calls Mailbox 98284->98300 98287->98226 98289 b74c2e 98288->98289 98290 b74c9e LoadLibraryA 98288->98290 98289->98239 98289->98240 98290->98289 98291 b74caf GetProcAddress 98290->98291 98291->98289 98293 b77ea3 _memmove 98292->98293 98294 b77e9a 98292->98294 98293->98228 98294->98293 98304 b77faf 98294->98304 98297 b77894 98296->98297 98298 b77e8c 59 API calls 98297->98298 98299 b778a4 98298->98299 98299->98235 98300->98287 98302 b90ff6 Mailbox 59 API calls 98301->98302 98303 b78193 98302->98303 98303->98287 98305 b77fc2 98304->98305 98307 b77fbf _memmove 98304->98307 98306 b90ff6 Mailbox 59 API calls 98305->98306 98306->98307 98307->98293 98309 b92e90 __commit 98308->98309 98316 b93457 98309->98316 98315 b92eb7 __commit 98315->98207 98333 b99e4b 98316->98333 98318 b92e99 98319 b92ec8 DecodePointer DecodePointer 98318->98319 98320 b92ef5 98319->98320 98321 b92ea5 98319->98321 98320->98321 98379 b989e4 59 API calls __gmtime64_s 98320->98379 98330 b92ec2 98321->98330 98323 b92f58 EncodePointer EncodePointer 98323->98321 98324 b92f2c 98324->98321 98328 b92f46 EncodePointer 98324->98328 98381 b98aa4 61 API calls __realloc_crt 98324->98381 98325 b92f07 98325->98323 98325->98324 98380 b98aa4 61 API calls __realloc_crt 98325->98380 98328->98323 98329 b92f40 98329->98321 98329->98328 98382 b93460 98330->98382 98334 b99e5c 98333->98334 98335 b99e6f EnterCriticalSection 98333->98335 98340 b99ed3 98334->98340 98335->98318 98337 b99e62 98337->98335 98364 b932f5 58 API calls 3 library calls 98337->98364 98341 b99edf __commit 98340->98341 98342 b99ee8 98341->98342 98344 b99f00 98341->98344 98365 b9a3ab 58 API calls 2 library calls 98342->98365 98351 b99f21 __commit 98344->98351 98368 b98a5d 58 API calls 2 library calls 98344->98368 98345 b99eed 98366 b9a408 58 API calls 8 library calls 98345->98366 98347 b99f15 98349 b99f2b 98347->98349 98350 b99f1c 98347->98350 98354 b99e4b __lock 58 API calls 98349->98354 98369 b98d68 58 API calls __getptd_noexit 98350->98369 98351->98337 98352 b99ef4 98367 b932df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98352->98367 98356 b99f32 98354->98356 98358 b99f3f 98356->98358 98359 b99f57 98356->98359 98370 b9a06b InitializeCriticalSectionAndSpinCount 98358->98370 98371 b92f95 98359->98371 98362 b99f4b 98377 b99f73 LeaveCriticalSection _doexit 98362->98377 98365->98345 98366->98352 98368->98347 98369->98351 98370->98362 98372 b92f9e RtlFreeHeap 98371->98372 98376 b92fc7 __dosmaperr 98371->98376 98373 b92fb3 98372->98373 98372->98376 98378 b98d68 58 API calls __getptd_noexit 98373->98378 98375 b92fb9 GetLastError 98375->98376 98376->98362 98377->98351 98378->98375 98379->98325 98380->98324 98381->98329 98385 b99fb5 LeaveCriticalSection 98382->98385 98384 b92ec7 98384->98315 98385->98384 98386 b71066 98391 b7f8cf 98386->98391 98388 b7106c 98389 b92f80 __cinit 67 API calls 98388->98389 98390 b71076 98389->98390 98392 b7f8f0 98391->98392 98424 b90143 98392->98424 98396 b7f937 98397 b777c7 59 API calls 98396->98397 98398 b7f941 98397->98398 98399 b777c7 59 API calls 98398->98399 98400 b7f94b 98399->98400 98401 b777c7 59 API calls 98400->98401 98402 b7f955 98401->98402 98403 b777c7 59 API calls 98402->98403 98404 b7f993 98403->98404 98405 b777c7 59 API calls 98404->98405 98406 b7fa5e 98405->98406 98434 b860e7 98406->98434 98410 b7fa90 98411 b777c7 59 API calls 98410->98411 98412 b7fa9a 98411->98412 98462 b8ffde 98412->98462 98414 b7fae1 98415 b7faf1 GetStdHandle 98414->98415 98416 b7fb3d 98415->98416 98417 bb49d5 98415->98417 98418 b7fb45 OleInitialize 98416->98418 98417->98416 98419 bb49de 98417->98419 98418->98388 98469 bd6dda 64 API calls Mailbox 98419->98469 98421 bb49e5 98470 bd74a9 CreateThread 98421->98470 98423 bb49f1 CloseHandle 98423->98418 98471 b9021c 98424->98471 98427 b9021c 59 API calls 98428 b90185 98427->98428 98429 b777c7 59 API calls 98428->98429 98430 b90191 98429->98430 98431 b77d2c 59 API calls 98430->98431 98432 b7f8f6 98431->98432 98433 b903a2 6 API calls 98432->98433 98433->98396 98435 b777c7 59 API calls 98434->98435 98436 b860f7 98435->98436 98437 b777c7 59 API calls 98436->98437 98438 b860ff 98437->98438 98478 b85bfd 98438->98478 98441 b85bfd 59 API calls 98442 b8610f 98441->98442 98443 b777c7 59 API calls 98442->98443 98444 b8611a 98443->98444 98445 b90ff6 Mailbox 59 API calls 98444->98445 98446 b7fa68 98445->98446 98447 b86259 98446->98447 98448 b86267 98447->98448 98449 b777c7 59 API calls 98448->98449 98450 b86272 98449->98450 98451 b777c7 59 API calls 98450->98451 98452 b8627d 98451->98452 98453 b777c7 59 API calls 98452->98453 98454 b86288 98453->98454 98455 b777c7 59 API calls 98454->98455 98456 b86293 98455->98456 98457 b85bfd 59 API calls 98456->98457 98458 b8629e 98457->98458 98459 b90ff6 Mailbox 59 API calls 98458->98459 98460 b862a5 RegisterWindowMessageW 98459->98460 98460->98410 98463 b8ffee 98462->98463 98464 bc5cc3 98462->98464 98466 b90ff6 Mailbox 59 API calls 98463->98466 98481 bd9d71 60 API calls 98464->98481 98467 b8fff6 98466->98467 98467->98414 98468 bc5cce 98469->98421 98470->98423 98482 bd748f 65 API calls 98470->98482 98472 b777c7 59 API calls 98471->98472 98473 b90227 98472->98473 98474 b777c7 59 API calls 98473->98474 98475 b9022f 98474->98475 98476 b777c7 59 API calls 98475->98476 98477 b9017b 98476->98477 98477->98427 98479 b777c7 59 API calls 98478->98479 98480 b85c05 98479->98480 98480->98441 98481->98468 98483 b71055 98488 b72649 98483->98488 98486 b92f80 __cinit 67 API calls 98487 b71064 98486->98487 98489 b777c7 59 API calls 98488->98489 98490 b726b7 98489->98490 98495 b73582 98490->98495 98493 b72754 98494 b7105a 98493->98494 98498 b73416 59 API calls 2 library calls 98493->98498 98494->98486 98499 b735b0 98495->98499 98498->98493 98500 b735a1 98499->98500 98501 b735bd 98499->98501 98500->98493 98501->98500 98502 b735c4 RegOpenKeyExW 98501->98502 98502->98500 98503 b735de RegQueryValueExW 98502->98503 98504 b73614 RegCloseKey 98503->98504 98505 b735ff 98503->98505 98504->98500 98505->98504 98506 b73633 98507 b7366a 98506->98507 98508 b736e7 98507->98508 98509 b73688 98507->98509 98545 b736e5 98507->98545 98511 bad31c 98508->98511 98512 b736ed 98508->98512 98513 b73695 98509->98513 98514 b7375d PostQuitMessage 98509->98514 98510 b736ca DefWindowProcW 98548 b736d8 98510->98548 98556 b811d0 10 API calls Mailbox 98511->98556 98515 b73715 SetTimer RegisterWindowMessageW 98512->98515 98516 b736f2 98512->98516 98517 bad38f 98513->98517 98518 b736a0 98513->98518 98514->98548 98522 b7373e CreatePopupMenu 98515->98522 98515->98548 98520 bad2bf 98516->98520 98521 b736f9 KillTimer 98516->98521 98571 bd2a16 71 API calls _memset 98517->98571 98523 b73767 98518->98523 98524 b736a8 98518->98524 98528 bad2f8 MoveWindow 98520->98528 98529 bad2c4 98520->98529 98551 b744cb Shell_NotifyIconW _memset 98521->98551 98522->98548 98554 b74531 64 API calls _memset 98523->98554 98531 b736b3 98524->98531 98532 bad374 98524->98532 98526 bad343 98557 b811f3 341 API calls Mailbox 98526->98557 98528->98548 98535 bad2c8 98529->98535 98536 bad2e7 SetFocus 98529->98536 98538 b7374b 98531->98538 98543 b736be 98531->98543 98532->98510 98570 bc817e 59 API calls Mailbox 98532->98570 98533 bad3a1 98533->98510 98533->98548 98539 bad2d1 98535->98539 98535->98543 98536->98548 98537 b7370c 98552 b73114 DeleteObject DestroyWindow Mailbox 98537->98552 98553 b745df 81 API calls _memset 98538->98553 98555 b811d0 10 API calls Mailbox 98539->98555 98543->98510 98558 b744cb Shell_NotifyIconW _memset 98543->98558 98545->98510 98546 b7375b 98546->98548 98549 bad368 98559 b743db 98549->98559 98551->98537 98552->98548 98553->98546 98554->98546 98555->98548 98556->98526 98557->98543 98558->98549 98560 b74406 _memset 98559->98560 98572 b74213 98560->98572 98563 b7448b 98565 b744a5 Shell_NotifyIconW 98563->98565 98566 b744c1 Shell_NotifyIconW 98563->98566 98567 b744b3 98565->98567 98566->98567 98576 b7410d 98567->98576 98569 b744ba 98569->98545 98570->98545 98571->98533 98573 b74227 98572->98573 98574 bad638 98572->98574 98573->98563 98598 bd3226 62 API calls _W_store_winword 98573->98598 98574->98573 98575 bad641 DestroyIcon 98574->98575 98575->98573 98577 b74200 Mailbox 98576->98577 98578 b74129 98576->98578 98577->98569 98599 b77b76 98578->98599 98581 b74144 98583 b77d2c 59 API calls 98581->98583 98582 bad5dd LoadStringW 98585 bad5f7 98582->98585 98584 b74159 98583->98584 98584->98585 98586 b7416a 98584->98586 98587 b77c8e 59 API calls 98585->98587 98588 b74205 98586->98588 98589 b74174 98586->98589 98592 bad601 98587->98592 98613 b781a7 98588->98613 98604 b77c8e 98589->98604 98595 b7417e _memset _wcscpy 98592->98595 98617 b77e0b 98592->98617 98594 bad623 98597 b77e0b 59 API calls 98594->98597 98596 b741e6 Shell_NotifyIconW 98595->98596 98596->98577 98597->98595 98598->98563 98600 b90ff6 Mailbox 59 API calls 98599->98600 98601 b77b9b 98600->98601 98602 b78189 59 API calls 98601->98602 98603 b74137 98602->98603 98603->98581 98603->98582 98605 b77ca0 98604->98605 98606 baf094 98604->98606 98624 b77bb1 98605->98624 98630 bc8123 59 API calls _memmove 98606->98630 98609 baf09e 98611 b781a7 59 API calls 98609->98611 98610 b77cac 98610->98595 98612 baf0a6 Mailbox 98611->98612 98614 b781b2 98613->98614 98615 b781ba 98613->98615 98631 b780d7 98614->98631 98615->98595 98618 b77e1f 98617->98618 98619 baf173 98617->98619 98635 b77db0 98618->98635 98621 b78189 59 API calls 98619->98621 98623 baf17e __wsetenvp _memmove 98621->98623 98622 b77e2a 98622->98594 98625 b77bbf 98624->98625 98629 b77be5 _memmove 98624->98629 98626 b90ff6 Mailbox 59 API calls 98625->98626 98625->98629 98627 b77c34 98626->98627 98628 b90ff6 Mailbox 59 API calls 98627->98628 98628->98629 98629->98610 98630->98609 98632 b780fa _memmove 98631->98632 98633 b780e7 98631->98633 98632->98615 98633->98632 98634 b90ff6 Mailbox 59 API calls 98633->98634 98634->98632 98636 b77dbf __wsetenvp 98635->98636 98637 b78189 59 API calls 98636->98637 98638 b77dd0 _memmove 98636->98638 98639 baf130 _memmove 98637->98639 98638->98622 98640 2572410 98654 2570000 98640->98654 98642 25724ce 98657 2572300 98642->98657 98660 2573500 GetPEB 98654->98660 98656 257068b 98656->98642 98658 2572309 Sleep 98657->98658 98659 2572317 98658->98659 98661 257352a 98660->98661 98661->98656 98662 b97e93 98663 b97e9f __commit 98662->98663 98699 b9a048 GetStartupInfoW 98663->98699 98666 b97ea4 98701 b98dbc GetProcessHeap 98666->98701 98667 b97efc 98668 b97f07 98667->98668 98784 b97fe3 58 API calls 3 library calls 98667->98784 98702 b99d26 98668->98702 98671 b97f0d 98672 b97f18 __RTC_Initialize 98671->98672 98785 b97fe3 58 API calls 3 library calls 98671->98785 98723 b9d812 98672->98723 98675 b97f27 98676 b97f33 GetCommandLineW 98675->98676 98786 b97fe3 58 API calls 3 library calls 98675->98786 98742 ba5173 GetEnvironmentStringsW 98676->98742 98679 b97f32 98679->98676 98682 b97f4d 98685 b97f58 98682->98685 98787 b932f5 58 API calls 3 library calls 98682->98787 98752 ba4fa8 98685->98752 98686 b97f5e 98687 b97f69 98686->98687 98788 b932f5 58 API calls 3 library calls 98686->98788 98766 b9332f 98687->98766 98690 b97f71 98691 b97f7c __wwincmdln 98690->98691 98789 b932f5 58 API calls 3 library calls 98690->98789 98772 b7492e 98691->98772 98694 b97f90 98695 b97f9f 98694->98695 98790 b93598 58 API calls _doexit 98694->98790 98791 b93320 58 API calls _doexit 98695->98791 98698 b97fa4 __commit 98700 b9a05e 98699->98700 98700->98666 98701->98667 98792 b933c7 36 API calls 2 library calls 98702->98792 98704 b99d2b 98793 b99f7c InitializeCriticalSectionAndSpinCount __mtinitlocknum 98704->98793 98706 b99d30 98707 b99d34 98706->98707 98795 b99fca TlsAlloc 98706->98795 98794 b99d9c 61 API calls 2 library calls 98707->98794 98710 b99d39 98710->98671 98711 b99d46 98711->98707 98712 b99d51 98711->98712 98796 b98a15 98712->98796 98715 b99d93 98804 b99d9c 61 API calls 2 library calls 98715->98804 98718 b99d98 98718->98671 98719 b99d72 98719->98715 98720 b99d78 98719->98720 98803 b99c73 58 API calls 4 library calls 98720->98803 98722 b99d80 GetCurrentThreadId 98722->98671 98724 b9d81e __commit 98723->98724 98725 b99e4b __lock 58 API calls 98724->98725 98726 b9d825 98725->98726 98727 b98a15 __calloc_crt 58 API calls 98726->98727 98728 b9d836 98727->98728 98729 b9d8a1 GetStartupInfoW 98728->98729 98730 b9d841 __commit @_EH4_CallFilterFunc@8 98728->98730 98732 b9d9e5 98729->98732 98738 b9d8b6 98729->98738 98730->98675 98731 b9daad 98818 b9dabd LeaveCriticalSection _doexit 98731->98818 98732->98731 98735 b9da32 GetStdHandle 98732->98735 98737 b9da45 GetFileType 98732->98737 98817 b9a06b InitializeCriticalSectionAndSpinCount 98732->98817 98734 b98a15 __calloc_crt 58 API calls 98734->98738 98735->98732 98736 b9d904 98736->98732 98739 b9d938 GetFileType 98736->98739 98816 b9a06b InitializeCriticalSectionAndSpinCount 98736->98816 98737->98732 98738->98732 98738->98734 98738->98736 98739->98736 98743 b97f43 98742->98743 98744 ba5184 98742->98744 98748 ba4d6b GetModuleFileNameW 98743->98748 98819 b98a5d 58 API calls 2 library calls 98744->98819 98746 ba51aa _memmove 98747 ba51c0 FreeEnvironmentStringsW 98746->98747 98747->98743 98749 ba4d9f _wparse_cmdline 98748->98749 98751 ba4ddf _wparse_cmdline 98749->98751 98820 b98a5d 58 API calls 2 library calls 98749->98820 98751->98682 98753 ba4fc1 __wsetenvp 98752->98753 98757 ba4fb9 98752->98757 98754 b98a15 __calloc_crt 58 API calls 98753->98754 98762 ba4fea __wsetenvp 98754->98762 98755 ba5041 98756 b92f95 _free 58 API calls 98755->98756 98756->98757 98757->98686 98758 b98a15 __calloc_crt 58 API calls 98758->98762 98759 ba5066 98760 b92f95 _free 58 API calls 98759->98760 98760->98757 98762->98755 98762->98757 98762->98758 98762->98759 98763 ba507d 98762->98763 98821 ba4857 58 API calls __gmtime64_s 98762->98821 98822 b99006 IsProcessorFeaturePresent 98763->98822 98765 ba5089 98765->98686 98768 b9333b __IsNonwritableInCurrentImage 98766->98768 98845 b9a711 98768->98845 98769 b93359 __initterm_e 98770 b92f80 __cinit 67 API calls 98769->98770 98771 b93378 _doexit __IsNonwritableInCurrentImage 98769->98771 98770->98771 98771->98690 98773 b749e7 98772->98773 98774 b74948 98772->98774 98773->98694 98775 b74982 IsThemeActive 98774->98775 98848 b935ac 98775->98848 98779 b749ae 98860 b74a5b SystemParametersInfoW SystemParametersInfoW 98779->98860 98781 b749ba 98861 b73b4c 98781->98861 98783 b749c2 SystemParametersInfoW 98783->98773 98784->98668 98785->98672 98786->98679 98790->98695 98791->98698 98792->98704 98793->98706 98794->98710 98795->98711 98798 b98a1c 98796->98798 98799 b98a57 98798->98799 98800 b98a3a 98798->98800 98805 ba5446 98798->98805 98799->98715 98802 b9a026 TlsSetValue 98799->98802 98800->98798 98800->98799 98813 b9a372 Sleep 98800->98813 98802->98719 98803->98722 98804->98718 98806 ba5451 98805->98806 98812 ba546c 98805->98812 98807 ba545d 98806->98807 98806->98812 98814 b98d68 58 API calls __getptd_noexit 98807->98814 98808 ba547c HeapAlloc 98810 ba5462 98808->98810 98808->98812 98810->98798 98812->98808 98812->98810 98815 b935e1 DecodePointer 98812->98815 98813->98800 98814->98810 98815->98812 98816->98736 98817->98732 98818->98730 98819->98746 98820->98751 98821->98762 98823 b99011 98822->98823 98828 b98e99 98823->98828 98827 b9902c 98827->98765 98829 b98eb3 _memset __call_reportfault 98828->98829 98830 b98ed3 IsDebuggerPresent 98829->98830 98836 b9a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 98830->98836 98833 b98f97 __call_reportfault 98837 b9c836 98833->98837 98834 b98fba 98835 b9a380 GetCurrentProcess TerminateProcess 98834->98835 98835->98827 98836->98833 98838 b9c83e 98837->98838 98839 b9c840 IsProcessorFeaturePresent 98837->98839 98838->98834 98841 ba5b5a 98839->98841 98844 ba5b09 5 API calls 2 library calls 98841->98844 98843 ba5c3d 98843->98834 98844->98843 98846 b9a714 EncodePointer 98845->98846 98846->98846 98847 b9a72e 98846->98847 98847->98769 98849 b99e4b __lock 58 API calls 98848->98849 98850 b935b7 DecodePointer EncodePointer 98849->98850 98913 b99fb5 LeaveCriticalSection 98850->98913 98852 b749a7 98853 b93614 98852->98853 98854 b93638 98853->98854 98855 b9361e 98853->98855 98854->98779 98855->98854 98914 b98d68 58 API calls __getptd_noexit 98855->98914 98857 b93628 98915 b98ff6 9 API calls __gmtime64_s 98857->98915 98859 b93633 98859->98779 98860->98781 98862 b73b59 __ftell_nolock 98861->98862 98863 b777c7 59 API calls 98862->98863 98864 b73b63 GetCurrentDirectoryW 98863->98864 98916 b73778 98864->98916 98866 b73b8c IsDebuggerPresent 98867 bad4ad MessageBoxA 98866->98867 98868 b73b9a 98866->98868 98871 bad4c7 98867->98871 98869 b73c73 98868->98869 98868->98871 98872 b73bb7 98868->98872 98870 b73c7a SetCurrentDirectoryW 98869->98870 98875 b73c87 Mailbox 98870->98875 99115 b77373 59 API calls Mailbox 98871->99115 98997 b773e5 98872->98997 98875->98783 98876 bad4d7 98881 bad4ed SetCurrentDirectoryW 98876->98881 98878 b73bd5 GetFullPathNameW 98879 b77d2c 59 API calls 98878->98879 98880 b73c10 98879->98880 99013 b80a8d 98880->99013 98881->98875 98913->98852 98914->98857 98915->98859 98917 b777c7 59 API calls 98916->98917 98918 b7378e 98917->98918 99128 b73d43 98918->99128 98920 b737ac 98921 b74864 61 API calls 98920->98921 98922 b737c0 98921->98922 98923 b77f41 59 API calls 98922->98923 98924 b737cd 98923->98924 99142 b74f3d 98924->99142 98927 bad3ae 99209 bd97e5 98927->99209 98928 b737ee Mailbox 98931 b781a7 59 API calls 98928->98931 98934 b73801 98931->98934 98932 bad3cd 98933 b92f95 _free 58 API calls 98932->98933 98936 bad3da 98933->98936 99166 b793ea 98934->99166 98938 b74faa 84 API calls 98936->98938 98940 bad3e3 98938->98940 98944 b73ee2 59 API calls 98940->98944 98941 b77f41 59 API calls 98942 b7381a 98941->98942 99169 b78620 98942->99169 98946 bad3fe 98944->98946 98945 b7382c Mailbox 98947 b77f41 59 API calls 98945->98947 98948 b73ee2 59 API calls 98946->98948 98949 b73852 98947->98949 98950 bad41a 98948->98950 98951 b78620 69 API calls 98949->98951 98952 b74864 61 API calls 98950->98952 98954 b73861 Mailbox 98951->98954 98953 bad43f 98952->98953 98955 b73ee2 59 API calls 98953->98955 98957 b777c7 59 API calls 98954->98957 98956 bad44b 98955->98956 98958 b781a7 59 API calls 98956->98958 98959 b7387f 98957->98959 98960 bad459 98958->98960 99173 b73ee2 98959->99173 98962 b73ee2 59 API calls 98960->98962 98964 bad468 98962->98964 98970 b781a7 59 API calls 98964->98970 98966 b73899 98966->98940 98967 b738a3 98966->98967 98968 b9313d _W_store_winword 60 API calls 98967->98968 98969 b738ae 98968->98969 98969->98946 98971 b738b8 98969->98971 98972 bad48a 98970->98972 98973 b9313d _W_store_winword 60 API calls 98971->98973 98975 b73ee2 59 API calls 98972->98975 98974 b738c3 98973->98974 98974->98950 98977 b738cd 98974->98977 98976 bad497 98975->98976 98976->98976 98978 b9313d _W_store_winword 60 API calls 98977->98978 98979 b738d8 98978->98979 98979->98964 98980 b73919 98979->98980 98982 b73ee2 59 API calls 98979->98982 98980->98964 98981 b73926 98980->98981 99189 b7942e 98981->99189 98983 b738fc 98982->98983 98985 b781a7 59 API calls 98983->98985 98988 b7390a 98985->98988 98990 b73ee2 59 API calls 98988->98990 98990->98980 98992 b793ea 59 API calls 98994 b73961 98992->98994 98993 b79040 60 API calls 98993->98994 98994->98992 98994->98993 98995 b73ee2 59 API calls 98994->98995 98996 b739a7 Mailbox 98994->98996 98995->98994 98996->98866 98998 b773f2 __ftell_nolock 98997->98998 98999 baee4b _memset 98998->98999 99000 b7740b 98998->99000 99003 baee67 GetOpenFileNameW 98999->99003 100077 b748ae 99000->100077 99005 baeeb6 99003->99005 99007 b77d2c 59 API calls 99005->99007 99009 baeecb 99007->99009 99009->99009 99010 b77429 100105 b769ca 99010->100105 99014 b80a9a __ftell_nolock 99013->99014 100413 b76ee0 99014->100413 99115->98876 99129 b73d50 __ftell_nolock 99128->99129 99130 b77d2c 59 API calls 99129->99130 99135 b73eb6 Mailbox 99129->99135 99132 b73d82 99130->99132 99140 b73db8 Mailbox 99132->99140 99250 b77b52 99132->99250 99133 b77b52 59 API calls 99133->99140 99134 b73e89 99134->99135 99136 b77f41 59 API calls 99134->99136 99135->98920 99138 b73eaa 99136->99138 99137 b77f41 59 API calls 99137->99140 99139 b73f84 59 API calls 99138->99139 99139->99135 99140->99133 99140->99134 99140->99135 99140->99137 99253 b73f84 99140->99253 99259 b74d13 99142->99259 99147 badd0f 99150 b74faa 84 API calls 99147->99150 99148 b74f68 LoadLibraryExW 99269 b74cc8 99148->99269 99152 badd16 99150->99152 99154 b74cc8 3 API calls 99152->99154 99156 badd1e 99154->99156 99155 b74f8f 99155->99156 99157 b74f9b 99155->99157 99295 b7506b 99156->99295 99158 b74faa 84 API calls 99157->99158 99161 b737e6 99158->99161 99161->98927 99161->98928 99163 badd45 99301 b75027 99163->99301 99165 badd52 99167 b90ff6 Mailbox 59 API calls 99166->99167 99168 b7380d 99167->99168 99168->98941 99170 b7862b 99169->99170 99172 b78652 99170->99172 99726 b78b13 69 API calls Mailbox 99170->99726 99172->98945 99174 b73f05 99173->99174 99175 b73eec 99173->99175 99176 b77d2c 59 API calls 99174->99176 99177 b781a7 59 API calls 99175->99177 99178 b7388b 99176->99178 99177->99178 99179 b9313d 99178->99179 99180 b93149 99179->99180 99181 b931be 99179->99181 99188 b9316e 99180->99188 99727 b98d68 58 API calls __getptd_noexit 99180->99727 99729 b931d0 60 API calls 3 library calls 99181->99729 99183 b931cb 99183->98966 99185 b93155 99728 b98ff6 9 API calls __gmtime64_s 99185->99728 99187 b93160 99187->98966 99188->98966 99190 b79436 99189->99190 99191 b90ff6 Mailbox 59 API calls 99190->99191 99192 b79444 99191->99192 99193 b73936 99192->99193 99730 b7935c 59 API calls Mailbox 99192->99730 99195 b791b0 99193->99195 99731 b792c0 99195->99731 99197 b791bf 99198 b90ff6 Mailbox 59 API calls 99197->99198 99199 b73944 99197->99199 99198->99199 99200 b79040 99199->99200 99201 baf5a5 99200->99201 99204 b79057 99200->99204 99201->99204 99741 b78d3b 59 API calls Mailbox 99201->99741 99203 b7915f 99203->98994 99204->99203 99205 b791a0 99204->99205 99206 b79158 99204->99206 99740 b79e9c 60 API calls Mailbox 99205->99740 99207 b90ff6 Mailbox 59 API calls 99206->99207 99207->99203 99210 b75045 85 API calls 99209->99210 99211 bd9854 99210->99211 99742 bd99be 96 API calls 2 library calls 99211->99742 99213 bd9866 99214 b7506b 74 API calls 99213->99214 99242 bad3c1 99213->99242 99215 bd9881 99214->99215 99216 b7506b 74 API calls 99215->99216 99217 bd9891 99216->99217 99218 b7506b 74 API calls 99217->99218 99219 bd98ac 99218->99219 99220 b7506b 74 API calls 99219->99220 99221 bd98c7 99220->99221 99222 b75045 85 API calls 99221->99222 99223 bd98de 99222->99223 99224 b9594c std::exception::_Copy_str 58 API calls 99223->99224 99225 bd98e5 99224->99225 99226 b9594c std::exception::_Copy_str 58 API calls 99225->99226 99227 bd98ef 99226->99227 99228 b7506b 74 API calls 99227->99228 99229 bd9903 99228->99229 99743 bd9393 GetSystemTimeAsFileTime 99229->99743 99231 bd9916 99232 bd992b 99231->99232 99233 bd9940 99231->99233 99234 b92f95 _free 58 API calls 99232->99234 99235 bd99a5 99233->99235 99236 bd9946 99233->99236 99237 bd9931 99234->99237 99239 b92f95 _free 58 API calls 99235->99239 99744 bd8d90 99236->99744 99240 b92f95 _free 58 API calls 99237->99240 99239->99242 99240->99242 99242->98932 99244 b74faa 99242->99244 99243 b92f95 _free 58 API calls 99243->99242 99245 b74fb4 99244->99245 99249 b74fbb 99244->99249 99246 b955d6 __fcloseall 83 API calls 99245->99246 99246->99249 99247 b74fdb FreeLibrary 99248 b74fca 99247->99248 99248->98932 99249->99247 99249->99248 99251 b77faf 59 API calls 99250->99251 99252 b77b5d 99251->99252 99252->99132 99254 b73f92 99253->99254 99258 b73fb4 _memmove 99253->99258 99257 b90ff6 Mailbox 59 API calls 99254->99257 99255 b90ff6 Mailbox 59 API calls 99256 b73fc8 99255->99256 99256->99140 99257->99258 99258->99255 99306 b74d61 99259->99306 99262 b74d3a 99264 b74d53 99262->99264 99265 b74d4a FreeLibrary 99262->99265 99263 b74d61 2 API calls 99263->99262 99266 b9548b 99264->99266 99265->99264 99310 b954a0 99266->99310 99268 b74f5c 99268->99147 99268->99148 99468 b74d94 99269->99468 99272 b74ced 99274 b74cff FreeLibrary 99272->99274 99275 b74d08 99272->99275 99273 b74d94 2 API calls 99273->99272 99274->99275 99276 b74dd0 99275->99276 99277 b90ff6 Mailbox 59 API calls 99276->99277 99278 b74de5 99277->99278 99472 b7538e 99278->99472 99280 b74df1 _memmove 99281 b74e2c 99280->99281 99283 b74f21 99280->99283 99284 b74ee9 99280->99284 99282 b75027 69 API calls 99281->99282 99288 b74e35 99282->99288 99486 bd9ba5 95 API calls 99283->99486 99475 b74fe9 CreateStreamOnHGlobal 99284->99475 99287 b7506b 74 API calls 99287->99288 99288->99287 99290 b74ec9 99288->99290 99291 badcd0 99288->99291 99481 b75045 99288->99481 99290->99155 99292 b75045 85 API calls 99291->99292 99293 badce4 99292->99293 99294 b7506b 74 API calls 99293->99294 99294->99290 99296 b7507d 99295->99296 99297 baddf6 99295->99297 99510 b95812 99296->99510 99300 bd9393 GetSystemTimeAsFileTime 99300->99163 99302 b75036 99301->99302 99303 baddb9 99301->99303 99708 b95e90 99302->99708 99305 b7503e 99305->99165 99307 b74d2e 99306->99307 99308 b74d6a LoadLibraryA 99306->99308 99307->99262 99307->99263 99308->99307 99309 b74d7b GetProcAddress 99308->99309 99309->99307 99313 b954ac __commit 99310->99313 99311 b954bf 99359 b98d68 58 API calls __getptd_noexit 99311->99359 99313->99311 99315 b954f0 99313->99315 99314 b954c4 99360 b98ff6 9 API calls __gmtime64_s 99314->99360 99329 ba0738 99315->99329 99318 b954f5 99319 b9550b 99318->99319 99320 b954fe 99318->99320 99322 b95535 99319->99322 99323 b95515 99319->99323 99361 b98d68 58 API calls __getptd_noexit 99320->99361 99344 ba0857 99322->99344 99362 b98d68 58 API calls __getptd_noexit 99323->99362 99324 b954cf __commit @_EH4_CallFilterFunc@8 99324->99268 99330 ba0744 __commit 99329->99330 99331 b99e4b __lock 58 API calls 99330->99331 99342 ba0752 99331->99342 99332 ba07c6 99364 ba084e 99332->99364 99333 ba07cd 99369 b98a5d 58 API calls 2 library calls 99333->99369 99336 ba07d4 99336->99332 99370 b9a06b InitializeCriticalSectionAndSpinCount 99336->99370 99337 ba0843 __commit 99337->99318 99339 b99ed3 __mtinitlocknum 58 API calls 99339->99342 99341 ba07fa EnterCriticalSection 99341->99332 99342->99332 99342->99333 99342->99339 99367 b96e8d 59 API calls __lock 99342->99367 99368 b96ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99342->99368 99352 ba0877 __wopenfile 99344->99352 99345 ba0891 99375 b98d68 58 API calls __getptd_noexit 99345->99375 99347 ba0896 99376 b98ff6 9 API calls __gmtime64_s 99347->99376 99349 ba0aaf 99372 ba87f1 99349->99372 99350 b95540 99363 b95562 LeaveCriticalSection LeaveCriticalSection _fprintf 99350->99363 99352->99345 99358 ba0a4c 99352->99358 99377 b93a0b 60 API calls 2 library calls 99352->99377 99354 ba0a45 99354->99358 99378 b93a0b 60 API calls 2 library calls 99354->99378 99356 ba0a64 99356->99358 99379 b93a0b 60 API calls 2 library calls 99356->99379 99358->99345 99358->99349 99359->99314 99360->99324 99361->99324 99362->99324 99363->99324 99371 b99fb5 LeaveCriticalSection 99364->99371 99366 ba0855 99366->99337 99367->99342 99368->99342 99369->99336 99370->99341 99371->99366 99380 ba7fd5 99372->99380 99374 ba880a 99374->99350 99375->99347 99376->99350 99377->99354 99378->99356 99379->99358 99381 ba7fe1 __commit 99380->99381 99382 ba7ff7 99381->99382 99385 ba802d 99381->99385 99465 b98d68 58 API calls __getptd_noexit 99382->99465 99384 ba7ffc 99466 b98ff6 9 API calls __gmtime64_s 99384->99466 99391 ba809e 99385->99391 99388 ba8049 99467 ba8072 LeaveCriticalSection __unlock_fhandle 99388->99467 99390 ba8006 __commit 99390->99374 99392 ba80be 99391->99392 99393 b9471a __wsopen_nolock 58 API calls 99392->99393 99396 ba80da 99393->99396 99394 b99006 __invoke_watson 8 API calls 99395 ba87f0 99394->99395 99397 ba7fd5 __wsopen_helper 103 API calls 99395->99397 99398 ba8114 99396->99398 99405 ba8137 99396->99405 99464 ba8211 99396->99464 99400 ba880a 99397->99400 99399 b98d34 __commit 58 API calls 99398->99399 99401 ba8119 99399->99401 99400->99388 99402 b98d68 __gmtime64_s 58 API calls 99401->99402 99403 ba8126 99402->99403 99406 b98ff6 __gmtime64_s 9 API calls 99403->99406 99404 ba81f5 99407 b98d34 __commit 58 API calls 99404->99407 99405->99404 99412 ba81d3 99405->99412 99408 ba8130 99406->99408 99409 ba81fa 99407->99409 99408->99388 99410 b98d68 __gmtime64_s 58 API calls 99409->99410 99411 ba8207 99410->99411 99413 b98ff6 __gmtime64_s 9 API calls 99411->99413 99414 b9d4d4 __alloc_osfhnd 61 API calls 99412->99414 99413->99464 99415 ba82a1 99414->99415 99416 ba82ab 99415->99416 99417 ba82ce 99415->99417 99419 b98d34 __commit 58 API calls 99416->99419 99418 ba7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99417->99418 99429 ba82f0 99418->99429 99420 ba82b0 99419->99420 99421 b98d68 __gmtime64_s 58 API calls 99420->99421 99423 ba82ba 99421->99423 99422 ba836e GetFileType 99424 ba83bb 99422->99424 99425 ba8379 GetLastError 99422->99425 99427 b98d68 __gmtime64_s 58 API calls 99423->99427 99434 b9d76a __set_osfhnd 59 API calls 99424->99434 99428 b98d47 __dosmaperr 58 API calls 99425->99428 99426 ba833c GetLastError 99430 b98d47 __dosmaperr 58 API calls 99426->99430 99427->99408 99432 ba83a0 CloseHandle 99428->99432 99429->99422 99429->99426 99433 ba7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99429->99433 99431 ba8361 99430->99431 99437 b98d68 __gmtime64_s 58 API calls 99431->99437 99432->99431 99435 ba83ae 99432->99435 99436 ba8331 99433->99436 99440 ba83d9 99434->99440 99438 b98d68 __gmtime64_s 58 API calls 99435->99438 99436->99422 99436->99426 99437->99464 99439 ba83b3 99438->99439 99439->99431 99441 ba8594 99440->99441 99442 ba1b11 __lseeki64_nolock 60 API calls 99440->99442 99443 ba845a 99440->99443 99444 ba8767 CloseHandle 99441->99444 99441->99464 99445 ba8443 99442->99445 99443->99441 99449 ba10ab 70 API calls __read_nolock 99443->99449 99452 ba848c 99443->99452 99454 ba0d2d __close_nolock 61 API calls 99443->99454 99458 b9dac6 __write 78 API calls 99443->99458 99459 ba8611 99443->99459 99462 ba1b11 60 API calls __lseeki64_nolock 99443->99462 99446 ba7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99444->99446 99445->99443 99448 b98d34 __commit 58 API calls 99445->99448 99447 ba878e 99446->99447 99450 ba8796 GetLastError 99447->99450 99457 ba87c2 99447->99457 99448->99443 99449->99443 99451 b98d47 __dosmaperr 58 API calls 99450->99451 99453 ba87a2 99451->99453 99452->99443 99455 ba99f2 __chsize_nolock 82 API calls 99452->99455 99456 b9d67d __free_osfhnd 59 API calls 99453->99456 99454->99443 99455->99452 99456->99457 99457->99464 99458->99443 99460 ba0d2d __close_nolock 61 API calls 99459->99460 99461 ba8618 99460->99461 99463 b98d68 __gmtime64_s 58 API calls 99461->99463 99462->99443 99463->99464 99464->99394 99465->99384 99466->99390 99467->99390 99469 b74ce1 99468->99469 99470 b74d9d LoadLibraryA 99468->99470 99469->99272 99469->99273 99470->99469 99471 b74dae GetProcAddress 99470->99471 99471->99469 99473 b90ff6 Mailbox 59 API calls 99472->99473 99474 b753a0 99473->99474 99474->99280 99476 b75003 FindResourceExW 99475->99476 99480 b75020 99475->99480 99477 badd5c LoadResource 99476->99477 99476->99480 99478 badd71 SizeofResource 99477->99478 99477->99480 99479 badd85 LockResource 99478->99479 99478->99480 99479->99480 99480->99281 99482 b75054 99481->99482 99483 baddd4 99481->99483 99487 b95a7d 99482->99487 99485 b75062 99485->99288 99486->99281 99488 b95a89 __commit 99487->99488 99489 b95a9b 99488->99489 99491 b95ac1 99488->99491 99500 b98d68 58 API calls __getptd_noexit 99489->99500 99502 b96e4e 99491->99502 99493 b95aa0 99501 b98ff6 9 API calls __gmtime64_s 99493->99501 99494 b95ac7 99508 b959ee 83 API calls 5 library calls 99494->99508 99497 b95ad6 99509 b95af8 LeaveCriticalSection LeaveCriticalSection _fprintf 99497->99509 99499 b95aab __commit 99499->99485 99500->99493 99501->99499 99503 b96e5e 99502->99503 99504 b96e80 EnterCriticalSection 99502->99504 99503->99504 99505 b96e66 99503->99505 99506 b96e76 99504->99506 99507 b99e4b __lock 58 API calls 99505->99507 99506->99494 99507->99506 99508->99497 99509->99499 99513 b9582d 99510->99513 99512 b7508e 99512->99300 99514 b95839 __commit 99513->99514 99515 b9587c 99514->99515 99516 b9584f _memset 99514->99516 99517 b95874 __commit 99514->99517 99518 b96e4e __lock_file 59 API calls 99515->99518 99540 b98d68 58 API calls __getptd_noexit 99516->99540 99517->99512 99519 b95882 99518->99519 99526 b9564d 99519->99526 99522 b95869 99541 b98ff6 9 API calls __gmtime64_s 99522->99541 99527 b95668 _memset 99526->99527 99539 b95683 99526->99539 99528 b95673 99527->99528 99533 b956c3 99527->99533 99527->99539 99638 b98d68 58 API calls __getptd_noexit 99528->99638 99530 b95678 99639 b98ff6 9 API calls __gmtime64_s 99530->99639 99534 b957d4 _memset 99533->99534 99533->99539 99543 b94916 99533->99543 99550 ba10ab 99533->99550 99618 ba0df7 99533->99618 99640 ba0f18 58 API calls 3 library calls 99533->99640 99641 b98d68 58 API calls __getptd_noexit 99534->99641 99542 b958b6 LeaveCriticalSection LeaveCriticalSection _fprintf 99539->99542 99540->99522 99541->99517 99542->99517 99544 b94920 99543->99544 99545 b94935 99543->99545 99642 b98d68 58 API calls __getptd_noexit 99544->99642 99545->99533 99547 b94925 99643 b98ff6 9 API calls __gmtime64_s 99547->99643 99549 b94930 99549->99533 99551 ba10cc 99550->99551 99552 ba10e3 99550->99552 99653 b98d34 58 API calls __getptd_noexit 99551->99653 99554 ba181b 99552->99554 99558 ba111d 99552->99558 99669 b98d34 58 API calls __getptd_noexit 99554->99669 99555 ba10d1 99654 b98d68 58 API calls __getptd_noexit 99555->99654 99560 ba1125 99558->99560 99566 ba113c 99558->99566 99559 ba1820 99670 b98d68 58 API calls __getptd_noexit 99559->99670 99655 b98d34 58 API calls __getptd_noexit 99560->99655 99563 ba1131 99671 b98ff6 9 API calls __gmtime64_s 99563->99671 99564 ba112a 99656 b98d68 58 API calls __getptd_noexit 99564->99656 99567 ba1151 99566->99567 99569 ba116b 99566->99569 99571 ba1189 99566->99571 99598 ba10d8 99566->99598 99657 b98d34 58 API calls __getptd_noexit 99567->99657 99569->99567 99574 ba1176 99569->99574 99658 b98a5d 58 API calls 2 library calls 99571->99658 99644 ba5ebb 99574->99644 99575 ba1199 99577 ba11bc 99575->99577 99578 ba11a1 99575->99578 99576 ba128a 99580 ba1303 ReadFile 99576->99580 99585 ba12a0 GetConsoleMode 99576->99585 99661 ba1b11 60 API calls 3 library calls 99577->99661 99659 b98d68 58 API calls __getptd_noexit 99578->99659 99583 ba17e3 GetLastError 99580->99583 99584 ba1325 99580->99584 99582 ba11a6 99660 b98d34 58 API calls __getptd_noexit 99582->99660 99587 ba17f0 99583->99587 99588 ba12e3 99583->99588 99584->99583 99592 ba12f5 99584->99592 99589 ba1300 99585->99589 99590 ba12b4 99585->99590 99667 b98d68 58 API calls __getptd_noexit 99587->99667 99600 ba12e9 99588->99600 99662 b98d47 58 API calls 3 library calls 99588->99662 99589->99580 99590->99589 99593 ba12ba ReadConsoleW 99590->99593 99592->99600 99602 ba135a 99592->99602 99605 ba15c7 99592->99605 99593->99592 99595 ba12dd GetLastError 99593->99595 99594 ba17f5 99668 b98d34 58 API calls __getptd_noexit 99594->99668 99595->99588 99598->99533 99599 b92f95 _free 58 API calls 99599->99598 99600->99598 99600->99599 99603 ba13c6 ReadFile 99602->99603 99609 ba1447 99602->99609 99606 ba13e7 GetLastError 99603->99606 99616 ba13f1 99603->99616 99604 ba16cd ReadFile 99611 ba16f0 GetLastError 99604->99611 99617 ba16fe 99604->99617 99605->99600 99605->99604 99606->99616 99607 ba1504 99612 ba14b4 MultiByteToWideChar 99607->99612 99665 ba1b11 60 API calls 3 library calls 99607->99665 99608 ba14f4 99664 b98d68 58 API calls __getptd_noexit 99608->99664 99609->99600 99609->99607 99609->99608 99609->99612 99611->99617 99612->99595 99612->99600 99616->99602 99663 ba1b11 60 API calls 3 library calls 99616->99663 99617->99605 99666 ba1b11 60 API calls 3 library calls 99617->99666 99619 ba0e02 99618->99619 99624 ba0e17 99618->99624 99705 b98d68 58 API calls __getptd_noexit 99619->99705 99621 ba0e12 99621->99533 99622 ba0e07 99706 b98ff6 9 API calls __gmtime64_s 99622->99706 99624->99621 99625 ba0e4c 99624->99625 99707 ba6234 58 API calls __malloc_crt 99624->99707 99627 b94916 __flswbuf 58 API calls 99625->99627 99628 ba0e60 99627->99628 99672 ba0f97 99628->99672 99630 ba0e67 99630->99621 99631 b94916 __flswbuf 58 API calls 99630->99631 99632 ba0e8a 99631->99632 99632->99621 99633 b94916 __flswbuf 58 API calls 99632->99633 99634 ba0e96 99633->99634 99634->99621 99635 b94916 __flswbuf 58 API calls 99634->99635 99636 ba0ea3 99635->99636 99637 b94916 __flswbuf 58 API calls 99636->99637 99637->99621 99638->99530 99639->99539 99640->99533 99641->99530 99642->99547 99643->99549 99645 ba5ed3 99644->99645 99646 ba5ec6 99644->99646 99648 b98d68 __gmtime64_s 58 API calls 99645->99648 99650 ba5edf 99645->99650 99647 b98d68 __gmtime64_s 58 API calls 99646->99647 99649 ba5ecb 99647->99649 99651 ba5f00 99648->99651 99649->99576 99650->99576 99652 b98ff6 __gmtime64_s 9 API calls 99651->99652 99652->99649 99653->99555 99654->99598 99655->99564 99656->99563 99657->99564 99658->99575 99659->99582 99660->99598 99661->99574 99662->99600 99663->99616 99664->99600 99665->99612 99666->99617 99667->99594 99668->99600 99669->99559 99670->99563 99671->99598 99673 ba0fa3 __commit 99672->99673 99674 ba0fb0 99673->99674 99675 ba0fc7 99673->99675 99677 b98d34 __commit 58 API calls 99674->99677 99676 ba108b 99675->99676 99678 ba0fdb 99675->99678 99679 b98d34 __commit 58 API calls 99676->99679 99680 ba0fb5 99677->99680 99681 ba0ff9 99678->99681 99682 ba1006 99678->99682 99683 ba0ffe 99679->99683 99684 b98d68 __gmtime64_s 58 API calls 99680->99684 99685 b98d34 __commit 58 API calls 99681->99685 99686 ba1028 99682->99686 99687 ba1013 99682->99687 99691 b98d68 __gmtime64_s 58 API calls 99683->99691 99688 ba0fbc __commit 99684->99688 99685->99683 99690 b9d446 ___lock_fhandle 59 API calls 99686->99690 99689 b98d34 __commit 58 API calls 99687->99689 99688->99630 99692 ba1018 99689->99692 99693 ba102e 99690->99693 99697 ba1020 99691->99697 99694 b98d68 __gmtime64_s 58 API calls 99692->99694 99695 ba1041 99693->99695 99696 ba1054 99693->99696 99694->99697 99700 ba10ab __read_nolock 70 API calls 99695->99700 99699 b98d68 __gmtime64_s 58 API calls 99696->99699 99698 b98ff6 __gmtime64_s 9 API calls 99697->99698 99698->99688 99702 ba1059 99699->99702 99701 ba104d 99700->99701 99704 ba1083 __read LeaveCriticalSection 99701->99704 99703 b98d34 __commit 58 API calls 99702->99703 99703->99701 99704->99688 99705->99622 99706->99621 99707->99625 99709 b95e9c __commit 99708->99709 99710 b95eae 99709->99710 99711 b95ec3 99709->99711 99722 b98d68 58 API calls __getptd_noexit 99710->99722 99713 b96e4e __lock_file 59 API calls 99711->99713 99715 b95ec9 99713->99715 99714 b95eb3 99723 b98ff6 9 API calls __gmtime64_s 99714->99723 99724 b95b00 67 API calls 6 library calls 99715->99724 99718 b95ed4 99725 b95ef4 LeaveCriticalSection LeaveCriticalSection _fprintf 99718->99725 99720 b95ee6 99721 b95ebe __commit 99720->99721 99721->99305 99722->99714 99723->99721 99724->99718 99725->99720 99726->99172 99727->99185 99728->99187 99729->99183 99730->99193 99732 b792c9 Mailbox 99731->99732 99733 baf5c8 99732->99733 99738 b792d3 99732->99738 99735 b90ff6 Mailbox 59 API calls 99733->99735 99734 b792da 99734->99197 99736 baf5d4 99735->99736 99738->99734 99739 b79df0 59 API calls Mailbox 99738->99739 99739->99738 99740->99203 99741->99204 99742->99213 99743->99231 99745 bd8d9b 99744->99745 99746 bd8da9 99744->99746 99747 b9548b 115 API calls 99745->99747 99748 bd8dee 99746->99748 99749 b9548b 115 API calls 99746->99749 99774 bd8db2 99746->99774 99747->99746 99775 bd901b 99748->99775 99751 bd8dd3 99749->99751 99751->99748 99753 bd8ddc 99751->99753 99752 bd8e32 99754 bd8e57 99752->99754 99755 bd8e36 99752->99755 99757 b955d6 __fcloseall 83 API calls 99753->99757 99753->99774 99779 bd8c33 99754->99779 99756 bd8e43 99755->99756 99759 b955d6 __fcloseall 83 API calls 99755->99759 99761 b955d6 __fcloseall 83 API calls 99756->99761 99756->99774 99757->99774 99759->99756 99761->99774 99762 bd8e85 99788 bd8eb5 99762->99788 99763 bd8e65 99765 bd8e72 99763->99765 99766 b955d6 __fcloseall 83 API calls 99763->99766 99768 b955d6 __fcloseall 83 API calls 99765->99768 99765->99774 99766->99765 99768->99774 99771 bd8ea0 99773 b955d6 __fcloseall 83 API calls 99771->99773 99771->99774 99773->99774 99774->99243 99776 bd9040 99775->99776 99778 bd9029 __tzset_nolock _memmove 99775->99778 99777 b95812 __fread_nolock 74 API calls 99776->99777 99777->99778 99778->99752 99780 b9594c std::exception::_Copy_str 58 API calls 99779->99780 99781 bd8c42 99780->99781 99782 b9594c std::exception::_Copy_str 58 API calls 99781->99782 99783 bd8c56 99782->99783 99784 b9594c std::exception::_Copy_str 58 API calls 99783->99784 99785 bd8c6a 99784->99785 99786 bd8f97 58 API calls 99785->99786 99787 bd8c7d 99785->99787 99786->99787 99787->99762 99787->99763 99789 bd8eca 99788->99789 99790 bd8f82 99789->99790 99791 bd8c8f 74 API calls 99789->99791 99795 bd8e8c 99789->99795 99817 bd8d2b 99789->99817 99828 bd909c 99789->99828 99832 bd91bf 99790->99832 99791->99789 99796 bd8f97 99795->99796 99797 bd8fa4 99796->99797 99800 bd8faa 99796->99800 99798 b92f95 _free 58 API calls 99797->99798 99798->99800 99799 bd8fbb 99802 bd8e93 99799->99802 99803 b92f95 _free 58 API calls 99799->99803 99800->99799 99801 b92f95 _free 58 API calls 99800->99801 99801->99799 99802->99771 99804 b955d6 99802->99804 99803->99802 99805 b955e2 __commit 99804->99805 99806 b9560e 99805->99806 99807 b955f6 99805->99807 99810 b96e4e __lock_file 59 API calls 99806->99810 99812 b95606 __commit 99806->99812 99888 b98d68 58 API calls __getptd_noexit 99807->99888 99809 b955fb 99889 b98ff6 9 API calls __gmtime64_s 99809->99889 99813 b95620 99810->99813 99812->99771 99872 b9556a 99813->99872 99836 bd8c8f 99817->99836 99820 bd8c8f 74 API calls 99821 bd8d47 99820->99821 99822 bd8c8f 74 API calls 99821->99822 99825 bd8d87 99821->99825 99823 bd8d58 99822->99823 99824 bd8c8f 74 API calls 99823->99824 99823->99825 99827 bd8d6a 99824->99827 99825->99789 99826 bd8c8f 74 API calls 99826->99827 99827->99825 99827->99826 99829 bd90eb 99828->99829 99830 bd90ab 99828->99830 99829->99830 99840 bd9172 99829->99840 99830->99789 99833 bd91cc 99832->99833 99834 bd91dd 99832->99834 99835 b94a93 80 API calls 99833->99835 99834->99795 99835->99834 99837 bd8ca2 99836->99837 99838 bd8d22 99837->99838 99839 bd9129 74 API calls 99837->99839 99838->99820 99838->99825 99839->99837 99841 bd919e 99840->99841 99842 bd91af 99840->99842 99844 b94a93 99841->99844 99842->99829 99845 b94a9f __commit 99844->99845 99846 b94abd 99845->99846 99847 b94ad5 99845->99847 99849 b94acd __commit 99845->99849 99869 b98d68 58 API calls __getptd_noexit 99846->99869 99850 b96e4e __lock_file 59 API calls 99847->99850 99849->99842 99852 b94adb 99850->99852 99851 b94ac2 99870 b98ff6 9 API calls __gmtime64_s 99851->99870 99857 b9493a 99852->99857 99858 b94967 99857->99858 99861 b94949 99857->99861 99871 b94b0d LeaveCriticalSection LeaveCriticalSection _fprintf 99858->99871 99859 b94957 99860 b98d68 __gmtime64_s 58 API calls 99859->99860 99862 b9495c 99860->99862 99861->99858 99861->99859 99863 b94981 _memmove 99861->99863 99864 b98ff6 __gmtime64_s 9 API calls 99862->99864 99863->99858 99865 b9b05e __flsbuf 78 API calls 99863->99865 99866 b94c6d __flush 78 API calls 99863->99866 99867 b94916 __flswbuf 58 API calls 99863->99867 99868 b9dac6 __write 78 API calls 99863->99868 99864->99858 99865->99863 99866->99863 99867->99863 99868->99863 99869->99851 99870->99849 99871->99849 99873 b95579 99872->99873 99874 b9558d 99872->99874 99927 b98d68 58 API calls __getptd_noexit 99873->99927 99886 b95589 99874->99886 99891 b94c6d 99874->99891 99876 b9557e 99928 b98ff6 9 API calls __gmtime64_s 99876->99928 99882 b94916 __flswbuf 58 API calls 99883 b955a7 99882->99883 99901 ba0c52 99883->99901 99885 b955ad 99885->99886 99887 b92f95 _free 58 API calls 99885->99887 99890 b95645 LeaveCriticalSection LeaveCriticalSection _fprintf 99886->99890 99887->99886 99888->99809 99889->99812 99890->99812 99892 b94c80 99891->99892 99893 b94ca4 99891->99893 99892->99893 99894 b94916 __flswbuf 58 API calls 99892->99894 99897 ba0dc7 99893->99897 99895 b94c9d 99894->99895 99929 b9dac6 99895->99929 99898 ba0dd4 99897->99898 99900 b955a1 99897->99900 99899 b92f95 _free 58 API calls 99898->99899 99898->99900 99899->99900 99900->99882 99902 ba0c5e __commit 99901->99902 99903 ba0c6b 99902->99903 99904 ba0c82 99902->99904 100054 b98d34 58 API calls __getptd_noexit 99903->100054 99905 ba0d0d 99904->99905 99908 ba0c92 99904->99908 100059 b98d34 58 API calls __getptd_noexit 99905->100059 99907 ba0c70 100055 b98d68 58 API calls __getptd_noexit 99907->100055 99911 ba0cba 99908->99911 99912 ba0cb0 99908->99912 99915 b9d446 ___lock_fhandle 59 API calls 99911->99915 100056 b98d34 58 API calls __getptd_noexit 99912->100056 99913 ba0cb5 100060 b98d68 58 API calls __getptd_noexit 99913->100060 99917 ba0cc0 99915->99917 99919 ba0cde 99917->99919 99920 ba0cd3 99917->99920 99918 ba0d19 100061 b98ff6 9 API calls __gmtime64_s 99918->100061 100057 b98d68 58 API calls __getptd_noexit 99919->100057 100039 ba0d2d 99920->100039 99924 ba0c77 __commit 99924->99885 99925 ba0cd9 100058 ba0d05 LeaveCriticalSection __unlock_fhandle 99925->100058 99927->99876 99928->99886 99930 b9dad2 __commit 99929->99930 99931 b9dadf 99930->99931 99932 b9daf6 99930->99932 100030 b98d34 58 API calls __getptd_noexit 99931->100030 99934 b9db95 99932->99934 99937 b9db0a 99932->99937 100036 b98d34 58 API calls __getptd_noexit 99934->100036 99936 b9dae4 100031 b98d68 58 API calls __getptd_noexit 99936->100031 99940 b9db28 99937->99940 99941 b9db32 99937->99941 99938 b9db2d 100037 b98d68 58 API calls __getptd_noexit 99938->100037 100032 b98d34 58 API calls __getptd_noexit 99940->100032 99957 b9d446 99941->99957 99943 b9daeb __commit 99943->99893 99946 b9db38 99948 b9db4b 99946->99948 99949 b9db5e 99946->99949 99947 b9dba1 100038 b98ff6 9 API calls __gmtime64_s 99947->100038 99966 b9dbb5 99948->99966 100033 b98d68 58 API calls __getptd_noexit 99949->100033 99953 b9db57 100035 b9db8d LeaveCriticalSection __unlock_fhandle 99953->100035 99954 b9db63 100034 b98d34 58 API calls __getptd_noexit 99954->100034 99958 b9d452 __commit 99957->99958 99959 b9d4a1 EnterCriticalSection 99958->99959 99960 b99e4b __lock 58 API calls 99958->99960 99961 b9d4c7 __commit 99959->99961 99962 b9d477 99960->99962 99961->99946 99963 b9d48f 99962->99963 99964 b9a06b __mtinitlocknum InitializeCriticalSectionAndSpinCount 99962->99964 99965 b9d4cb ___lock_fhandle LeaveCriticalSection 99963->99965 99964->99963 99965->99959 99967 b9dbc2 __ftell_nolock 99966->99967 99968 b9dc01 99967->99968 99969 b9dc20 99967->99969 99991 b9dbf6 99967->99991 99971 b98d34 __commit 58 API calls 99968->99971 99974 b9dc78 99969->99974 99975 b9dc5c 99969->99975 99970 b9c836 __call_reportfault 6 API calls 99972 b9e416 99970->99972 99973 b9dc06 99971->99973 99972->99953 99976 b98d68 __gmtime64_s 58 API calls 99973->99976 99977 b9dc91 99974->99977 99980 ba1b11 __lseeki64_nolock 60 API calls 99974->99980 99978 b98d34 __commit 58 API calls 99975->99978 99979 b9dc0d 99976->99979 99981 ba5ebb __flswbuf 58 API calls 99977->99981 99982 b9dc61 99978->99982 99983 b98ff6 __gmtime64_s 9 API calls 99979->99983 99980->99977 99984 b9dc9f 99981->99984 99985 b98d68 __gmtime64_s 58 API calls 99982->99985 99983->99991 99987 b9dff8 99984->99987 99992 b99bec __setmbcp 58 API calls 99984->99992 99986 b9dc68 99985->99986 99988 b98ff6 __gmtime64_s 9 API calls 99986->99988 99989 b9e38b WriteFile 99987->99989 99990 b9e016 99987->99990 99988->99991 99993 b9dfeb GetLastError 99989->99993 100002 b9dfb8 99989->100002 99994 b9e13a 99990->99994 100000 b9e02c 99990->100000 99991->99970 99996 b9dccb GetConsoleMode 99992->99996 99993->100002 100003 b9e22f 99994->100003 100005 b9e145 99994->100005 99995 b9e3c4 99995->99991 100001 b98d68 __gmtime64_s 58 API calls 99995->100001 99996->99987 99997 b9dd0a 99996->99997 99997->99987 99998 b9dd1a GetConsoleCP 99997->99998 99998->99995 100016 b9dd49 99998->100016 99999 b9e09b WriteFile 99999->99993 100004 b9e0d8 99999->100004 100000->99995 100000->99999 100006 b9e3f2 100001->100006 100002->99991 100002->99995 100007 b9e118 100002->100007 100003->99995 100008 b9e2a4 WideCharToMultiByte 100003->100008 100004->100000 100024 b9e0fc 100004->100024 100005->99995 100009 b9e1aa WriteFile 100005->100009 100010 b98d34 __commit 58 API calls 100006->100010 100011 b9e3bb 100007->100011 100012 b9e123 100007->100012 100008->99993 100023 b9e2eb 100008->100023 100009->99993 100014 b9e1f9 100009->100014 100010->99991 100013 b98d47 __dosmaperr 58 API calls 100011->100013 100015 b98d68 __gmtime64_s 58 API calls 100012->100015 100013->99991 100014->100002 100014->100005 100014->100024 100018 b9e128 100015->100018 100016->100002 100020 b93835 __write_nolock 58 API calls 100016->100020 100025 b9de32 WideCharToMultiByte 100016->100025 100026 ba650a 60 API calls __write_nolock 100016->100026 100028 b9de9f 100016->100028 100017 b9e2f3 WriteFile 100021 b9e346 GetLastError 100017->100021 100017->100023 100019 b98d34 __commit 58 API calls 100018->100019 100019->99991 100020->100016 100021->100023 100022 ba7cae WriteConsoleW CreateFileW __putwch_nolock 100022->100028 100023->100002 100023->100003 100023->100017 100023->100024 100024->100002 100025->100002 100027 b9de6d WriteFile 100025->100027 100026->100016 100027->99993 100027->100028 100028->99993 100028->100002 100028->100016 100028->100022 100029 b9dec7 WriteFile 100028->100029 100029->99993 100029->100028 100030->99936 100031->99943 100032->99938 100033->99954 100034->99953 100035->99943 100036->99938 100037->99947 100038->99943 100062 b9d703 100039->100062 100041 ba0d91 100075 b9d67d 59 API calls 2 library calls 100041->100075 100043 ba0d3b 100043->100041 100045 b9d703 __close_nolock 58 API calls 100043->100045 100053 ba0d6f 100043->100053 100044 ba0d99 100050 ba0dbb 100044->100050 100076 b98d47 58 API calls 3 library calls 100044->100076 100047 ba0d66 100045->100047 100046 b9d703 __close_nolock 58 API calls 100048 ba0d7b FindCloseChangeNotification 100046->100048 100051 b9d703 __close_nolock 58 API calls 100047->100051 100048->100041 100052 ba0d87 GetLastError 100048->100052 100050->99925 100051->100053 100052->100041 100053->100041 100053->100046 100054->99907 100055->99924 100056->99913 100057->99925 100058->99924 100059->99913 100060->99918 100061->99924 100063 b9d70e 100062->100063 100064 b9d723 100062->100064 100065 b98d34 __commit 58 API calls 100063->100065 100067 b98d34 __commit 58 API calls 100064->100067 100069 b9d748 100064->100069 100066 b9d713 100065->100066 100068 b98d68 __gmtime64_s 58 API calls 100066->100068 100070 b9d752 100067->100070 100071 b9d71b 100068->100071 100069->100043 100072 b98d68 __gmtime64_s 58 API calls 100070->100072 100071->100043 100073 b9d75a 100072->100073 100074 b98ff6 __gmtime64_s 9 API calls 100073->100074 100074->100071 100075->100044 100076->100050 100139 ba1b90 100077->100139 100080 b748f7 100141 b77eec 100080->100141 100081 b748da 100082 b77d2c 59 API calls 100081->100082 100084 b748e6 100082->100084 100085 b77886 59 API calls 100084->100085 100086 b748f2 100085->100086 100087 b909d5 100086->100087 100088 ba1b90 __ftell_nolock 100087->100088 100089 b909e2 GetLongPathNameW 100088->100089 100090 b77d2c 59 API calls 100089->100090 100091 b7741d 100090->100091 100092 b7716b 100091->100092 100093 b777c7 59 API calls 100092->100093 100094 b7717d 100093->100094 100095 b748ae 60 API calls 100094->100095 100096 b77188 100095->100096 100097 baecae 100096->100097 100098 b77193 100096->100098 100103 baecc8 100097->100103 100151 b77a68 61 API calls 100097->100151 100099 b73f84 59 API calls 100098->100099 100101 b7719f 100099->100101 100145 b734c2 100101->100145 100104 b771b2 Mailbox 100104->99010 100106 b74f3d 136 API calls 100105->100106 100107 b769ef 100106->100107 100108 bae45a 100107->100108 100110 b74f3d 136 API calls 100107->100110 100109 bd97e5 122 API calls 100108->100109 100111 bae46f 100109->100111 100112 b76a03 100110->100112 100113 bae473 100111->100113 100114 bae490 100111->100114 100112->100108 100115 b76a0b 100112->100115 100116 b74faa 84 API calls 100113->100116 100117 b90ff6 Mailbox 59 API calls 100114->100117 100118 b76a17 100115->100118 100119 bae47b 100115->100119 100116->100119 100138 bae4d5 Mailbox 100117->100138 100152 b76bec 100118->100152 100245 bd4534 90 API calls _wprintf 100119->100245 100122 bae489 100122->100114 100124 bae689 100125 b92f95 _free 58 API calls 100124->100125 100126 bae691 100125->100126 100127 b74faa 84 API calls 100126->100127 100132 bae69a 100127->100132 100131 b92f95 _free 58 API calls 100131->100132 100132->100131 100134 b74faa 84 API calls 100132->100134 100251 bcfcb1 89 API calls 4 library calls 100132->100251 100134->100132 100135 b77f41 59 API calls 100135->100138 100138->100124 100138->100132 100138->100135 100246 bcfc4d 59 API calls 2 library calls 100138->100246 100247 bcfb6e 61 API calls 2 library calls 100138->100247 100248 bd7621 59 API calls Mailbox 100138->100248 100249 b7766f 59 API calls 2 library calls 100138->100249 100250 b774bd 59 API calls Mailbox 100138->100250 100140 b748bb GetFullPathNameW 100139->100140 100140->100080 100140->100081 100142 b77f06 100141->100142 100144 b77ef9 100141->100144 100143 b90ff6 Mailbox 59 API calls 100142->100143 100143->100144 100144->100084 100146 b734d4 100145->100146 100150 b734f3 _memmove 100145->100150 100148 b90ff6 Mailbox 59 API calls 100146->100148 100147 b90ff6 Mailbox 59 API calls 100149 b7350a 100147->100149 100148->100150 100149->100104 100150->100147 100151->100097 100153 b76c15 100152->100153 100154 bae847 100152->100154 100257 b75906 60 API calls Mailbox 100153->100257 100343 bcfcb1 89 API calls 4 library calls 100154->100343 100157 bae85a 100344 bcfcb1 89 API calls 4 library calls 100157->100344 100158 b76c37 100258 b75956 100158->100258 100162 b76c54 100164 b777c7 59 API calls 100162->100164 100163 bae876 100194 b76cc1 100163->100194 100165 b76c60 100164->100165 100271 b90b9b 60 API calls __ftell_nolock 100165->100271 100167 b76c6c 100170 b777c7 59 API calls 100167->100170 100168 bae889 100171 b75dcf CloseHandle 100168->100171 100169 b76ccf 100172 b777c7 59 API calls 100169->100172 100173 b76c78 100170->100173 100174 bae895 100171->100174 100175 b76cd8 100172->100175 100176 b748ae 60 API calls 100173->100176 100177 b74f3d 136 API calls 100174->100177 100178 b777c7 59 API calls 100175->100178 100179 b76c86 100176->100179 100180 bae8b1 100177->100180 100181 b76ce1 100178->100181 100272 b759b0 ReadFile SetFilePointerEx 100179->100272 100183 bae8da 100180->100183 100188 bd97e5 122 API calls 100180->100188 100281 b746f9 100181->100281 100345 bcfcb1 89 API calls 4 library calls 100183->100345 100187 b76cb2 100273 b75c4e 100187->100273 100192 bae8cd 100188->100192 100190 bae8f1 100223 b76e6c Mailbox 100190->100223 100195 bae8f6 100192->100195 100196 bae8d5 100192->100196 100194->100168 100194->100169 100198 b74faa 84 API calls 100195->100198 100197 b74faa 84 API calls 100196->100197 100197->100183 100199 bae8fb 100198->100199 100200 b90ff6 Mailbox 59 API calls 100199->100200 100207 bae92f 100200->100207 100204 b73bcd 100204->98869 100204->98878 100346 b7766f 59 API calls 2 library calls 100207->100346 100210 baeb69 100352 bd7581 59 API calls Mailbox 100210->100352 100216 baeb8b 100353 bdf835 59 API calls 2 library calls 100216->100353 100219 baeb98 100221 b92f95 _free 58 API calls 100219->100221 100221->100223 100252 b75934 100223->100252 100235 b77f41 59 API calls 100242 bae978 Mailbox 100235->100242 100239 baebbb 100354 bcfcb1 89 API calls 4 library calls 100239->100354 100241 baebd4 100243 b92f95 _free 58 API calls 100241->100243 100242->100210 100242->100235 100242->100239 100347 bcfc4d 59 API calls 2 library calls 100242->100347 100348 bcfb6e 61 API calls 2 library calls 100242->100348 100349 bd7621 59 API calls Mailbox 100242->100349 100350 b7766f 59 API calls 2 library calls 100242->100350 100351 b77373 59 API calls Mailbox 100242->100351 100244 baebe7 100243->100244 100244->100223 100245->100122 100246->100138 100247->100138 100248->100138 100249->100138 100250->100138 100251->100132 100253 b75dcf CloseHandle 100252->100253 100254 b7593c Mailbox 100253->100254 100255 b75dcf CloseHandle 100254->100255 100256 b7594b 100255->100256 100256->100204 100257->100158 100259 b75dcf CloseHandle 100258->100259 100260 b75962 100259->100260 100357 b75df9 100260->100357 100262 b75981 100263 b759a4 100262->100263 100365 b75770 100262->100365 100263->100157 100263->100162 100265 b75993 100382 b753db SetFilePointerEx SetFilePointerEx 100265->100382 100267 b7599a 100267->100263 100268 bae030 100267->100268 100383 bd3696 SetFilePointerEx SetFilePointerEx WriteFile 100268->100383 100270 bae060 100270->100263 100271->100167 100272->100187 100280 b75c68 100273->100280 100274 b75cef SetFilePointerEx 100396 b75dae SetFilePointerEx 100274->100396 100275 bae151 100397 b75dae SetFilePointerEx 100275->100397 100278 b75cc3 100278->100194 100279 bae16b 100280->100274 100280->100275 100280->100278 100282 b777c7 59 API calls 100281->100282 100283 b7470f 100282->100283 100284 b777c7 59 API calls 100283->100284 100285 b74717 100284->100285 100286 b777c7 59 API calls 100285->100286 100287 b7471f 100286->100287 100288 b777c7 59 API calls 100287->100288 100289 b74727 100288->100289 100290 bad8fb 100289->100290 100291 b7475b 100289->100291 100292 b781a7 59 API calls 100290->100292 100293 b779ab 59 API calls 100291->100293 100294 bad904 100292->100294 100295 b74769 100293->100295 100296 b77eec 59 API calls 100294->100296 100297 b77e8c 59 API calls 100295->100297 100299 b7479e 100296->100299 100298 b74773 100297->100298 100298->100299 100300 b779ab 59 API calls 100298->100300 100301 b747de 100299->100301 100303 b747bd 100299->100303 100314 bad924 100299->100314 100304 b74794 100300->100304 100398 b779ab 100301->100398 100305 b77b52 59 API calls 100303->100305 100308 b77e8c 59 API calls 100304->100308 100309 b747c7 100305->100309 100307 bad9f4 100311 b77d2c 59 API calls 100307->100311 100308->100299 100309->100301 100314->100307 100317 bad9dd 100314->100317 100326 bad95b 100314->100326 100317->100307 100322 bad9b9 100326->100322 100330 bad9a4 100326->100330 100343->100157 100344->100163 100345->100190 100346->100242 100347->100242 100348->100242 100349->100242 100350->100242 100351->100242 100352->100216 100353->100219 100354->100241 100358 b75e12 CreateFileW 100357->100358 100359 bae181 100357->100359 100360 b75e34 100358->100360 100359->100360 100361 bae187 CreateFileW 100359->100361 100360->100262 100361->100360 100362 bae1ad 100361->100362 100363 b75c4e 2 API calls 100362->100363 100364 bae1b8 100363->100364 100364->100360 100366 badfce 100365->100366 100367 b7578b 100365->100367 100381 b7581a 100366->100381 100390 b75e3f 100366->100390 100368 b75c4e 2 API calls 100367->100368 100367->100381 100369 b757ad 100368->100369 100370 b7538e 59 API calls 100369->100370 100372 b757b7 100370->100372 100372->100366 100373 b757c4 100372->100373 100374 b90ff6 Mailbox 59 API calls 100373->100374 100375 b757cf 100374->100375 100376 b7538e 59 API calls 100375->100376 100377 b757da 100376->100377 100384 b75d20 100377->100384 100380 b75c4e 2 API calls 100380->100381 100381->100265 100382->100267 100383->100270 100385 b75d93 100384->100385 100389 b75d2e 100384->100389 100395 b75dae SetFilePointerEx 100385->100395 100386 b75807 100386->100380 100388 b75d66 ReadFile 100388->100386 100388->100389 100389->100386 100389->100388 100391 b75c4e 2 API calls 100390->100391 100392 b75e60 100391->100392 100393 b75c4e 2 API calls 100392->100393 100394 b75e74 100393->100394 100394->100381 100395->100389 100396->100278 100397->100279 100419 b77009 100413->100419 100961 b7107d 100966 b771eb 100961->100966 100963 b7108c 100964 b92f80 __cinit 67 API calls 100963->100964 100965 b71096 100964->100965 100967 b771fb __ftell_nolock 100966->100967 100968 b777c7 59 API calls 100967->100968 100969 b772b1 100968->100969 100970 b74864 61 API calls 100969->100970 100971 b772ba 100970->100971 100997 b9074f 100971->100997 100974 b77e0b 59 API calls 100975 b772d3 100974->100975 100976 b73f84 59 API calls 100975->100976 100977 b772e2 100976->100977 100978 b777c7 59 API calls 100977->100978 100979 b772eb 100978->100979 100980 b77eec 59 API calls 100979->100980 100981 b772f4 RegOpenKeyExW 100980->100981 100982 baecda RegQueryValueExW 100981->100982 100988 b77316 Mailbox 100981->100988 100983 baed6c RegCloseKey 100982->100983 100984 baecf7 100982->100984 100985 baed7e _wcscat Mailbox __wsetenvp 100983->100985 100983->100988 100986 b90ff6 Mailbox 59 API calls 100984->100986 100985->100988 100994 b77f41 59 API calls 100985->100994 100995 b73f84 59 API calls 100985->100995 100996 b77b52 59 API calls 100985->100996 100987 baed10 100986->100987 100989 b7538e 59 API calls 100987->100989 100988->100963 100990 baed1b RegQueryValueExW 100989->100990 100991 baed38 100990->100991 100993 baed52 100990->100993 100992 b77d2c 59 API calls 100991->100992 100992->100993 100993->100983 100994->100985 100995->100985 100996->100985 100998 ba1b90 __ftell_nolock 100997->100998 100999 b9075c GetFullPathNameW 100998->100999 101000 b9077e 100999->101000 101001 b77d2c 59 API calls 101000->101001 101002 b772c5 101001->101002 101002->100974 101003 b7e70b 101006 b7d260 101003->101006 101005 b7e719 101007 b7d27d 101006->101007 101035 b7d4dd 101006->101035 101008 bb2abb 101007->101008 101009 bb2b0a 101007->101009 101038 b7d2a4 101007->101038 101012 bb2abe 101008->101012 101020 bb2ad9 101008->101020 101050 bea6fb 341 API calls __cinit 101009->101050 101013 bb2aca 101012->101013 101012->101038 101048 bead0f 341 API calls 101013->101048 101014 b92f80 __cinit 67 API calls 101014->101038 101017 bb2cdf 101017->101017 101018 b7d594 101042 b78bb2 68 API calls 101018->101042 101019 b7d6ab 101019->101005 101020->101035 101049 beb1b7 341 API calls 3 library calls 101020->101049 101024 b7d5a3 101024->101005 101025 bb2c26 101054 beaa66 89 API calls 101025->101054 101028 b78620 69 API calls 101028->101038 101035->101019 101055 bda0b5 89 API calls 4 library calls 101035->101055 101036 b7a000 341 API calls 101036->101038 101037 b781a7 59 API calls 101037->101038 101038->101014 101038->101018 101038->101019 101038->101025 101038->101028 101038->101035 101038->101036 101038->101037 101040 b788a0 68 API calls __cinit 101038->101040 101041 b786a2 68 API calls 101038->101041 101043 b7859a 68 API calls 101038->101043 101044 b7d0dc 341 API calls 101038->101044 101045 b79f3a 59 API calls Mailbox 101038->101045 101046 b7d060 89 API calls 101038->101046 101047 b7cedd 341 API calls 101038->101047 101051 b78bb2 68 API calls 101038->101051 101052 b79e9c 60 API calls Mailbox 101038->101052 101053 bc6d03 60 API calls 101038->101053 101040->101038 101041->101038 101042->101024 101043->101038 101044->101038 101045->101038 101046->101038 101047->101038 101048->101019 101049->101035 101050->101038 101051->101038 101052->101038 101053->101038 101054->101035 101055->101017 101056 baff06 101057 baff10 101056->101057 101088 b7ac90 Mailbox _memmove 101056->101088 101296 b78e34 59 API calls Mailbox 101057->101296 101061 b7b685 101301 bda0b5 89 API calls 4 library calls 101061->101301 101064 b7b5d5 101067 b781a7 59 API calls 101064->101067 101066 b90ff6 59 API calls Mailbox 101084 b7a097 Mailbox 101066->101084 101082 b7a1b7 101067->101082 101068 bb047f 101300 bda0b5 89 API calls 4 library calls 101068->101300 101069 b7b5da 101306 bda0b5 89 API calls 4 library calls 101069->101306 101071 b77f41 59 API calls 101071->101088 101073 b777c7 59 API calls 101073->101084 101075 b781a7 59 API calls 101075->101084 101076 bb048e 101078 bc7405 59 API calls 101078->101084 101079 bc66f4 Mailbox 59 API calls 101079->101082 101080 bb0e00 101305 bda0b5 89 API calls 4 library calls 101080->101305 101081 b92f80 67 API calls __cinit 101081->101084 101084->101064 101084->101066 101084->101068 101084->101069 101084->101073 101084->101075 101084->101078 101084->101080 101084->101081 101084->101082 101086 b7a6ba 101084->101086 101290 b7ca20 341 API calls 2 library calls 101084->101290 101291 b7ba60 60 API calls Mailbox 101084->101291 101085 bebf80 341 API calls 101085->101088 101304 bda0b5 89 API calls 4 library calls 101086->101304 101088->101061 101088->101071 101088->101082 101088->101084 101088->101085 101090 b7a000 341 API calls 101088->101090 101091 bb0c94 101088->101091 101093 bb0ca2 101088->101093 101096 b7b37c 101088->101096 101097 b90ff6 59 API calls Mailbox 101088->101097 101102 b7b416 101088->101102 101105 b7ade2 Mailbox 101088->101105 101249 bec5f4 101088->101249 101281 bd7be0 101088->101281 101287 bc66f4 101088->101287 101297 bc7405 59 API calls 101088->101297 101298 bec4a7 85 API calls 2 library calls 101088->101298 101090->101088 101302 b79df0 59 API calls Mailbox 101091->101302 101303 bda0b5 89 API calls 4 library calls 101093->101303 101095 bb0c86 101095->101079 101095->101082 101293 b79e9c 60 API calls Mailbox 101096->101293 101097->101088 101099 b7b38d 101294 b79e9c 60 API calls Mailbox 101099->101294 101295 b7f803 341 API calls 101102->101295 101105->101061 101105->101082 101105->101095 101106 bb00e0 VariantClear 101105->101106 101112 be474d 101105->101112 101121 bee237 101105->101121 101124 bf23c9 101105->101124 101162 bdd2e6 101105->101162 101209 b82123 101105->101209 101292 b79df0 59 API calls Mailbox 101105->101292 101299 bc7405 59 API calls 101105->101299 101106->101105 101113 b79997 84 API calls 101112->101113 101114 be4787 101113->101114 101115 b763a0 94 API calls 101114->101115 101116 be4797 101115->101116 101117 be47bc 101116->101117 101118 b7a000 341 API calls 101116->101118 101120 be47c0 101117->101120 101307 b79bf8 101117->101307 101118->101117 101120->101105 101122 becdf1 130 API calls 101121->101122 101123 bee247 101122->101123 101123->101105 101125 b777c7 59 API calls 101124->101125 101126 bf23e0 101125->101126 101127 b79997 84 API calls 101126->101127 101128 bf23ef 101127->101128 101129 b77b76 59 API calls 101128->101129 101130 bf2402 101129->101130 101131 b79997 84 API calls 101130->101131 101132 bf240f 101131->101132 101133 bf249d 101132->101133 101134 bf2429 101132->101134 101135 b79997 84 API calls 101133->101135 101339 b79c9c 59 API calls 101134->101339 101137 bf24a2 101135->101137 101139 bf24ce 101137->101139 101140 bf24b0 101137->101140 101138 bf242e 101141 bf248c 101138->101141 101145 bf2445 101138->101145 101142 bf24e3 101139->101142 101340 b79c9c 59 API calls 101139->101340 101144 b79bf8 59 API calls 101140->101144 101143 b79bf8 59 API calls 101141->101143 101147 bf24f8 101142->101147 101341 b79c9c 59 API calls 101142->101341 101159 bf2499 Mailbox 101143->101159 101144->101159 101148 b779ab 59 API calls 101145->101148 101150 b780d7 59 API calls 101147->101150 101151 bf2452 101148->101151 101153 bf2512 101150->101153 101152 b77c8e 59 API calls 101151->101152 101154 bf2460 101152->101154 101320 bcf8f2 101153->101320 101156 b779ab 59 API calls 101154->101156 101157 bf2479 101156->101157 101158 b77c8e 59 API calls 101157->101158 101161 bf2487 101158->101161 101159->101105 101342 b79b9c 59 API calls Mailbox 101161->101342 101163 bdd305 101162->101163 101164 bdd310 101162->101164 101343 b79c9c 59 API calls 101163->101343 101166 bdd3ea Mailbox 101164->101166 101169 b777c7 59 API calls 101164->101169 101167 b90ff6 Mailbox 59 API calls 101166->101167 101205 bdd3f3 Mailbox 101166->101205 101168 bdd433 101167->101168 101171 bdd43f 101168->101171 101346 b75906 60 API calls Mailbox 101168->101346 101170 bdd334 101169->101170 101172 b777c7 59 API calls 101170->101172 101174 b79997 84 API calls 101171->101174 101175 bdd33d 101172->101175 101176 bdd457 101174->101176 101177 b79997 84 API calls 101175->101177 101178 b75956 67 API calls 101176->101178 101179 bdd349 101177->101179 101180 bdd466 101178->101180 101181 b746f9 59 API calls 101179->101181 101182 bdd49e 101180->101182 101183 bdd46a GetLastError 101180->101183 101184 bdd35e 101181->101184 101187 bdd4c9 101182->101187 101188 bdd500 101182->101188 101185 bdd483 101183->101185 101186 b77c8e 59 API calls 101184->101186 101185->101205 101347 b75a1a CloseHandle 101185->101347 101189 bdd391 101186->101189 101190 b90ff6 Mailbox 59 API calls 101187->101190 101192 b90ff6 Mailbox 59 API calls 101188->101192 101191 bdd3e3 101189->101191 101196 bd3e73 3 API calls 101189->101196 101193 bdd4ce 101190->101193 101345 b79c9c 59 API calls 101191->101345 101197 bdd505 101192->101197 101198 bdd4df 101193->101198 101200 b777c7 59 API calls 101193->101200 101199 bdd3a1 101196->101199 101202 b777c7 59 API calls 101197->101202 101197->101205 101348 bdf835 59 API calls 2 library calls 101198->101348 101199->101191 101201 bdd3a5 101199->101201 101200->101198 101204 b77f41 59 API calls 101201->101204 101202->101205 101206 bdd3b2 101204->101206 101205->101105 101344 bd3c66 63 API calls Mailbox 101206->101344 101208 bdd3bb Mailbox 101208->101191 101210 b79bf8 59 API calls 101209->101210 101211 b8213b 101210->101211 101213 b90ff6 Mailbox 59 API calls 101211->101213 101218 bb69af 101211->101218 101214 b82154 101213->101214 101216 b82164 101214->101216 101364 b75906 60 API calls Mailbox 101214->101364 101215 b82189 101226 b82196 101215->101226 101369 b79c9c 59 API calls 101215->101369 101219 b79997 84 API calls 101216->101219 101218->101215 101368 bdf7df 59 API calls 101218->101368 101221 b82172 101219->101221 101223 b75956 67 API calls 101221->101223 101222 bb69f7 101225 bb69ff 101222->101225 101222->101226 101224 b82181 101223->101224 101224->101215 101224->101218 101367 b75a1a CloseHandle 101224->101367 101370 b79c9c 59 API calls 101225->101370 101227 b75e3f 2 API calls 101226->101227 101230 b8219d 101227->101230 101231 bb6a11 101230->101231 101232 b821b7 101230->101232 101234 b90ff6 Mailbox 59 API calls 101231->101234 101233 b777c7 59 API calls 101232->101233 101235 b821bf 101233->101235 101236 bb6a17 101234->101236 101349 b756d2 101235->101349 101237 bb6a2b 101236->101237 101371 b759b0 ReadFile SetFilePointerEx 101236->101371 101243 bb6a2f _memmove 101237->101243 101372 bd794e 59 API calls 2 library calls 101237->101372 101241 b821ce 101241->101243 101365 b79b9c 59 API calls Mailbox 101241->101365 101244 b821e2 Mailbox 101245 b8221c 101244->101245 101246 b75dcf CloseHandle 101244->101246 101245->101105 101247 b82210 101246->101247 101247->101245 101366 b75a1a CloseHandle 101247->101366 101250 b777c7 59 API calls 101249->101250 101251 bec608 101250->101251 101252 b777c7 59 API calls 101251->101252 101253 bec610 101252->101253 101254 b777c7 59 API calls 101253->101254 101255 bec618 101254->101255 101256 b79997 84 API calls 101255->101256 101265 bec626 101256->101265 101257 b77a84 59 API calls 101257->101265 101258 b77d2c 59 API calls 101258->101265 101260 bec7f6 101263 b77e0b 59 API calls 101260->101263 101261 bec811 101267 b77e0b 59 API calls 101261->101267 101262 b781a7 59 API calls 101262->101265 101266 bec803 101263->101266 101264 bec83c Mailbox 101264->101088 101265->101257 101265->101258 101265->101260 101265->101261 101265->101262 101265->101264 101269 b77faf 59 API calls 101265->101269 101272 b77faf 59 API calls 101265->101272 101274 bec80f 101265->101274 101278 b79997 84 API calls 101265->101278 101279 b77e0b 59 API calls 101265->101279 101280 b77c8e 59 API calls 101265->101280 101270 b77c8e 59 API calls 101266->101270 101268 bec820 101267->101268 101271 b77c8e 59 API calls 101268->101271 101273 bec6bd CharUpperBuffW 101269->101273 101270->101274 101271->101274 101275 bec77d CharUpperBuffW 101272->101275 101396 b7859a 68 API calls 101273->101396 101274->101264 101398 b79b9c 59 API calls Mailbox 101274->101398 101397 b7c707 69 API calls 2 library calls 101275->101397 101278->101265 101279->101265 101280->101265 101282 bd7bec 101281->101282 101283 b90ff6 Mailbox 59 API calls 101282->101283 101284 bd7bfa 101283->101284 101285 bd7c08 101284->101285 101286 b777c7 59 API calls 101284->101286 101285->101088 101286->101285 101399 bc6636 101287->101399 101289 bc6702 101289->101088 101290->101084 101291->101084 101292->101105 101293->101099 101294->101102 101295->101061 101296->101088 101297->101088 101298->101088 101299->101105 101300->101076 101301->101095 101302->101095 101303->101095 101304->101082 101305->101069 101306->101082 101308 bafbff 101307->101308 101309 b79c08 101307->101309 101310 bafc10 101308->101310 101312 b77d2c 59 API calls 101308->101312 101314 b90ff6 Mailbox 59 API calls 101309->101314 101311 b77eec 59 API calls 101310->101311 101313 bafc1a 101311->101313 101312->101310 101317 b79c34 101313->101317 101318 b777c7 59 API calls 101313->101318 101315 b79c1b 101314->101315 101315->101313 101316 b79c26 101315->101316 101316->101317 101319 b77f41 59 API calls 101316->101319 101317->101120 101318->101317 101319->101317 101321 b777c7 59 API calls 101320->101321 101322 bcf905 101321->101322 101323 b77b76 59 API calls 101322->101323 101324 bcf919 101323->101324 101325 bcf658 61 API calls 101324->101325 101332 bcf93b 101324->101332 101327 bcf935 101325->101327 101326 bcf658 61 API calls 101326->101332 101328 b779ab 59 API calls 101327->101328 101327->101332 101328->101332 101329 bcf9b5 101331 b779ab 59 API calls 101329->101331 101330 b779ab 59 API calls 101330->101332 101333 bcf9ce 101331->101333 101332->101326 101332->101329 101332->101330 101334 b77c8e 59 API calls 101332->101334 101335 b77c8e 59 API calls 101333->101335 101334->101332 101336 bcf9da 101335->101336 101337 b780d7 59 API calls 101336->101337 101338 bcf9e9 Mailbox 101336->101338 101337->101338 101338->101161 101339->101138 101340->101142 101341->101147 101342->101159 101343->101164 101344->101208 101345->101166 101346->101171 101347->101205 101348->101205 101350 b75702 101349->101350 101351 b756dd 101349->101351 101352 b77eec 59 API calls 101350->101352 101351->101350 101355 b756ec 101351->101355 101356 bd349a 101352->101356 101353 bd34c9 101353->101241 101375 b75c18 101355->101375 101356->101353 101373 bd3436 ReadFile SetFilePointerEx 101356->101373 101374 b77a84 59 API calls 2 library calls 101356->101374 101363 bd35d8 Mailbox 101363->101241 101364->101216 101365->101244 101366->101245 101367->101218 101368->101218 101369->101222 101370->101230 101371->101237 101372->101243 101373->101356 101374->101356 101376 b90ff6 Mailbox 59 API calls 101375->101376 101377 b75c2b 101376->101377 101378 b90ff6 Mailbox 59 API calls 101377->101378 101379 b75c37 101378->101379 101380 b75632 101379->101380 101387 b75a2f 101380->101387 101382 b75674 101382->101363 101386 b7793a 61 API calls Mailbox 101382->101386 101383 b75d20 2 API calls 101384 b75643 101383->101384 101384->101382 101384->101383 101394 b75bda 59 API calls 2 library calls 101384->101394 101386->101363 101388 b75a40 101387->101388 101389 bae065 101387->101389 101388->101384 101395 bc6443 59 API calls Mailbox 101389->101395 101391 bae06f 101392 b90ff6 Mailbox 59 API calls 101391->101392 101393 bae07b 101392->101393 101394->101384 101395->101391 101396->101265 101397->101265 101398->101264 101400 bc665e 101399->101400 101401 bc6641 101399->101401 101400->101289 101401->101400 101403 bc6621 59 API calls Mailbox 101401->101403 101403->101401 101404 b7568a 101405 b75c18 59 API calls 101404->101405 101406 b7569c 101405->101406 101407 b75632 61 API calls 101406->101407 101408 b756aa 101407->101408 101410 b756ba Mailbox 101408->101410 101411 b781c1 MultiByteToWideChar 101408->101411 101412 b781e7 101411->101412 101413 b7822e 101411->101413 101414 b90ff6 Mailbox 59 API calls 101412->101414 101415 b77eec 59 API calls 101413->101415 101416 b781fc MultiByteToWideChar 101414->101416 101418 b78220 101415->101418 101419 b778ad 101416->101419 101418->101410 101420 b7792f 101419->101420 101421 b778bc 101419->101421 101422 b77e8c 59 API calls 101420->101422 101421->101420 101423 b778c8 101421->101423 101428 b778da _memmove 101422->101428 101424 b778d2 101423->101424 101425 b77900 101423->101425 101431 b78087 59 API calls Mailbox 101424->101431 101427 b78189 59 API calls 101425->101427 101429 b7790a 101427->101429 101428->101418 101430 b90ff6 Mailbox 59 API calls 101429->101430 101430->101428 101431->101428 101432 bb0226 101438 b7ade2 Mailbox 101432->101438 101434 bb0c86 101435 bc66f4 Mailbox 59 API calls 101434->101435 101436 bb0c8f 101435->101436 101438->101434 101438->101436 101439 bb00e0 VariantClear 101438->101439 101440 b7b6c1 101438->101440 101442 be474d 341 API calls 101438->101442 101443 bf23c9 87 API calls 101438->101443 101444 bee237 130 API calls 101438->101444 101445 b82123 95 API calls 101438->101445 101446 bdd2e6 101 API calls 101438->101446 101447 b79df0 59 API calls Mailbox 101438->101447 101448 bc7405 59 API calls 101438->101448 101439->101438 101449 bda0b5 89 API calls 4 library calls 101440->101449 101442->101438 101443->101438 101444->101438 101445->101438 101446->101438 101447->101438 101448->101438 101449->101434

                    Control-flow Graph

                    APIs
                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B73B7A
                    • IsDebuggerPresent.KERNEL32 ref: 00B73B8C
                    • GetFullPathNameW.KERNEL32(00007FFF,?,?,00C362F8,00C362E0,?,?), ref: 00B73BFD
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                      • Part of subcall function 00B80A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00B73C26,00C362F8,?,?,?), ref: 00B80ACE
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B73C81
                    • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00C293F0,00000010), ref: 00BAD4BC
                    • SetCurrentDirectoryW.KERNEL32(?,00C362F8,?,?,?), ref: 00BAD4F4
                    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00C25D40,00C362F8,?,?,?), ref: 00BAD57A
                    • ShellExecuteW.SHELL32(00000000,?,?), ref: 00BAD581
                      • Part of subcall function 00B73A58: GetSysColorBrush.USER32(0000000F), ref: 00B73A62
                      • Part of subcall function 00B73A58: LoadCursorW.USER32(00000000,00007F00), ref: 00B73A71
                      • Part of subcall function 00B73A58: LoadIconW.USER32(00000063), ref: 00B73A88
                      • Part of subcall function 00B73A58: LoadIconW.USER32(000000A4), ref: 00B73A9A
                      • Part of subcall function 00B73A58: LoadIconW.USER32(000000A2), ref: 00B73AAC
                      • Part of subcall function 00B73A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00B73AD2
                      • Part of subcall function 00B73A58: RegisterClassExW.USER32(?), ref: 00B73B28
                      • Part of subcall function 00B739E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00B73A15
                      • Part of subcall function 00B739E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00B73A36
                      • Part of subcall function 00B739E7: ShowWindow.USER32(00000000,?,?), ref: 00B73A4A
                      • Part of subcall function 00B739E7: ShowWindow.USER32(00000000,?,?), ref: 00B73A53
                      • Part of subcall function 00B743DB: _memset.LIBCMT ref: 00B74401
                      • Part of subcall function 00B743DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B744A6
                    Strings
                    • This is a third-party compiled AutoIt script., xrefs: 00BAD4B4
                    • runas, xrefs: 00BAD575
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                    • String ID: This is a third-party compiled AutoIt script.$runas
                    • API String ID: 529118366-3287110873
                    • Opcode ID: c8881381b61c19ece91ad5187553bd76dbb638699fd6fc63c8655370eedfc5f3
                    • Instruction ID: 5fd5c6e8966b75be2882af455e437732d99c1baeedb7f40a6abf3529e88e277a
                    • Opcode Fuzzy Hash: c8881381b61c19ece91ad5187553bd76dbb638699fd6fc63c8655370eedfc5f3
                    • Instruction Fuzzy Hash: 5F51B270918249BACF12ABB49C45BFE7BF8EF05700F04C1E5F46AA72A1DE714A45DB21

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 996 b74afe-b74b5e call b777c7 GetVersionExW call b77d2c 1001 b74b64 996->1001 1002 b74c69-b74c6b 996->1002 1004 b74b67-b74b6c 1001->1004 1003 badb90-badb9c 1002->1003 1005 badb9d-badba1 1003->1005 1006 b74b72 1004->1006 1007 b74c70-b74c71 1004->1007 1009 badba3 1005->1009 1010 badba4-badbb0 1005->1010 1008 b74b73-b74baa call b77e8c call b77886 1006->1008 1007->1008 1018 badc8d-badc90 1008->1018 1019 b74bb0-b74bb1 1008->1019 1009->1010 1010->1005 1012 badbb2-badbb7 1010->1012 1012->1004 1014 badbbd-badbc4 1012->1014 1014->1003 1016 badbc6 1014->1016 1020 badbcb-badbce 1016->1020 1021 badca9-badcad 1018->1021 1022 badc92 1018->1022 1019->1020 1023 b74bb7-b74bc2 1019->1023 1024 b74bf1-b74c08 GetCurrentProcess IsWow64Process 1020->1024 1025 badbd4-badbf2 1020->1025 1030 badc98-badca1 1021->1030 1031 badcaf-badcb8 1021->1031 1026 badc95 1022->1026 1027 badc13-badc19 1023->1027 1028 b74bc8-b74bca 1023->1028 1032 b74c0d-b74c1e 1024->1032 1033 b74c0a 1024->1033 1025->1024 1029 badbf8-badbfe 1025->1029 1026->1030 1038 badc1b-badc1e 1027->1038 1039 badc23-badc29 1027->1039 1034 badc2e-badc3a 1028->1034 1035 b74bd0-b74bd3 1028->1035 1036 badc08-badc0e 1029->1036 1037 badc00-badc03 1029->1037 1030->1021 1031->1026 1040 badcba-badcbd 1031->1040 1041 b74c20-b74c30 call b74c95 1032->1041 1042 b74c89-b74c93 GetSystemInfo 1032->1042 1033->1032 1046 badc3c-badc3f 1034->1046 1047 badc44-badc4a 1034->1047 1043 badc5a-badc5d 1035->1043 1044 b74bd9-b74be8 1035->1044 1036->1024 1037->1024 1038->1024 1039->1024 1040->1030 1053 b74c32-b74c3f call b74c95 1041->1053 1054 b74c7d-b74c87 GetSystemInfo 1041->1054 1045 b74c56-b74c66 1042->1045 1043->1024 1052 badc63-badc78 1043->1052 1049 badc4f-badc55 1044->1049 1050 b74bee 1044->1050 1046->1024 1047->1024 1049->1024 1050->1024 1055 badc7a-badc7d 1052->1055 1056 badc82-badc88 1052->1056 1061 b74c76-b74c7b 1053->1061 1062 b74c41-b74c45 GetNativeSystemInfo 1053->1062 1057 b74c47-b74c4b 1054->1057 1055->1024 1056->1024 1057->1045 1059 b74c4d-b74c50 FreeLibrary 1057->1059 1059->1045 1061->1062 1062->1057
                    APIs
                    • GetVersionExW.KERNEL32(?), ref: 00B74B2B
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                    • GetCurrentProcess.KERNEL32(?,00BFFAEC,00000000,00000000,?), ref: 00B74BF8
                    • IsWow64Process.KERNEL32(00000000), ref: 00B74BFF
                    • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00B74C45
                    • FreeLibrary.KERNEL32(00000000), ref: 00B74C50
                    • GetSystemInfo.KERNEL32(00000000), ref: 00B74C81
                    • GetSystemInfo.KERNEL32(00000000), ref: 00B74C8D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                    • String ID:
                    • API String ID: 1986165174-0
                    • Opcode ID: c774cbfc346794d1cf8672d52210af611234c9ede355d95841fcaaf19d3cc276
                    • Instruction ID: c8428c726e6ff263161c9bafc52dcdfbd3d060d712f5065c427a42b6cc15c457
                    • Opcode Fuzzy Hash: c774cbfc346794d1cf8672d52210af611234c9ede355d95841fcaaf19d3cc276
                    • Instruction Fuzzy Hash: 2991A13154A7C0DAC732CB7884916AABFE4EF6A301B4489DED0DF93B41D720E948C729

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1063 b74fe9-b75001 CreateStreamOnHGlobal 1064 b75003-b7501a FindResourceExW 1063->1064 1065 b75021-b75026 1063->1065 1066 badd5c-badd6b LoadResource 1064->1066 1067 b75020 1064->1067 1066->1067 1068 badd71-badd7f SizeofResource 1066->1068 1067->1065 1068->1067 1069 badd85-badd90 LockResource 1068->1069 1069->1067 1070 badd96-badd9e 1069->1070 1071 badda2-baddb4 1070->1071 1071->1067
                    APIs
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00B74EEE,?,?,00000000,00000000), ref: 00B74FF9
                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00B74EEE,?,?,00000000,00000000), ref: 00B75010
                    • LoadResource.KERNEL32(?,00000000,?,?,00B74EEE,?,?,00000000,00000000,?,?,?,?,?,?,00B74F8F), ref: 00BADD60
                    • SizeofResource.KERNEL32(?,00000000,?,?,00B74EEE,?,?,00000000,00000000,?,?,?,?,?,?,00B74F8F), ref: 00BADD75
                    • LockResource.KERNEL32(00B74EEE,?,?,00B74EEE,?,?,00000000,00000000,?,?,?,?,?,?,00B74F8F,00000000), ref: 00BADD88
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                    • String ID: SCRIPT
                    • API String ID: 3051347437-3967369404
                    • Opcode ID: 8d3da45e92bbc66f188ff357f99fecde635e9569b24a23e6043aaec2e331e0b0
                    • Instruction ID: b2284abf8ed0126ac35d884dba024418e4d599cc554554324547346c60d61628
                    • Opcode Fuzzy Hash: 8d3da45e92bbc66f188ff357f99fecde635e9569b24a23e6043aaec2e331e0b0
                    • Instruction Fuzzy Hash: 13115A75200705AFD7318B65DC58F777BB9EFC9B51F2081A8F41A872A0DBA1E800C6A0
                    APIs
                    • GetFileAttributesW.KERNELBASE(?,00BAE7C1), ref: 00BD46A6
                    • FindFirstFileW.KERNELBASE(?,?), ref: 00BD46B7
                    • FindClose.KERNEL32(00000000), ref: 00BD46C7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FileFind$AttributesCloseFirst
                    • String ID:
                    • API String ID: 48322524-0
                    • Opcode ID: ab0d82c9810bad21268a7c6e75a92cc4583a11ea133861cfce98d36ac4d7d264
                    • Instruction ID: 8c232ee97a2ee470f710bdc087d4acef01dc36a390f51f931c3304b7589c1682
                    • Opcode Fuzzy Hash: ab0d82c9810bad21268a7c6e75a92cc4583a11ea133861cfce98d36ac4d7d264
                    • Instruction Fuzzy Hash: BDE0D8354104015B42106738EC4D4FAB79CDE06335F100796F936C32E0FBB09950D599
                    Strings
                    • Variable must be of type 'Object'., xrefs: 00BB428C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID: Variable must be of type 'Object'.
                    • API String ID: 0-109567571
                    • Opcode ID: 9e54d7e3bd82f08491438d6b37b50dd6bb1fc682530c9c1f2571f19e3a195b92
                    • Instruction ID: e0a5b35f0c1e0008a833bdbc97ea73fa2d1fe6b7ae1b5a7c96f88aaf35b9971b
                    • Opcode Fuzzy Hash: 9e54d7e3bd82f08491438d6b37b50dd6bb1fc682530c9c1f2571f19e3a195b92
                    • Instruction Fuzzy Hash: E4A23975A04205CFCB24CF58C480AAAB7F1FF58310F6485E9E92AAB352D775ED42CB91
                    APIs
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B80BBB
                    • timeGetTime.WINMM ref: 00B80E76
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B80FB3
                    • TranslateMessage.USER32(?), ref: 00B80FC7
                    • DispatchMessageW.USER32(?), ref: 00B80FD5
                    • Sleep.KERNEL32(0000000A), ref: 00B80FDF
                    • LockWindowUpdate.USER32(00000000,?,?), ref: 00B8105A
                    • DestroyWindow.USER32 ref: 00B81066
                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B81080
                    • Sleep.KERNEL32(0000000A,?,?), ref: 00BB52AD
                    • TranslateMessage.USER32(?), ref: 00BB608A
                    • DispatchMessageW.USER32(?), ref: 00BB6098
                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BB60AC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                    • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                    • API String ID: 4003667617-3242690629
                    • Opcode ID: 4edc4bd78c1ebf3fc52c9a68cda2dfdf682a1394eb858243013146e437a070db
                    • Instruction ID: 96bee1ad091feaa527c1643a6a29cde6181c77c2ae5fbcf3ca23313d7028521c
                    • Opcode Fuzzy Hash: 4edc4bd78c1ebf3fc52c9a68cda2dfdf682a1394eb858243013146e437a070db
                    • Instruction Fuzzy Hash: CDB26E706087419FD734EF24C884BBAB7E5FF84304F1489ADE59A972A1DBB1E845CB42

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00BD91E9: __time64.LIBCMT ref: 00BD91F3
                      • Part of subcall function 00B75045: _fseek.LIBCMT ref: 00B7505D
                    • __wsplitpath.LIBCMT ref: 00BD94BE
                      • Part of subcall function 00B9432E: __wsplitpath_helper.LIBCMT ref: 00B9436E
                    • _wcscpy.LIBCMT ref: 00BD94D1
                    • _wcscat.LIBCMT ref: 00BD94E4
                    • __wsplitpath.LIBCMT ref: 00BD9509
                    • _wcscat.LIBCMT ref: 00BD951F
                    • _wcscat.LIBCMT ref: 00BD9532
                      • Part of subcall function 00BD922F: _memmove.LIBCMT ref: 00BD9268
                      • Part of subcall function 00BD922F: _memmove.LIBCMT ref: 00BD9277
                    • _wcscmp.LIBCMT ref: 00BD9479
                      • Part of subcall function 00BD99BE: _wcscmp.LIBCMT ref: 00BD9AAE
                      • Part of subcall function 00BD99BE: _wcscmp.LIBCMT ref: 00BD9AC1
                    • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00BD96DC
                    • _wcsncpy.LIBCMT ref: 00BD974F
                    • DeleteFileW.KERNEL32(?,?), ref: 00BD9785
                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00BD979B
                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00BD97AC
                    • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00BD97BE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                    • String ID:
                    • API String ID: 1500180987-0
                    • Opcode ID: 0a3339d68f87225d4fa98f44cfc89991169788c5af2d0da60e53d61778ba0a43
                    • Instruction ID: 43339b59aedd188a888e6a1604ce1e876e47c282f4706299deaa99403ef71d06
                    • Opcode Fuzzy Hash: 0a3339d68f87225d4fa98f44cfc89991169788c5af2d0da60e53d61778ba0a43
                    • Instruction Fuzzy Hash: B9C109B1D00219AADF21DF95CC85AEEBBBDEF55310F0040EAF609E7251EB709A448F65

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 00B73074
                    • RegisterClassExW.USER32(00000030), ref: 00B7309E
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B730AF
                    • InitCommonControlsEx.COMCTL32(?), ref: 00B730CC
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B730DC
                    • LoadIconW.USER32(000000A9), ref: 00B730F2
                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B73101
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                    • API String ID: 2914291525-1005189915
                    • Opcode ID: 5e7e5f552bdb1f82e30123fd9a5f62d274c9dd3d927d35a7e4e28ba8563cd329
                    • Instruction ID: d72686edccd8f012a5eef1005b8274f5ac2cc3dbe92df7ef6aed959b16481d95
                    • Opcode Fuzzy Hash: 5e7e5f552bdb1f82e30123fd9a5f62d274c9dd3d927d35a7e4e28ba8563cd329
                    • Instruction Fuzzy Hash: 883125B191030AAFDB009FA4E888BEDBBF0FF08310F10852AE590E72A0D7B95585CF51

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 00B73074
                    • RegisterClassExW.USER32(00000030), ref: 00B7309E
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B730AF
                    • InitCommonControlsEx.COMCTL32(?), ref: 00B730CC
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B730DC
                    • LoadIconW.USER32(000000A9), ref: 00B730F2
                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B73101
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                    • API String ID: 2914291525-1005189915
                    • Opcode ID: 7c5982e57d301c371c96883a37d27651ef992bd49fe88c91015db2ca3860b033
                    • Instruction ID: fa604105aece6aa91da2df31893ace9f38038ed658cdcb218ac41541e9a6df12
                    • Opcode Fuzzy Hash: 7c5982e57d301c371c96883a37d27651ef992bd49fe88c91015db2ca3860b033
                    • Instruction Fuzzy Hash: AA21B7B1910219BFDB00DFA4E889BEDBBF4FB08700F00852AF610A72A0DBB14544CF95

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00B74864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00C362F8,?,00B737C0,?), ref: 00B74882
                      • Part of subcall function 00B9074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00B772C5), ref: 00B90771
                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00B77308
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00BAECF1
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00BAED32
                    • RegCloseKey.ADVAPI32(?), ref: 00BAED70
                    • _wcscat.LIBCMT ref: 00BAEDC9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                    • API String ID: 2673923337-2727554177
                    • Opcode ID: 7e8a7afbfea8d811fba8ede135cdefd8240597ae7092702fd2410cda538e0e3e
                    • Instruction ID: e21be5d5ee0ef26ab6439d6676f889cb13d536631f2af22982bf68fe9535c8a9
                    • Opcode Fuzzy Hash: 7e8a7afbfea8d811fba8ede135cdefd8240597ae7092702fd2410cda538e0e3e
                    • Instruction Fuzzy Hash: F5715CB14183059EC724EF25DC81AAFB7E8FF55740F404A6EF459C72A0EB719948CB61

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 00B73A62
                    • LoadCursorW.USER32(00000000,00007F00), ref: 00B73A71
                    • LoadIconW.USER32(00000063), ref: 00B73A88
                    • LoadIconW.USER32(000000A4), ref: 00B73A9A
                    • LoadIconW.USER32(000000A2), ref: 00B73AAC
                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00B73AD2
                    • RegisterClassExW.USER32(?), ref: 00B73B28
                      • Part of subcall function 00B73041: GetSysColorBrush.USER32(0000000F), ref: 00B73074
                      • Part of subcall function 00B73041: RegisterClassExW.USER32(00000030), ref: 00B7309E
                      • Part of subcall function 00B73041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B730AF
                      • Part of subcall function 00B73041: InitCommonControlsEx.COMCTL32(?), ref: 00B730CC
                      • Part of subcall function 00B73041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B730DC
                      • Part of subcall function 00B73041: LoadIconW.USER32(000000A9), ref: 00B730F2
                      • Part of subcall function 00B73041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B73101
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                    • String ID: #$0$AutoIt v3
                    • API String ID: 423443420-4155596026
                    • Opcode ID: 11e124d68794fe37d4541f7d7e37c0983673cd0b6ed5e582ebed7229d3df953c
                    • Instruction ID: 8e14fda5dc48d35b040d2cfe4bf17e81ce39627d22f716e102462d60fe6ede76
                    • Opcode Fuzzy Hash: 11e124d68794fe37d4541f7d7e37c0983673cd0b6ed5e582ebed7229d3df953c
                    • Instruction Fuzzy Hash: 61216D71D20308BFDB10AFA4EC49BAEBBF4FB08714F00816AE504A72A1C7B65954DF54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 767 b73633-b73681 769 b73683-b73686 767->769 770 b736e1-b736e3 767->770 772 b736e7 769->772 773 b73688-b7368f 769->773 770->769 771 b736e5 770->771 774 b736ca-b736d2 DefWindowProcW 771->774 775 bad31c-bad34a call b811d0 call b811f3 772->775 776 b736ed-b736f0 772->776 777 b73695-b7369a 773->777 778 b7375d-b73765 PostQuitMessage 773->778 779 b736d8-b736de 774->779 814 bad34f-bad356 775->814 781 b73715-b7373c SetTimer RegisterWindowMessageW 776->781 782 b736f2-b736f3 776->782 783 bad38f-bad3a3 call bd2a16 777->783 784 b736a0-b736a2 777->784 780 b73711-b73713 778->780 780->779 781->780 788 b7373e-b73749 CreatePopupMenu 781->788 786 bad2bf-bad2c2 782->786 787 b736f9-b7370c KillTimer call b744cb call b73114 782->787 783->780 809 bad3a9 783->809 789 b73767-b73776 call b74531 784->789 790 b736a8-b736ad 784->790 794 bad2f8-bad317 MoveWindow 786->794 795 bad2c4-bad2c6 786->795 787->780 788->780 789->780 797 b736b3-b736b8 790->797 798 bad374-bad37b 790->798 794->780 803 bad2c8-bad2cb 795->803 804 bad2e7-bad2f3 SetFocus 795->804 807 b736be-b736c4 797->807 808 b7374b-b7375b call b745df 797->808 798->774 806 bad381-bad38a call bc817e 798->806 803->807 810 bad2d1-bad2e2 call b811d0 803->810 804->780 806->774 807->774 807->814 808->780 809->774 810->780 814->774 815 bad35c-bad36f call b744cb call b743db 814->815 815->774
                    APIs
                    • DefWindowProcW.USER32(?,?,?,?), ref: 00B736D2
                    • KillTimer.USER32(?,00000001), ref: 00B736FC
                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B7371F
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B7372A
                    • CreatePopupMenu.USER32 ref: 00B7373E
                    • PostQuitMessage.USER32(00000000), ref: 00B7375F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                    • String ID: TaskbarCreated
                    • API String ID: 129472671-2362178303
                    • Opcode ID: 4d54c66dc408fbc874ebeaeeef3b227d69374733fb577a3bf3a48642473bc422
                    • Instruction ID: 1a735f8764361edbafe1a8038d1662c7a2609e1ed968b2c1f3a669b4862d39f4
                    • Opcode Fuzzy Hash: 4d54c66dc408fbc874ebeaeeef3b227d69374733fb577a3bf3a48642473bc422
                    • Instruction Fuzzy Hash: 8C4103F1218105BBDF146F28DC89B7E37D4EB44B00F1485A9F92A972E1CB61EE40E762

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                    • API String ID: 1825951767-3513169116
                    • Opcode ID: 62d5e956d283d89cccc777c5db94b5de64b2eb80a752032f5e388b1d1e3a6152
                    • Instruction ID: be6c7415076e1380aebb40f9e338580e05a7a2da950082847f933ec742bd44f4
                    • Opcode Fuzzy Hash: 62d5e956d283d89cccc777c5db94b5de64b2eb80a752032f5e388b1d1e3a6152
                    • Instruction Fuzzy Hash: CBA1607181421DAADF04EBA0CC95EEEB7F8FF14700F0084A9E42AB7191DF755A09CB61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 942 2572650-25726fe call 2570000 945 2572705-257272b call 2573560 CreateFileW 942->945 948 2572732-2572742 945->948 949 257272d 945->949 956 2572744 948->956 957 2572749-2572763 VirtualAlloc 948->957 950 257287d-2572881 949->950 951 25728c3-25728c6 950->951 952 2572883-2572887 950->952 958 25728c9-25728d0 951->958 954 2572893-2572897 952->954 955 2572889-257288c 952->955 961 25728a7-25728ab 954->961 962 2572899-25728a3 954->962 955->954 956->950 963 2572765 957->963 964 257276a-2572781 ReadFile 957->964 959 2572925-257293a 958->959 960 25728d2-25728dd 958->960 967 257293c-2572947 VirtualFree 959->967 968 257294a-2572952 959->968 965 25728e1-25728ed 960->965 966 25728df 960->966 969 25728ad-25728b7 961->969 970 25728bb 961->970 962->961 963->950 971 2572783 964->971 972 2572788-25727c8 VirtualAlloc 964->972 975 2572901-257290d 965->975 976 25728ef-25728ff 965->976 966->959 967->968 969->970 970->951 971->950 973 25727cf-25727ea call 25737b0 972->973 974 25727ca 972->974 982 25727f5-25727ff 973->982 974->950 979 257290f-2572918 975->979 980 257291a-2572920 975->980 978 2572923 976->978 978->958 979->978 980->978 983 2572832-2572846 call 25735c0 982->983 984 2572801-2572830 call 25737b0 982->984 990 257284a-257284e 983->990 991 2572848 983->991 984->982 992 2572850-2572854 FindCloseChangeNotification 990->992 993 257285a-257285e 990->993 991->950 992->993 994 2572860-257286b VirtualFree 993->994 995 257286e-2572877 993->995 994->995 995->945 995->950
                    APIs
                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 02572721
                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 02572947
                    Memory Dump Source
                    • Source File: 00000000.00000002.1361446928.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2570000_documentos.jbxd
                    Similarity
                    • API ID: CreateFileFreeVirtual
                    • String ID:
                    • API String ID: 204039940-0
                    • Opcode ID: 1376b1c019e97a58b345df4903236ecb5f0b8c205347a8d20aa61bd2a2b0f564
                    • Instruction ID: 26b69ae8f3405c0ad12fc831df05a81c1eeb1d8bbc3c402ce5b2d4668ee869ac
                    • Opcode Fuzzy Hash: 1376b1c019e97a58b345df4903236ecb5f0b8c205347a8d20aa61bd2a2b0f564
                    • Instruction Fuzzy Hash: 06A13774E40209EBDB14CFA4D994BEEBBB5FF48314F208559E901BB280D7759A81CF58

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1073 b739e7-b73a57 CreateWindowExW * 2 ShowWindow * 2
                    APIs
                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00B73A15
                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00B73A36
                    • ShowWindow.USER32(00000000,?,?), ref: 00B73A4A
                    • ShowWindow.USER32(00000000,?,?), ref: 00B73A53
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$CreateShow
                    • String ID: AutoIt v3$edit
                    • API String ID: 1584632944-3779509399
                    • Opcode ID: f438dfabff5f877fffb7a8f67fd9d44bb80138570a3f72a43c1c4cac3b8db21c
                    • Instruction ID: 6608aeb60dfe50029e24c32a9ed8a9f83ed95ed1a859443a6116d21d8a0a3ce5
                    • Opcode Fuzzy Hash: f438dfabff5f877fffb7a8f67fd9d44bb80138570a3f72a43c1c4cac3b8db21c
                    • Instruction Fuzzy Hash: 11F030716102947EEA301717AC08F3B6E7DDBC7F50B028029B900A3170C9B61810CA70

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1074 2572410-2572544 call 2570000 call 2572300 CreateFileW 1081 2572546 1074->1081 1082 257254b-257255b 1074->1082 1083 25725fb-2572600 1081->1083 1085 2572562-257257c VirtualAlloc 1082->1085 1086 257255d 1082->1086 1087 2572580-2572597 ReadFile 1085->1087 1088 257257e 1085->1088 1086->1083 1089 257259b-25725d5 call 2572340 call 2571300 1087->1089 1090 2572599 1087->1090 1088->1083 1095 25725d7-25725ec call 2572390 1089->1095 1096 25725f1-25725f9 ExitProcess 1089->1096 1090->1083 1095->1096 1096->1083
                    APIs
                      • Part of subcall function 02572300: Sleep.KERNELBASE(000001F4), ref: 02572311
                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0257253A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1361446928.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2570000_documentos.jbxd
                    Similarity
                    • API ID: CreateFileSleep
                    • String ID: RFS1UBL58JENL1LR
                    • API String ID: 2694422964-601717579
                    • Opcode ID: 96434494dea8c87d6c73474f70bac834afcf9837b41f9894bf3fa8e63dd5f3a0
                    • Instruction ID: 611f9bb95658fb9aa94c42a8895ee60a043552800ec7bb06a7723fa7046b373f
                    • Opcode Fuzzy Hash: 96434494dea8c87d6c73474f70bac834afcf9837b41f9894bf3fa8e63dd5f3a0
                    • Instruction Fuzzy Hash: 6F519070D44249EBEF11DBA4D864BEEBB79AF48300F004599E649BB2C0D7B90B44CB69

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1098 b7410d-b74123 1099 b74200-b74204 1098->1099 1100 b74129-b7413e call b77b76 1098->1100 1103 b74144-b74164 call b77d2c 1100->1103 1104 bad5dd-bad5ec LoadStringW 1100->1104 1107 bad5f7-bad60f call b77c8e call b77143 1103->1107 1108 b7416a-b7416e 1103->1108 1104->1107 1118 b7417e-b741fb call b93020 call b7463e call b92ffc Shell_NotifyIconW call b75a64 1107->1118 1119 bad615-bad633 call b77e0b call b77143 call b77e0b 1107->1119 1110 b74205-b7420e call b781a7 1108->1110 1111 b74174-b74179 call b77c8e 1108->1111 1110->1118 1111->1118 1118->1099 1119->1118
                    APIs
                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00BAD5EC
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                    • _memset.LIBCMT ref: 00B7418D
                    • _wcscpy.LIBCMT ref: 00B741E1
                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00B741F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                    • String ID: Line:
                    • API String ID: 3942752672-1585850449
                    • Opcode ID: 80ee57f48e4d62384033be907c4a4f06069cd0c54413a5f87ba3b099bb9e17d9
                    • Instruction ID: e2ad80755646cec138444bc5d50ac8b2a2381ce3ada215e10dfff74c86130791
                    • Opcode Fuzzy Hash: 80ee57f48e4d62384033be907c4a4f06069cd0c54413a5f87ba3b099bb9e17d9
                    • Instruction Fuzzy Hash: 1C31C471448314AAD721EB60DC45FEF77ECAF44300F10C5AAF5A9A21A1DF749648C792

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1133 b9564d-b95666 1134 b95668-b9566d 1133->1134 1135 b95683 1133->1135 1134->1135 1136 b9566f-b95671 1134->1136 1137 b95685-b9568b 1135->1137 1138 b9568c-b95691 1136->1138 1139 b95673-b95678 call b98d68 1136->1139 1141 b9569f-b956a3 1138->1141 1142 b95693-b9569d 1138->1142 1150 b9567e call b98ff6 1139->1150 1145 b956b3-b956b5 1141->1145 1146 b956a5-b956b0 call b93020 1141->1146 1142->1141 1144 b956c3-b956d2 1142->1144 1148 b956d9 1144->1148 1149 b956d4-b956d7 1144->1149 1145->1139 1147 b956b7-b956c1 1145->1147 1146->1145 1147->1139 1147->1144 1153 b956de-b956e3 1148->1153 1149->1153 1150->1135 1155 b956e9-b956f0 1153->1155 1156 b957cc-b957cf 1153->1156 1157 b95731-b95733 1155->1157 1158 b956f2-b956fa 1155->1158 1156->1137 1159 b9579d-b9579e call ba0df7 1157->1159 1160 b95735-b95737 1157->1160 1158->1157 1161 b956fc 1158->1161 1168 b957a3-b957a7 1159->1168 1163 b95739-b95741 1160->1163 1164 b9575b-b95766 1160->1164 1165 b957fa 1161->1165 1166 b95702-b95704 1161->1166 1169 b95751-b95755 1163->1169 1170 b95743-b9574f 1163->1170 1171 b95768 1164->1171 1172 b9576a-b9576d 1164->1172 1167 b957fe-b95807 1165->1167 1173 b9570b-b95710 1166->1173 1174 b95706-b95708 1166->1174 1167->1137 1168->1167 1175 b957a9-b957ae 1168->1175 1176 b95757-b95759 1169->1176 1170->1176 1171->1172 1177 b9576f-b9577b call b94916 call ba10ab 1172->1177 1178 b957d4-b957d8 1172->1178 1173->1178 1179 b95716-b9572f call ba0f18 1173->1179 1174->1173 1175->1178 1180 b957b0-b957c1 1175->1180 1176->1172 1194 b95780-b95785 1177->1194 1181 b957ea-b957f5 call b98d68 1178->1181 1182 b957da-b957e7 call b93020 1178->1182 1190 b95792-b9579b 1179->1190 1185 b957c4-b957c6 1180->1185 1181->1150 1182->1181 1185->1155 1185->1156 1190->1185 1195 b9578b-b9578e 1194->1195 1196 b9580c-b95810 1194->1196 1195->1165 1197 b95790 1195->1197 1196->1167 1197->1190
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                    • String ID:
                    • API String ID: 1559183368-0
                    • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                    • Instruction ID: b2ffdd76f2348556c38215a7331c07182ffb2aa7712f9c1f23a20553efac85db
                    • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                    • Instruction Fuzzy Hash: 2151BC30A40B05DBDF368FB9C8806AEB7E5EF41320F2486B9E825962D0D7749E518B50
                    APIs
                      • Part of subcall function 00B74F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00C362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00B74F6F
                    • _free.LIBCMT ref: 00BAE68C
                    • _free.LIBCMT ref: 00BAE6D3
                      • Part of subcall function 00B76BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00B76D0D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _free$CurrentDirectoryLibraryLoad
                    • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                    • API String ID: 2861923089-1757145024
                    • Opcode ID: ffcc756b367acdfe8994d1139ecd7e35b5600f54fccbd839eed7da234e6aeca6
                    • Instruction ID: d68730e3eacfc46545fcd3e8454fd961882baf7e4e9d002593c0e45ea63287ee
                    • Opcode Fuzzy Hash: ffcc756b367acdfe8994d1139ecd7e35b5600f54fccbd839eed7da234e6aeca6
                    • Instruction Fuzzy Hash: B7915E71914219AFCF14EFA8C8919EDB7F4FF19314F1484AAF825AB291EB30D905CB60
                    APIs
                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00B735A1,SwapMouseButtons,00000004,?), ref: 00B735D4
                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00B735A1,SwapMouseButtons,00000004,?,?,?,?,00B72754), ref: 00B735F5
                    • RegCloseKey.KERNELBASE(00000000,?,?,00B735A1,SwapMouseButtons,00000004,?,?,?,?,00B72754), ref: 00B73617
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CloseOpenQueryValue
                    • String ID: Control Panel\Mouse
                    • API String ID: 3677997916-824357125
                    • Opcode ID: 54b81b30fc33e1521434e9feaa883954d9f8f364a8e8c69c9478200ce70359c0
                    • Instruction ID: 9f57e591dd42993c5041404f923dd01fc0abc43673a525f4fea6443828a61554
                    • Opcode Fuzzy Hash: 54b81b30fc33e1521434e9feaa883954d9f8f364a8e8c69c9478200ce70359c0
                    • Instruction Fuzzy Hash: 39114871515218BFDB208F64DC80DBEB7F8EF04B40F1084A9E809D7210E671DF40A760
                    APIs
                    • CreateProcessW.KERNELBASE(?,00000000), ref: 02571B2D
                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 02571B51
                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02571B73
                    Memory Dump Source
                    • Source File: 00000000.00000002.1361446928.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2570000_documentos.jbxd
                    Similarity
                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                    • String ID:
                    • API String ID: 2438371351-0
                    • Opcode ID: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                    • Instruction ID: 788e734f1e9044fc5fe8857797b89d2112c7983b93434a4a9825791a7a55f5a1
                    • Opcode Fuzzy Hash: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                    • Instruction Fuzzy Hash: 23621830A54618DBEB24CFA4D840BDEB776FF58300F1091A9D50DEB290E77A9E81CB59
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                    • String ID:
                    • API String ID: 2782032738-0
                    • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                    • Instruction ID: 08bd19a599a8bf14fab837849a78691305aca8a2f71122dff40815853fe70adb
                    • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                    • Instruction Fuzzy Hash: AC41D370A006069FDF28CFA9C880DAF7BE6EF85360B2485FDE855C7650E7709D428B44
                    APIs
                    • _memset.LIBCMT ref: 00BAEE62
                    • GetOpenFileNameW.COMDLG32(?), ref: 00BAEEAC
                      • Part of subcall function 00B748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B748A1,?,?,00B737C0,?), ref: 00B748CE
                      • Part of subcall function 00B909D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B909F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Name$Path$FileFullLongOpen_memset
                    • String ID: X
                    • API String ID: 3777226403-3081909835
                    • Opcode ID: da34392e2d815dbbc7a44288899587aa27dc0b529108707557e007da1d187bc9
                    • Instruction ID: 46735300e74aaef92d0c4fbe764934a0cfd5fcd212748acbb1f493e209654d1d
                    • Opcode Fuzzy Hash: da34392e2d815dbbc7a44288899587aa27dc0b529108707557e007da1d187bc9
                    • Instruction Fuzzy Hash: 3321C370A142589BCF51DF98C845BEE7BF89F49300F00809AE418EB281DFB459898BA1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __fread_nolock_memmove
                    • String ID: EA06
                    • API String ID: 1988441806-3962188686
                    • Opcode ID: 76367b5ab9e7919c5d33386f1f272ca9b91bd4c909f8a2d45a365bd8bacc5a95
                    • Instruction ID: 165b6456a0bc13ac984ccc844139abc8f1e6b809e5d15e319bb1278c33d641d8
                    • Opcode Fuzzy Hash: 76367b5ab9e7919c5d33386f1f272ca9b91bd4c909f8a2d45a365bd8bacc5a95
                    • Instruction Fuzzy Hash: 6501F9718042186EDF29C7A8D856EEEBBFCDB01301F0085EBF552D2181E575E6048760
                    APIs
                    • GetTempPathW.KERNEL32(00000104,?), ref: 00BD9B82
                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00BD9B99
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Temp$FileNamePath
                    • String ID: aut
                    • API String ID: 3285503233-3010740371
                    • Opcode ID: de2527d57048be4aa6c835a8455e876ac34bd70a5f6163ed3e1d17adbd3e8b86
                    • Instruction ID: 83c4525d2493acf150ffb16b5b545a13aee04a6476e027e28b20979a7f6db15a
                    • Opcode Fuzzy Hash: de2527d57048be4aa6c835a8455e876ac34bd70a5f6163ed3e1d17adbd3e8b86
                    • Instruction Fuzzy Hash: 4AD05E7994030EABDB10AB94EC0EFBA772CEB04700F0042B1BE54D31A2DEB09598CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 42332673b5ed879b03d2343cbd503d9ab107d1d8ffcf2d331b5d5c9c8c5c5831
                    • Instruction ID: a19cef631e39721bf4cbc25a7cdbc414424dc7018d0ad43b1b082fd0f41ef08b
                    • Opcode Fuzzy Hash: 42332673b5ed879b03d2343cbd503d9ab107d1d8ffcf2d331b5d5c9c8c5c5831
                    • Instruction Fuzzy Hash: BDF15B706083419FC714DF29C484A6ABBE5FF88314F1489AEF8A99B352D771E945CF82
                    APIs
                      • Part of subcall function 00B903A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B903D3
                      • Part of subcall function 00B903A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00B903DB
                      • Part of subcall function 00B903A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B903E6
                      • Part of subcall function 00B903A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B903F1
                      • Part of subcall function 00B903A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00B903F9
                      • Part of subcall function 00B903A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00B90401
                      • Part of subcall function 00B86259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00B7FA90), ref: 00B862B4
                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00B7FB2D
                    • OleInitialize.OLE32(00000000), ref: 00B7FBAA
                    • CloseHandle.KERNEL32(00000000), ref: 00BB49F2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                    • String ID:
                    • API String ID: 1986988660-0
                    • Opcode ID: a784190442656864d7b38b4668a8f02e233e2973231c8ef373d332eef7197dac
                    • Instruction ID: 3671cc842e119a1767183db28d305d5ba37c3e553eace8857b92673e3ef22a8a
                    • Opcode Fuzzy Hash: a784190442656864d7b38b4668a8f02e233e2973231c8ef373d332eef7197dac
                    • Instruction Fuzzy Hash: B781A9B0D25240AECB84EF3AE945769BBE4FB9A308710C57AE559C7372EB318404CF64
                    APIs
                    • _memset.LIBCMT ref: 00B74401
                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B744A6
                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00B744C3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: IconNotifyShell_$_memset
                    • String ID:
                    • API String ID: 1505330794-0
                    • Opcode ID: eb9583fba27f9f0aeb862519d9b31fb4d672fcffda0795689144b8da3c932334
                    • Instruction ID: f302f0a8853ba95291a1d3d9eac8183bf0c061d42f37e479d12290cf1d63651c
                    • Opcode Fuzzy Hash: eb9583fba27f9f0aeb862519d9b31fb4d672fcffda0795689144b8da3c932334
                    • Instruction Fuzzy Hash: 1A318FB05043019FD720DF24D8847ABBBF8FB49309F00496EE5AE83351EB71A944CB92
                    APIs
                    • __FF_MSGBANNER.LIBCMT ref: 00B95963
                      • Part of subcall function 00B9A3AB: __NMSG_WRITE.LIBCMT ref: 00B9A3D2
                      • Part of subcall function 00B9A3AB: __NMSG_WRITE.LIBCMT ref: 00B9A3DC
                    • __NMSG_WRITE.LIBCMT ref: 00B9596A
                      • Part of subcall function 00B9A408: GetModuleFileNameW.KERNEL32(00000000,00C343BA,00000104,?,00000001,00000000), ref: 00B9A49A
                      • Part of subcall function 00B9A408: ___crtMessageBoxW.LIBCMT ref: 00B9A548
                      • Part of subcall function 00B932DF: ___crtCorExitProcess.LIBCMT ref: 00B932E5
                      • Part of subcall function 00B932DF: ExitProcess.KERNEL32 ref: 00B932EE
                      • Part of subcall function 00B98D68: __getptd_noexit.LIBCMT ref: 00B98D68
                    • RtlAllocateHeap.NTDLL(01680000,00000000,00000001,00000000,?,?,?,00B91013,?), ref: 00B9598F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                    • String ID:
                    • API String ID: 1372826849-0
                    • Opcode ID: 38994337c0d38ef4cbaae2a6647b69d8b5880d9da9dba267237647d2761b7cc2
                    • Instruction ID: 64e234f8e1dace81335322ef6d55e868e79ac738207ae430b5e28d72e4a9b1e7
                    • Opcode Fuzzy Hash: 38994337c0d38ef4cbaae2a6647b69d8b5880d9da9dba267237647d2761b7cc2
                    • Instruction Fuzzy Hash: A6019231281B15EEFE362B74D842B6E72C8DF52B75F1100BAF505AB281DE719D018765
                    APIs
                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00BD97D2,?,?,?,?,?,00000004), ref: 00BD9B45
                    • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00BD97D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00BD9B5B
                    • CloseHandle.KERNEL32(00000000,?,00BD97D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00BD9B62
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: File$CloseCreateHandleTime
                    • String ID:
                    • API String ID: 3397143404-0
                    • Opcode ID: 50c42cae40b7a79d77a78d898b7d6b6a75c527bb66d76a8433db70d2ae6ca08b
                    • Instruction ID: 84257dab28cde7783fd4457671da7623027e61d1e471279335ef2152402e25a3
                    • Opcode Fuzzy Hash: 50c42cae40b7a79d77a78d898b7d6b6a75c527bb66d76a8433db70d2ae6ca08b
                    • Instruction Fuzzy Hash: BAE08632180215B7D7211B54EC09FEE7B58EF05761F144121FB147B0E08BB12A21D798
                    APIs
                    • _free.LIBCMT ref: 00BD8FA5
                      • Part of subcall function 00B92F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00B99C64), ref: 00B92FA9
                      • Part of subcall function 00B92F95: GetLastError.KERNEL32(00000000,?,00B99C64), ref: 00B92FBB
                    • _free.LIBCMT ref: 00BD8FB6
                    • _free.LIBCMT ref: 00BD8FC8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                    • Instruction ID: f4bf7a8bdb9099e210c831cebdae4fd48d21bcebf0e9f62b6fef82e6d7bf5d2e
                    • Opcode Fuzzy Hash: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                    • Instruction Fuzzy Hash: D2E012A5A097016ACE24A778AD51B93A7EE9F48351B180CAEB409DB243EE24F8418128
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID: CALL
                    • API String ID: 0-4196123274
                    • Opcode ID: 9161a6552672c931da1ce0d32716f4cf7964c8573b425f52002c6ed66f834e68
                    • Instruction ID: 5ef280ec35681a73a8ccdad069dc6c911e08c9f79c5e8d2d15c66ba6081c144a
                    • Opcode Fuzzy Hash: 9161a6552672c931da1ce0d32716f4cf7964c8573b425f52002c6ed66f834e68
                    • Instruction Fuzzy Hash: 7D222770508241DFCB24DF14C494B6ABBE1FF85300F1589ADE8AA9B362D771ED85DB82
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: EA06
                    • API String ID: 4104443479-3962188686
                    • Opcode ID: 38455c161a85dca6f9bace681055a1854b1b0bb9774f6fe47921ab796d2ecc6a
                    • Instruction ID: a7665af3b2e07c5e96292bb56fc073bc3a1eddf91c2f01d4a695c716d51cafe7
                    • Opcode Fuzzy Hash: 38455c161a85dca6f9bace681055a1854b1b0bb9774f6fe47921ab796d2ecc6a
                    • Instruction Fuzzy Hash: 82419D31A045549BCF295B6488917BF7FE5EB06311F68C0F5F8AEAB282D7619D4083A1
                    APIs
                    • IsThemeActive.UXTHEME ref: 00B74992
                      • Part of subcall function 00B935AC: __lock.LIBCMT ref: 00B935B2
                      • Part of subcall function 00B935AC: DecodePointer.KERNEL32(00000001,?,00B749A7,00BC81BC), ref: 00B935BE
                      • Part of subcall function 00B935AC: EncodePointer.KERNEL32(?,?,00B749A7,00BC81BC), ref: 00B935C9
                      • Part of subcall function 00B74A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00B74A73
                      • Part of subcall function 00B74A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00B74A88
                      • Part of subcall function 00B73B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B73B7A
                      • Part of subcall function 00B73B4C: IsDebuggerPresent.KERNEL32 ref: 00B73B8C
                      • Part of subcall function 00B73B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00C362F8,00C362E0,?,?), ref: 00B73BFD
                      • Part of subcall function 00B73B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00B73C81
                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00B749D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                    • String ID:
                    • API String ID: 1438897964-0
                    • Opcode ID: 8c291372a3b784acc8d59b18484dd3a3fcfa52493d9fe482d880528861786ad2
                    • Instruction ID: 464a750fbc0a27e533d6f5116f8b4bf853e64089a60bd9b74e75f00e427cb561
                    • Opcode Fuzzy Hash: 8c291372a3b784acc8d59b18484dd3a3fcfa52493d9fe482d880528861786ad2
                    • Instruction Fuzzy Hash: 96116A71928311ABC700EF69D845A1EFBF8EB99710F01856EF459832B2DB719A44CB92
                    APIs
                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00B75981,?,?,?,?), ref: 00B75E27
                    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00B75981,?,?,?,?), ref: 00BAE19C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: 2e7f8601da971d28c2e9e5356ef0a6c43f70fc735ccbc4c9bdd8a448b9d09b8d
                    • Instruction ID: ed381ec051c71eef25465b4ee8e87ac3dc6f53ad30f263c8ea5b27c7062d5558
                    • Opcode Fuzzy Hash: 2e7f8601da971d28c2e9e5356ef0a6c43f70fc735ccbc4c9bdd8a448b9d09b8d
                    • Instruction Fuzzy Hash: 40014C70244609BEF7350E24CC8AF763ADCEB06768F10C369BAF96A1E0C6F45E558B50
                    APIs
                      • Part of subcall function 00B9594C: __FF_MSGBANNER.LIBCMT ref: 00B95963
                      • Part of subcall function 00B9594C: __NMSG_WRITE.LIBCMT ref: 00B9596A
                      • Part of subcall function 00B9594C: RtlAllocateHeap.NTDLL(01680000,00000000,00000001,00000000,?,?,?,00B91013,?), ref: 00B9598F
                    • std::exception::exception.LIBCMT ref: 00B9102C
                    • __CxxThrowException@8.LIBCMT ref: 00B91041
                      • Part of subcall function 00B987DB: RaiseException.KERNEL32(?,?,?,00C2BAF8,00000000,?,?,?,?,00B91046,?,00C2BAF8,?,00000001), ref: 00B98830
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                    • String ID:
                    • API String ID: 3902256705-0
                    • Opcode ID: ad9bf0a84601e2134e459d1b565f7f4038d03e32590efd3120611942f5f42aef
                    • Instruction ID: 0c919100103219723f6ae9196d205ee75fc6151c7feb6f8acf1920f7f64323e0
                    • Opcode Fuzzy Hash: ad9bf0a84601e2134e459d1b565f7f4038d03e32590efd3120611942f5f42aef
                    • Instruction Fuzzy Hash: 16F0C87550031EA6CF21BA98EC059DF7BECDF01350F2044B5F80496591DFB29E80E2E0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __lock_file_memset
                    • String ID:
                    • API String ID: 26237723-0
                    • Opcode ID: c77b87125cd8a0b754c7e8124994cbe8adc3be2fe468bb426a67fee72e024737
                    • Instruction ID: 14eff98fb0f7e03d835595090fe62a5e60d13bb4c684c8fb7e397b9b27e162cf
                    • Opcode Fuzzy Hash: c77b87125cd8a0b754c7e8124994cbe8adc3be2fe468bb426a67fee72e024737
                    • Instruction Fuzzy Hash: 48018471840A08EBCF23AF699C4559E7BE5AF41360F1442B5B8145A1A1DB318A21DB91
                    APIs
                      • Part of subcall function 00B98D68: __getptd_noexit.LIBCMT ref: 00B98D68
                    • __lock_file.LIBCMT ref: 00B9561B
                      • Part of subcall function 00B96E4E: __lock.LIBCMT ref: 00B96E71
                    • __fclose_nolock.LIBCMT ref: 00B95626
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                    • String ID:
                    • API String ID: 2800547568-0
                    • Opcode ID: 71644821823d11ac569d1a565a46f0e3856c478751b0076a16b4775eb9c2d418
                    • Instruction ID: 514f4da954ee9adfc0660e7acfc25c6705cd0a6dc396569a1440203460386701
                    • Opcode Fuzzy Hash: 71644821823d11ac569d1a565a46f0e3856c478751b0076a16b4775eb9c2d418
                    • Instruction Fuzzy Hash: F0F02431840A009ADF32BF35980276E7BE06F02334F6582F9E414AB0C1CF7C8A018B51
                    APIs
                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,00B7558F,?,?,?,?,?), ref: 00B781DA
                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,00B7558F,?,?,?,?,?), ref: 00B7820D
                      • Part of subcall function 00B778AD: _memmove.LIBCMT ref: 00B778E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$_memmove
                    • String ID:
                    • API String ID: 3033907384-0
                    • Opcode ID: 0d65d23a61d3e36965cf07da87bf059435e77d1c93c356ffb4f82e2feacc65db
                    • Instruction ID: f401c8c90b3026ea2a50ddd17257f86f6e66bc1f8445bb1c7136bdca7b4fd2bb
                    • Opcode Fuzzy Hash: 0d65d23a61d3e36965cf07da87bf059435e77d1c93c356ffb4f82e2feacc65db
                    • Instruction Fuzzy Hash: 8D01AD31245604BFEB246A25DD8AF7B3BACEF89760F10816AFD09DE191DE319900D671
                    APIs
                    • CreateProcessW.KERNELBASE(?,00000000), ref: 02571B2D
                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 02571B51
                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02571B73
                    Memory Dump Source
                    • Source File: 00000000.00000002.1361446928.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2570000_documentos.jbxd
                    Similarity
                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                    • String ID:
                    • API String ID: 2438371351-0
                    • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                    • Instruction ID: a50ff4384f0d1fb8bc250b0be92fe764b377797cbbdea732ae522ae438afeda0
                    • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                    • Instruction Fuzzy Hash: 1512CC24E24658C6EB24DF64D8507DEB232FF68300F1095E9910DEB7A4E77A4E81CF5A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2b72fd16306fc9afeeaa9bf8d3ba0de989aff065a5b26136ea56bd7fb3d1da58
                    • Instruction ID: 87b5456dccf3e78001b509e5629989046149d3babb419068b5e3494bb0cb4788
                    • Opcode Fuzzy Hash: 2b72fd16306fc9afeeaa9bf8d3ba0de989aff065a5b26136ea56bd7fb3d1da58
                    • Instruction Fuzzy Hash: 2A515B35600604AFCF14EB68C995EBE77E6EF85710F1480E8F95AAB392DA74ED00CB51
                    APIs
                    • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00B75CF6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: 9fcf78a9477e381026b880fa6b1e9efc2fc34f2f1762e4062b9672ffee92ca49
                    • Instruction ID: c45a4a2b58da58f67e4c3c6efa6192eb37cef3e87ce4f5a35a3d4792211ae7f4
                    • Opcode Fuzzy Hash: 9fcf78a9477e381026b880fa6b1e9efc2fc34f2f1762e4062b9672ffee92ca49
                    • Instruction Fuzzy Hash: E9311A71A00B19AFCB28DF69C484A6DB7F5FF48310F15C669E82993710D7B1AD60DB90
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ClearVariant
                    • String ID:
                    • API String ID: 1473721057-0
                    • Opcode ID: e8dda236ee311f04791f4cfde672744fd0962f0a0d1148bc6997506dd46ac481
                    • Instruction ID: bab6ed28b499e94937e36b286722673b109738916d6205e4a3787ff6eb241694
                    • Opcode Fuzzy Hash: e8dda236ee311f04791f4cfde672744fd0962f0a0d1148bc6997506dd46ac481
                    • Instruction Fuzzy Hash: E0410674508341CFDB24DF18C484B2ABBE0FF85318F1989ACE9995B762D772E845CB52
                    APIs
                      • Part of subcall function 00B74D13: FreeLibrary.KERNEL32(00000000,?), ref: 00B74D4D
                      • Part of subcall function 00B9548B: __wfsopen.LIBCMT ref: 00B95496
                    • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00C362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00B74F6F
                      • Part of subcall function 00B74CC8: FreeLibrary.KERNEL32(00000000), ref: 00B74D02
                      • Part of subcall function 00B74DD0: _memmove.LIBCMT ref: 00B74E1A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Library$Free$Load__wfsopen_memmove
                    • String ID:
                    • API String ID: 1396898556-0
                    • Opcode ID: 213b30e854f719ffa739700cf83ee5bbc33d5f63869bfe1bf10eacfd0b753864
                    • Instruction ID: 7c7fdfc9e4eb4d9370bf2105408d857b1576a510c029d1b768712222ec2a52a3
                    • Opcode Fuzzy Hash: 213b30e854f719ffa739700cf83ee5bbc33d5f63869bfe1bf10eacfd0b753864
                    • Instruction Fuzzy Hash: 2B11E731704209ABCF25EF70CC42BAE77E4DF41712F10C4A9F5AAAB2C1DB719A059B90
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ClearVariant
                    • String ID:
                    • API String ID: 1473721057-0
                    • Opcode ID: 15dab11fe65008649a00061344d67af30a224d49541030a42d0035dfda75f31a
                    • Instruction ID: c5aa6eab14ec8861223032e6dc134cad62bc10260fee0dc9c856ad1646626ea3
                    • Opcode Fuzzy Hash: 15dab11fe65008649a00061344d67af30a224d49541030a42d0035dfda75f31a
                    • Instruction Fuzzy Hash: 532113B4508341DFCB64DF24C484A2BBBE0FF88304F1489A8E9AA57761D732E849DB52
                    APIs
                    • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00B75807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00B75D76
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FileRead
                    • String ID:
                    • API String ID: 2738559852-0
                    • Opcode ID: 6396d40663ea86e1d876df924ff75437102670200ef16047be0703167ad3faeb
                    • Instruction ID: 997194ac4e08cce3f17680e878027ba6ede3e395ee661ac6471dbb7963fff528
                    • Opcode Fuzzy Hash: 6396d40663ea86e1d876df924ff75437102670200ef16047be0703167ad3faeb
                    • Instruction Fuzzy Hash: 21113331200B05AFD3308F55C888F62B7E9EF45760F10C96EE4AE8AA50DBB0F945CB60
                    APIs
                    • __lock_file.LIBCMT ref: 00B94AD6
                      • Part of subcall function 00B98D68: __getptd_noexit.LIBCMT ref: 00B98D68
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __getptd_noexit__lock_file
                    • String ID:
                    • API String ID: 2597487223-0
                    • Opcode ID: db9bc4e206cc35bbc919839ab380a5d69834275d6b39060bf0a7c3a24fe2e788
                    • Instruction ID: 42892dbc907eb131f846c29c0d90091a309e1b6ad2c6cca44591b10bbbb9a285
                    • Opcode Fuzzy Hash: db9bc4e206cc35bbc919839ab380a5d69834275d6b39060bf0a7c3a24fe2e788
                    • Instruction Fuzzy Hash: 04F0C231940209ABDF61AF74CC06BAF37E1AF01326F1885B4F424AA1E1CB788A52DF51
                    APIs
                    • FreeLibrary.KERNEL32(?,?,00C362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00B74FDE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FreeLibrary
                    • String ID:
                    • API String ID: 3664257935-0
                    • Opcode ID: 93b065b1524244a5916e8fdda46efdd4252ce5d947c99a93f6c8069efadda2ee
                    • Instruction ID: 3dc4ed53d51b494fc97b0117b7a8918415811ba3986f7a1ee2ccd89dd55bce93
                    • Opcode Fuzzy Hash: 93b065b1524244a5916e8fdda46efdd4252ce5d947c99a93f6c8069efadda2ee
                    • Instruction Fuzzy Hash: 9FF01571105712CFCB349F64E494922BBE1EF1432A321CABEE1EE8A610C771A840DF50
                    APIs
                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B909F4
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: LongNamePath_memmove
                    • String ID:
                    • API String ID: 2514874351-0
                    • Opcode ID: 8685ceff93bc9bf5b58acf9d0011875cb6176ed106a8ff0f225af44534973b50
                    • Instruction ID: ff79dcc51c229bc4000506b3c5a5c9a5138f0fcb3c8e627c370edda5c13b60f3
                    • Opcode Fuzzy Hash: 8685ceff93bc9bf5b58acf9d0011875cb6176ed106a8ff0f225af44534973b50
                    • Instruction Fuzzy Hash: 65E0CD7694422857C720D69C9C05FFA77EDDF89790F0441F5FC0CD7204DD609D818690
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __fread_nolock
                    • String ID:
                    • API String ID: 2638373210-0
                    • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                    • Instruction ID: 5155ae3f14d2e35c61ebfc092e7c24907d04a5d1faa6f1d83dcb5e9f9bfaa890
                    • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                    • Instruction Fuzzy Hash: 1DE092B0204B005FDB358A24D8507E3B7E0EB06315F00085DF29A93341EB6278418759
                    APIs
                    • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00BAE16B,?,?,00000000), ref: 00B75DBF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: 23e9540b4ebb456cddce534edd4e2c1d9dc1f5813d17b551d7c7eabe1b3a9200
                    • Instruction ID: 7932be663cf915a8333c16069d550d37e10a35774dd19d758ec0e5440820a8cd
                    • Opcode Fuzzy Hash: 23e9540b4ebb456cddce534edd4e2c1d9dc1f5813d17b551d7c7eabe1b3a9200
                    • Instruction Fuzzy Hash: 7BD09E74640208BFE610DB80DC46FA9777CDB05710F100194BD046729096B27E508695
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __wfsopen
                    • String ID:
                    • API String ID: 197181222-0
                    • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                    • Instruction ID: 3bd5e81cffec51855a93ad8b5c54982de394fcb84833749c231fa70a2802c80f
                    • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                    • Instruction Fuzzy Hash: 8EB0927688020C77DE522E82EC02A593B599B40678F808060FB0C18262A673A6A09689
                    APIs
                    • GetLastError.KERNEL32(00000002,00000000), ref: 00BDD46A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID:
                    • API String ID: 1452528299-0
                    • Opcode ID: 2a40532db20cb3a99460435d8052f457d50c8681e7d0e164e85d4ed62c8da343
                    • Instruction ID: fa042e179886a6152fee09bc0cb39286987cee58b635c2ed2766e7ee28b61020
                    • Opcode Fuzzy Hash: 2a40532db20cb3a99460435d8052f457d50c8681e7d0e164e85d4ed62c8da343
                    • Instruction Fuzzy Hash: AF7152306047028FC714EF24D4D1A6AB7E0EF88714F1449ADF59A9B3A2EB70ED49CB52
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                    • Instruction ID: 69c2e170ee7a6323ff436398c434cc410787eee2f3722dc1b3067fa43af4b4cb
                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                    • Instruction Fuzzy Hash: 3931A271A10505DFCB18EF58D480A69F7E6FF59300B648AE5E909CB652D731EEC1CB90
                    APIs
                    • Sleep.KERNELBASE(000001F4), ref: 02572311
                    Memory Dump Source
                    • Source File: 00000000.00000002.1361446928.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2570000_documentos.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                    • Instruction ID: bc2587b28a817e16f260d3ffbaec027f0420ef8dfedb0b19a4147505c9c01f12
                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                    • Instruction Fuzzy Hash: D5E0E67498010DDFDB00EFB4D54969E7FF4FF04301F100561FD05D2280D6309D508A62
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00BFCE50
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00BFCE91
                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00BFCED6
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00BFCF00
                    • SendMessageW.USER32 ref: 00BFCF29
                    • _wcsncpy.LIBCMT ref: 00BFCFA1
                    • GetKeyState.USER32(00000011), ref: 00BFCFC2
                    • GetKeyState.USER32(00000009), ref: 00BFCFCF
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00BFCFE5
                    • GetKeyState.USER32(00000010), ref: 00BFCFEF
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00BFD018
                    • SendMessageW.USER32 ref: 00BFD03F
                    • SendMessageW.USER32(?,00001030,?,00BFB602), ref: 00BFD145
                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00BFD15B
                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00BFD16E
                    • SetCapture.USER32(?), ref: 00BFD177
                    • ClientToScreen.USER32(?,?), ref: 00BFD1DC
                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00BFD1E9
                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00BFD203
                    • ReleaseCapture.USER32 ref: 00BFD20E
                    • GetCursorPos.USER32(?), ref: 00BFD248
                    • ScreenToClient.USER32(?,?), ref: 00BFD255
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00BFD2B1
                    • SendMessageW.USER32 ref: 00BFD2DF
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00BFD31C
                    • SendMessageW.USER32 ref: 00BFD34B
                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00BFD36C
                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00BFD37B
                    • GetCursorPos.USER32(?), ref: 00BFD39B
                    • ScreenToClient.USER32(?,?), ref: 00BFD3A8
                    • GetParent.USER32(?), ref: 00BFD3C8
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00BFD431
                    • SendMessageW.USER32 ref: 00BFD462
                    • ClientToScreen.USER32(?,?), ref: 00BFD4C0
                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00BFD4F0
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00BFD51A
                    • SendMessageW.USER32 ref: 00BFD53D
                    • ClientToScreen.USER32(?,?), ref: 00BFD58F
                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00BFD5C3
                      • Part of subcall function 00B725DB: GetWindowLongW.USER32(?,000000EB), ref: 00B725EC
                    • GetWindowLongW.USER32(?,000000F0), ref: 00BFD65F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                    • String ID: @GUI_DRAGID$F
                    • API String ID: 3977979337-4164748364
                    • Opcode ID: 5077d991e259ed30dfbf6021541c13ed2dd4f79e0495a1cc39c4f35fa0d0768c
                    • Instruction ID: d644b6a0bf879953feae1b14ca7ddf52674e50a6d4ee0064052e56dc6c88e54c
                    • Opcode Fuzzy Hash: 5077d991e259ed30dfbf6021541c13ed2dd4f79e0495a1cc39c4f35fa0d0768c
                    • Instruction Fuzzy Hash: F642AE74204249EFCB25CF28C984FBABFE5FF49314F144599F655872A1CB31A898CB92
                    APIs
                    • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00BF873F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: %d/%02d/%02d
                    • API String ID: 3850602802-328681919
                    • Opcode ID: aed2bc59d2b0ad64e5e441feb8930f195cf05eac15e40b0213bafbed81bf5421
                    • Instruction ID: f7b07ed0e2b4db4f29d6fb5f6aff20db9b180aba5550ce94c8470a48f63ccb26
                    • Opcode Fuzzy Hash: aed2bc59d2b0ad64e5e441feb8930f195cf05eac15e40b0213bafbed81bf5421
                    • Instruction Fuzzy Hash: 19129271500209ABEB259F28CC89FBE7BF4EF45710F2441A9F615EB2A1DF709945CB10
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memmove$_memset
                    • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                    • API String ID: 1357608183-1798697756
                    • Opcode ID: 0ee72723c6e64cf78d8b23da37eacfc617abfe08a2f05980260c187208f8e8a8
                    • Instruction ID: 97ac7381449ef373a62bcb425305ef3a2ecfeba165c6bd7ecfd6e12f0688f3ab
                    • Opcode Fuzzy Hash: 0ee72723c6e64cf78d8b23da37eacfc617abfe08a2f05980260c187208f8e8a8
                    • Instruction Fuzzy Hash: E693A171A00219DBDB24DF58C891BADB7F1FF48714F6481AEE945EB290EB709E81CB50
                    APIs
                    • GetForegroundWindow.USER32(00000000,?), ref: 00B74A3D
                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00BADA8E
                    • IsIconic.USER32(?), ref: 00BADA97
                    • ShowWindow.USER32(?,00000009), ref: 00BADAA4
                    • SetForegroundWindow.USER32(?), ref: 00BADAAE
                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00BADAC4
                    • GetCurrentThreadId.KERNEL32 ref: 00BADACB
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00BADAD7
                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00BADAE8
                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00BADAF0
                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 00BADAF8
                    • SetForegroundWindow.USER32(?), ref: 00BADAFB
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BADB10
                    • keybd_event.USER32(00000012,00000000), ref: 00BADB1B
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BADB25
                    • keybd_event.USER32(00000012,00000000), ref: 00BADB2A
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BADB33
                    • keybd_event.USER32(00000012,00000000), ref: 00BADB38
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BADB42
                    • keybd_event.USER32(00000012,00000000), ref: 00BADB47
                    • SetForegroundWindow.USER32(?), ref: 00BADB4A
                    • AttachThreadInput.USER32(?,?,00000000), ref: 00BADB71
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                    • String ID: Shell_TrayWnd
                    • API String ID: 4125248594-2988720461
                    • Opcode ID: 9e4f627eb3993e26c519758d20bfab1383daaf035ca1f00f629e583b3ec76f1c
                    • Instruction ID: 6351ea961c603b4e5e0fbbb3daed6a1c4f103b65ca7fa94647739eb9444478b3
                    • Opcode Fuzzy Hash: 9e4f627eb3993e26c519758d20bfab1383daaf035ca1f00f629e583b3ec76f1c
                    • Instruction Fuzzy Hash: FC317271A44319BBEB206FA19C89F7E7EACEF45B50F114065FA05EB1D0CAB05D00EBA4
                    APIs
                      • Part of subcall function 00BC8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BC8D0D
                      • Part of subcall function 00BC8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BC8D3A
                      • Part of subcall function 00BC8CC3: GetLastError.KERNEL32 ref: 00BC8D47
                    • _memset.LIBCMT ref: 00BC889B
                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00BC88ED
                    • CloseHandle.KERNEL32(?), ref: 00BC88FE
                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00BC8915
                    • GetProcessWindowStation.USER32 ref: 00BC892E
                    • SetProcessWindowStation.USER32(00000000), ref: 00BC8938
                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00BC8952
                      • Part of subcall function 00BC8713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00BC8851), ref: 00BC8728
                      • Part of subcall function 00BC8713: CloseHandle.KERNEL32(?,?,00BC8851), ref: 00BC873A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                    • String ID: $default$winsta0
                    • API String ID: 2063423040-1027155976
                    • Opcode ID: 219359bbdcc215015af3f453edbf3ef4bdc409a7579f56825086fa6b8267482b
                    • Instruction ID: 9f05a3d722a8b337d9ee09282116e4cfe982ae15715512079347ce3663fa9bea
                    • Opcode Fuzzy Hash: 219359bbdcc215015af3f453edbf3ef4bdc409a7579f56825086fa6b8267482b
                    • Instruction Fuzzy Hash: EF81F47190021AAFDF119FA4DC45EBEBBB8EF04344F1841AAF924A7261DF718E15DB60
                    APIs
                    • OpenClipboard.USER32(00BFF910), ref: 00BE4284
                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 00BE4292
                    • GetClipboardData.USER32(0000000D), ref: 00BE429A
                    • CloseClipboard.USER32 ref: 00BE42A6
                    • GlobalLock.KERNEL32(00000000), ref: 00BE42C2
                    • CloseClipboard.USER32 ref: 00BE42CC
                    • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00BE42E1
                    • IsClipboardFormatAvailable.USER32(00000001), ref: 00BE42EE
                    • GetClipboardData.USER32(00000001), ref: 00BE42F6
                    • GlobalLock.KERNEL32(00000000), ref: 00BE4303
                    • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00BE4337
                    • CloseClipboard.USER32 ref: 00BE4447
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                    • String ID:
                    • API String ID: 3222323430-0
                    • Opcode ID: 9934b96df74fdfb34e68b7a05d4b1718384a61c3929bca857685699c1697f909
                    • Instruction ID: 879c926d89b57246540a6007b4a1da4ff9b0c7b79864f25e12bb68d52b181452
                    • Opcode Fuzzy Hash: 9934b96df74fdfb34e68b7a05d4b1718384a61c3929bca857685699c1697f909
                    • Instruction Fuzzy Hash: 2C516831204242ABD311AB61EC96F7E77E8EF84B01F1045A9B69AD72A1DF70D904CB62
                    APIs
                    • FindFirstFileW.KERNEL32(?,?), ref: 00BDC9F8
                    • FindClose.KERNEL32(00000000), ref: 00BDCA4C
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00BDCA71
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00BDCA88
                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BDCAAF
                    • __swprintf.LIBCMT ref: 00BDCAFB
                    • __swprintf.LIBCMT ref: 00BDCB3E
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                    • __swprintf.LIBCMT ref: 00BDCB92
                      • Part of subcall function 00B938D8: __woutput_l.LIBCMT ref: 00B93931
                    • __swprintf.LIBCMT ref: 00BDCBE0
                      • Part of subcall function 00B938D8: __flsbuf.LIBCMT ref: 00B93953
                      • Part of subcall function 00B938D8: __flsbuf.LIBCMT ref: 00B9396B
                    • __swprintf.LIBCMT ref: 00BDCC2F
                    • __swprintf.LIBCMT ref: 00BDCC7E
                    • __swprintf.LIBCMT ref: 00BDCCCD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                    • API String ID: 3953360268-2428617273
                    • Opcode ID: 442e80c758b654643f95ecb3180427bcfd4c1e3335393ecc45f0519c06a86256
                    • Instruction ID: 59495fdcd5160d246c0172de602323f66f276f56d35119f4369898bbd721e5ad
                    • Opcode Fuzzy Hash: 442e80c758b654643f95ecb3180427bcfd4c1e3335393ecc45f0519c06a86256
                    • Instruction Fuzzy Hash: ADA13EB1508305ABC710EB64C9C5DAFB7ECFF94700F40496AF5AAD7191EA34DA09CB62
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 00BDF221
                    • _wcscmp.LIBCMT ref: 00BDF236
                    • _wcscmp.LIBCMT ref: 00BDF24D
                    • GetFileAttributesW.KERNEL32(?), ref: 00BDF25F
                    • SetFileAttributesW.KERNEL32(?,?), ref: 00BDF279
                    • FindNextFileW.KERNEL32(00000000,?), ref: 00BDF291
                    • FindClose.KERNEL32(00000000), ref: 00BDF29C
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00BDF2B8
                    • _wcscmp.LIBCMT ref: 00BDF2DF
                    • _wcscmp.LIBCMT ref: 00BDF2F6
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00BDF308
                    • SetCurrentDirectoryW.KERNEL32(00C2A5A0), ref: 00BDF326
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BDF330
                    • FindClose.KERNEL32(00000000), ref: 00BDF33D
                    • FindClose.KERNEL32(00000000), ref: 00BDF34F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                    • String ID: *.*
                    • API String ID: 1803514871-438819550
                    • Opcode ID: 1a52069ec1058db674c76addc55deee60c97d474f8cea0af37317fdada971784
                    • Instruction ID: e2405abd2e15e2277284e0dcd5525812a3cf5c44f50dc1d942a1b1931bd14246
                    • Opcode Fuzzy Hash: 1a52069ec1058db674c76addc55deee60c97d474f8cea0af37317fdada971784
                    • Instruction Fuzzy Hash: B931807650461B6BDB10DBA4EC89AFEB7ECDF08360F1441B6F815D32A0EB34DA45CA58
                    APIs
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BF0BDE
                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00BFF910,00000000,?,00000000,?,?), ref: 00BF0C4C
                    • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00BF0C94
                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00BF0D1D
                    • RegCloseKey.ADVAPI32(?), ref: 00BF103D
                    • RegCloseKey.ADVAPI32(00000000), ref: 00BF104A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Close$ConnectCreateRegistryValue
                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                    • API String ID: 536824911-966354055
                    • Opcode ID: 4a024ca7de0d47e546cecffdea8621fda6aa58d91e92d176b68287a2c13ceb21
                    • Instruction ID: 8082684287a96515bd1c0c650c9bb13cc519b7154457712b685e321ffced26bd
                    • Opcode Fuzzy Hash: 4a024ca7de0d47e546cecffdea8621fda6aa58d91e92d176b68287a2c13ceb21
                    • Instruction Fuzzy Hash: 75025F756006119FDB14EF24C895E2AB7E5FF88724F0488ADF99A9B362CB30ED45CB41
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 00BDF37E
                    • _wcscmp.LIBCMT ref: 00BDF393
                    • _wcscmp.LIBCMT ref: 00BDF3AA
                      • Part of subcall function 00BD45C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00BD45DC
                    • FindNextFileW.KERNEL32(00000000,?), ref: 00BDF3D9
                    • FindClose.KERNEL32(00000000), ref: 00BDF3E4
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00BDF400
                    • _wcscmp.LIBCMT ref: 00BDF427
                    • _wcscmp.LIBCMT ref: 00BDF43E
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00BDF450
                    • SetCurrentDirectoryW.KERNEL32(00C2A5A0), ref: 00BDF46E
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BDF478
                    • FindClose.KERNEL32(00000000), ref: 00BDF485
                    • FindClose.KERNEL32(00000000), ref: 00BDF497
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                    • String ID: *.*
                    • API String ID: 1824444939-438819550
                    • Opcode ID: 81455b22acf3f0fe76a0183f362b5327a1073371bddff375f8e0ab339003fd92
                    • Instruction ID: 6a0c13389c5744878eab3a1d13576b2dec4f10ffac3c4588baf5ee0e64688428
                    • Opcode Fuzzy Hash: 81455b22acf3f0fe76a0183f362b5327a1073371bddff375f8e0ab339003fd92
                    • Instruction Fuzzy Hash: D531B37550521B6BCF109BA4EC88AFFB7ECDF09324F1401B6E805A32A1EB34DE44CA54
                    APIs
                      • Part of subcall function 00BC874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BC8766
                      • Part of subcall function 00BC874A: GetLastError.KERNEL32(?,00BC822A,?,?,?), ref: 00BC8770
                      • Part of subcall function 00BC874A: GetProcessHeap.KERNEL32(00000008,?,?,00BC822A,?,?,?), ref: 00BC877F
                      • Part of subcall function 00BC874A: HeapAlloc.KERNEL32(00000000,?,00BC822A,?,?,?), ref: 00BC8786
                      • Part of subcall function 00BC874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BC879D
                      • Part of subcall function 00BC87E7: GetProcessHeap.KERNEL32(00000008,00BC8240,00000000,00000000,?,00BC8240,?), ref: 00BC87F3
                      • Part of subcall function 00BC87E7: HeapAlloc.KERNEL32(00000000,?,00BC8240,?), ref: 00BC87FA
                      • Part of subcall function 00BC87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00BC8240,?), ref: 00BC880B
                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00BC825B
                    • _memset.LIBCMT ref: 00BC8270
                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00BC828F
                    • GetLengthSid.ADVAPI32(?), ref: 00BC82A0
                    • GetAce.ADVAPI32(?,00000000,?), ref: 00BC82DD
                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00BC82F9
                    • GetLengthSid.ADVAPI32(?), ref: 00BC8316
                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00BC8325
                    • HeapAlloc.KERNEL32(00000000), ref: 00BC832C
                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00BC834D
                    • CopySid.ADVAPI32(00000000), ref: 00BC8354
                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00BC8385
                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00BC83AB
                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00BC83BF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                    • String ID:
                    • API String ID: 3996160137-0
                    • Opcode ID: d8955f75226c7b0f4271b0dcf75c90fa39f642b50b613fabb7ee22e17bc2a33e
                    • Instruction ID: d5f5447f26eb4ad6dddc5c51f51ef18b0ef0e0723d9aee3409d1cada0b8d10af
                    • Opcode Fuzzy Hash: d8955f75226c7b0f4271b0dcf75c90fa39f642b50b613fabb7ee22e17bc2a33e
                    • Instruction Fuzzy Hash: 80613D71A0010ABBDF109FA4DC84EBEBBB9FF44700F148269F915A7251DF319A05CB64
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                    • API String ID: 0-4052911093
                    • Opcode ID: c8b69c28da337d88a6b15b8ab3a90ea2812f76575b8e0e3566ae074bed764847
                    • Instruction ID: b280028a270942c0ea9dae1be509c4f146342c6f488a27d5e6bd1b1131e7cebc
                    • Opcode Fuzzy Hash: c8b69c28da337d88a6b15b8ab3a90ea2812f76575b8e0e3566ae074bed764847
                    • Instruction Fuzzy Hash: 77726F71E002199BDF14DF58C880BAEB7F5FF49310F1485AAE949EB291EB709D81CB90
                    APIs
                      • Part of subcall function 00BF10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BF0038,?,?), ref: 00BF10BC
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BF0737
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00BF07D6
                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00BF086E
                    • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00BF0AAD
                    • RegCloseKey.ADVAPI32(00000000), ref: 00BF0ABA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                    • String ID:
                    • API String ID: 1240663315-0
                    • Opcode ID: e86e4f912a0604f9c9ae3f700a7fe74be421681554f2e36ab3acffc508ef6716
                    • Instruction ID: 0dc72eac65a51e762b3381ea1f64a95a1b623012cdc05ab5a5b2e9721e47fbbc
                    • Opcode Fuzzy Hash: e86e4f912a0604f9c9ae3f700a7fe74be421681554f2e36ab3acffc508ef6716
                    • Instruction Fuzzy Hash: 02E15D31214315AFCB14EF28C885E3ABBE5EF89714B0489ADF55ADB262DB30ED05CB51
                    APIs
                    • GetKeyboardState.USER32(?), ref: 00BD0241
                    • GetAsyncKeyState.USER32(000000A0), ref: 00BD02C2
                    • GetKeyState.USER32(000000A0), ref: 00BD02DD
                    • GetAsyncKeyState.USER32(000000A1), ref: 00BD02F7
                    • GetKeyState.USER32(000000A1), ref: 00BD030C
                    • GetAsyncKeyState.USER32(00000011), ref: 00BD0324
                    • GetKeyState.USER32(00000011), ref: 00BD0336
                    • GetAsyncKeyState.USER32(00000012), ref: 00BD034E
                    • GetKeyState.USER32(00000012), ref: 00BD0360
                    • GetAsyncKeyState.USER32(0000005B), ref: 00BD0378
                    • GetKeyState.USER32(0000005B), ref: 00BD038A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: State$Async$Keyboard
                    • String ID:
                    • API String ID: 541375521-0
                    • Opcode ID: b0d14a23b45afc6f67d8a489308f6653766d3913791ffcef3c4d51a55d412d1a
                    • Instruction ID: 9579d16a9e84b4e76e61efb9df835e33e8bbd9cf535209bcb968bc14d93a3a5a
                    • Opcode Fuzzy Hash: b0d14a23b45afc6f67d8a489308f6653766d3913791ffcef3c4d51a55d412d1a
                    • Instruction Fuzzy Hash: 4D4174245257CA6AFB31AA6488083B5FAE0EF15350F4840DFD9C6477C2FA9499C8C7A6
                    APIs
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                    • CoInitialize.OLE32 ref: 00BE8718
                    • CoUninitialize.OLE32 ref: 00BE8723
                    • CoCreateInstance.OLE32(?,00000000,00000017,00C02BEC,?), ref: 00BE8783
                    • IIDFromString.OLE32(?,?), ref: 00BE87F6
                    • VariantInit.OLEAUT32(?), ref: 00BE8890
                    • VariantClear.OLEAUT32(?), ref: 00BE88F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                    • API String ID: 834269672-1287834457
                    • Opcode ID: 89fab290c24c3bc6a31de0511f9b714c30fa405352489d55692ef1b33cbcd832
                    • Instruction ID: 6bcf509d60180c2f6e91d4d73f5b6d2879ef18d5421fc000e0ff16998699b19a
                    • Opcode Fuzzy Hash: 89fab290c24c3bc6a31de0511f9b714c30fa405352489d55692ef1b33cbcd832
                    • Instruction Fuzzy Hash: 2B61CF70608B419FD710DF26D888B6BBBE8EF48714F10489DF9899B291DB70ED44CB92
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                    • String ID:
                    • API String ID: 1737998785-0
                    • Opcode ID: 6920fd1d6a45fb768f5156867a22c59793c658679e088c18af167e3aac85dd53
                    • Instruction ID: 67b2eb09e34242a8ac0d64ab682ead02154cb05f35c73e06c34fadedf57c636f
                    • Opcode Fuzzy Hash: 6920fd1d6a45fb768f5156867a22c59793c658679e088c18af167e3aac85dd53
                    • Instruction Fuzzy Hash: 01215A35301212AFDB10AF65EC49B7E77E8EF54721F1080AAF94ADB2A1CF74A900CB54
                    APIs
                      • Part of subcall function 00B748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B748A1,?,?,00B737C0,?), ref: 00B748CE
                      • Part of subcall function 00BD4CD3: GetFileAttributesW.KERNEL32(?,00BD3947), ref: 00BD4CD4
                    • FindFirstFileW.KERNEL32(?,?), ref: 00BD3ADF
                    • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00BD3B87
                    • MoveFileW.KERNEL32(?,?), ref: 00BD3B9A
                    • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00BD3BB7
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BD3BD9
                    • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00BD3BF5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                    • String ID: \*.*
                    • API String ID: 4002782344-1173974218
                    • Opcode ID: df874c9cbf1b3b219a1ccf5d1658bb5a566be463d7f49d85f4b72d33e25c7f6b
                    • Instruction ID: fc614816df57757d9d503f5282e3990964fa4dd69ee61eceaf342b751579b61f
                    • Opcode Fuzzy Hash: df874c9cbf1b3b219a1ccf5d1658bb5a566be463d7f49d85f4b72d33e25c7f6b
                    • Instruction Fuzzy Hash: 9E516E318051499ACB15EBA0CD929EDB7F8EF14300F6481EAE45677192EF316F09CBA1
                    APIs
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                    • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00BDF6AB
                    • Sleep.KERNEL32(0000000A), ref: 00BDF6DB
                    • _wcscmp.LIBCMT ref: 00BDF6EF
                    • _wcscmp.LIBCMT ref: 00BDF70A
                    • FindNextFileW.KERNEL32(?,?), ref: 00BDF7A8
                    • FindClose.KERNEL32(00000000), ref: 00BDF7BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                    • String ID: *.*
                    • API String ID: 713712311-438819550
                    • Opcode ID: 4dcef636be7fae46f24317cf024d3b475549d5b48df6665c4a165e2bf258c64e
                    • Instruction ID: 442a228dad289906e591799c96e7aed9af78b637ceb24e51cdc9743c2204b4f0
                    • Opcode Fuzzy Hash: 4dcef636be7fae46f24317cf024d3b475549d5b48df6665c4a165e2bf258c64e
                    • Instruction Fuzzy Hash: C0414E7590421A9BDF15DF64CC85AFEBBF4FF05310F1445A6E81AA72A1EB309E44CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                    • API String ID: 0-1546025612
                    • Opcode ID: 43220a1bee498146a647ac1b078f568eaee005e61e0d757eed28834687607097
                    • Instruction ID: e82909b93e213056fc57ff212e32f55dbef6d3d6e8fac3827c17ea67c7383078
                    • Opcode Fuzzy Hash: 43220a1bee498146a647ac1b078f568eaee005e61e0d757eed28834687607097
                    • Instruction Fuzzy Hash: 96A25974A0421ACBDF24EF58C9907FDB7F1EB54314F2481EAD85AA7290EB709E85CB50
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: 2a45a4db17833072ad8c9a2819804763f912b462eb0ac9b3c39930cc5ab5fb4c
                    • Instruction ID: 4f2d908974d747066ed9b28d02227dbb6d8eb007d381d24f845b28c9a1fd1590
                    • Opcode Fuzzy Hash: 2a45a4db17833072ad8c9a2819804763f912b462eb0ac9b3c39930cc5ab5fb4c
                    • Instruction Fuzzy Hash: CB127B70A00609DFDF24EFA4D985BAEB7F5FF48300F1085A9E416A7261EB36AD15CB50
                    APIs
                      • Part of subcall function 00BC8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BC8D0D
                      • Part of subcall function 00BC8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BC8D3A
                      • Part of subcall function 00BC8CC3: GetLastError.KERNEL32 ref: 00BC8D47
                    • ExitWindowsEx.USER32(?,00000000), ref: 00BD549B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                    • String ID: $@$SeShutdownPrivilege
                    • API String ID: 2234035333-194228
                    • Opcode ID: ed18970359197d389a20c9486a25c2445817a7851f50dc898ae9f065090066a1
                    • Instruction ID: 65a660dd40598ac4472a90ef5c9dba212e4ea65586992e2a04de3cf405ed1167
                    • Opcode Fuzzy Hash: ed18970359197d389a20c9486a25c2445817a7851f50dc898ae9f065090066a1
                    • Instruction Fuzzy Hash: E3012871654A121AF7385674DC8AFB6F2D8EF04352F2000A7FC0AD33D6F9500C808992
                    APIs
                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00BE65EF
                    • WSAGetLastError.WSOCK32(00000000), ref: 00BE65FE
                    • bind.WSOCK32(00000000,?,00000010), ref: 00BE661A
                    • listen.WSOCK32(00000000,00000005), ref: 00BE6629
                    • WSAGetLastError.WSOCK32(00000000), ref: 00BE6643
                    • closesocket.WSOCK32(00000000,00000000), ref: 00BE6657
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorLast$bindclosesocketlistensocket
                    • String ID:
                    • API String ID: 1279440585-0
                    • Opcode ID: 033560e0390b9b50440a240b1a9271fad321e66178273ee5b758d003e957d8d5
                    • Instruction ID: 432330339ce7dc679263133ea963b82c7966bf4e2535cc47812f3a719f5de4a9
                    • Opcode Fuzzy Hash: 033560e0390b9b50440a240b1a9271fad321e66178273ee5b758d003e957d8d5
                    • Instruction Fuzzy Hash: EB218D302002059FCB10AF24C889B7EB7F9EF44360F1481A9E96AA73D1CB70AD01CB51
                    APIs
                      • Part of subcall function 00B90FF6: std::exception::exception.LIBCMT ref: 00B9102C
                      • Part of subcall function 00B90FF6: __CxxThrowException@8.LIBCMT ref: 00B91041
                    • _memmove.LIBCMT ref: 00BC062F
                    • _memmove.LIBCMT ref: 00BC0744
                    • _memmove.LIBCMT ref: 00BC07EB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memmove$Exception@8Throwstd::exception::exception
                    • String ID:
                    • API String ID: 1300846289-0
                    • Opcode ID: fb313bc54b83b2cc0de7660fa2caaa6728fc66ddce8c6e55191a449dbecd1d64
                    • Instruction ID: 682a0f42dbc752c48174f946feb4152343e7f36c8ce4b24def30f7695fe9acb4
                    • Opcode Fuzzy Hash: fb313bc54b83b2cc0de7660fa2caaa6728fc66ddce8c6e55191a449dbecd1d64
                    • Instruction Fuzzy Hash: A2025D70A10209DBDF14EF64D981BAEBBF5EF44300F1480E9E80AEB255EB359E55CB91
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00B719FA
                    • GetSysColor.USER32(0000000F), ref: 00B71A4E
                    • SetBkColor.GDI32(?,00000000), ref: 00B71A61
                      • Part of subcall function 00B71290: DefDlgProcW.USER32(?,00000020,?), ref: 00B712D8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ColorProc$LongWindow
                    • String ID:
                    • API String ID: 3744519093-0
                    • Opcode ID: 973ecb24fb60bcea2bb9f769a16f8459ccb0e0a35cba73eb11846984f6b5e23c
                    • Instruction ID: df8245b767aa73a4842d1b631fe8af85dbb449a2d91900dd754e29c9dc007708
                    • Opcode Fuzzy Hash: 973ecb24fb60bcea2bb9f769a16f8459ccb0e0a35cba73eb11846984f6b5e23c
                    • Instruction Fuzzy Hash: 8CA15871109548BAD628AB2C8C84E7F39DDDB46351F14C9DAF53AD7193EE20CD42D2B2
                    APIs
                      • Part of subcall function 00BE80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00BE80CB
                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00BE6AB1
                    • WSAGetLastError.WSOCK32(00000000), ref: 00BE6ADA
                    • bind.WSOCK32(00000000,?,00000010), ref: 00BE6B13
                    • WSAGetLastError.WSOCK32(00000000), ref: 00BE6B20
                    • closesocket.WSOCK32(00000000,00000000), ref: 00BE6B34
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorLast$bindclosesocketinet_addrsocket
                    • String ID:
                    • API String ID: 99427753-0
                    • Opcode ID: d12e5860f03d1b0b1cdf6d83ebdfa9256a7fb52f51ed9bb8b795fadcc75a48fd
                    • Instruction ID: 9a1f3997c11192c9d257ae813cee673c6c80c5a2aed100a8f63ba6726f661e62
                    • Opcode Fuzzy Hash: d12e5860f03d1b0b1cdf6d83ebdfa9256a7fb52f51ed9bb8b795fadcc75a48fd
                    • Instruction Fuzzy Hash: AE417575640210AFEB10AF649C86F7E77E5DF44720F44C0A8F95AAB3D2DB709D008791
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                    • String ID:
                    • API String ID: 292994002-0
                    • Opcode ID: e94b2ca3d6e281c7883f3ae643422125123d161c4e3c332bf5da62dc5c12adf8
                    • Instruction ID: 291c225fb8a3171dbeb925d6a26df124acbf38d7747e21903a92f38532a15f27
                    • Opcode Fuzzy Hash: e94b2ca3d6e281c7883f3ae643422125123d161c4e3c332bf5da62dc5c12adf8
                    • Instruction Fuzzy Hash: EA1190317009157BEB211F26DC44B3ABBD8EF94721B458079EB2AD7241CB309901CAA4
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00BB1D88,?), ref: 00BEC312
                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00BEC324
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetSystemWow64DirectoryW$kernel32.dll
                    • API String ID: 2574300362-1816364905
                    • Opcode ID: 3b30c8110c3c96c82d68e303c74867f89b96a750de7e1c89b0776362f25a2dbf
                    • Instruction ID: a66bb303af8c751dc40ba768651504c1cb6cc5fbcee3d07277f778e31f8907d9
                    • Opcode Fuzzy Hash: 3b30c8110c3c96c82d68e303c74867f89b96a750de7e1c89b0776362f25a2dbf
                    • Instruction Fuzzy Hash: F1E01274610713CFDB344F2AD844BA67AE4EF09756B80C4B9E896D3660EB70D841CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __itow__swprintf
                    • String ID:
                    • API String ID: 674341424-0
                    • Opcode ID: 233b3c495028c50bcb8a9c0d15c5e02e7698ade7a9a9c23cfb3356daf41eaa78
                    • Instruction ID: f204d34eef1cca542db517468710d684bd1f7602a79b7d9e59d97cad3016825c
                    • Opcode Fuzzy Hash: 233b3c495028c50bcb8a9c0d15c5e02e7698ade7a9a9c23cfb3356daf41eaa78
                    • Instruction Fuzzy Hash: D6227E715083019FC724EF14C891BAFB7E4EF94B10F1489ADF59A972A1DB71EA04CB92
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00BEF151
                    • Process32FirstW.KERNEL32(00000000,?), ref: 00BEF15F
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                    • Process32NextW.KERNEL32(00000000,?), ref: 00BEF21F
                    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00BEF22E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                    • String ID:
                    • API String ID: 2576544623-0
                    • Opcode ID: a66ae3fe08ea4110651b4ab990ac84d01ec7ec004f78078c6e230454849a1bf1
                    • Instruction ID: 5b1cc2003848af1896301f2285ed205007f58d2ffba35e1ccaa2a61ed8e7ae96
                    • Opcode Fuzzy Hash: a66ae3fe08ea4110651b4ab990ac84d01ec7ec004f78078c6e230454849a1bf1
                    • Instruction Fuzzy Hash: 9D516F715043419FD310EF24DC85E6BB7E8EF94710F50886DF5AA97291EB70EA04CB92
                    APIs
                    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00BD40D1
                    • _memset.LIBCMT ref: 00BD40F2
                    • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00BD4144
                    • CloseHandle.KERNEL32(00000000), ref: 00BD414D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CloseControlCreateDeviceFileHandle_memset
                    • String ID:
                    • API String ID: 1157408455-0
                    • Opcode ID: d2e6991c947b2ce3b86df8e5fed445b5a8270a78fe203edcf23972d0779d46ad
                    • Instruction ID: 5d937c57e516450f2f35a596388d8e973cc745055f4c176557f1d6a0d24879fa
                    • Opcode Fuzzy Hash: d2e6991c947b2ce3b86df8e5fed445b5a8270a78fe203edcf23972d0779d46ad
                    • Instruction Fuzzy Hash: 5811AB759012287AD7305BA59C4DFBBBBBCEF44760F1041E6F908E7280D6744E80CBA4
                    APIs
                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00BCEB19
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: lstrlen
                    • String ID: ($|
                    • API String ID: 1659193697-1631851259
                    • Opcode ID: 289a5697764abba9466339a83f189e9d0d2a9aed4e009b94b84994fc9335e3ae
                    • Instruction ID: cd17425521621308bb54704567b1f82f460e2c10557bc6882d4dbba35dd45cab
                    • Opcode Fuzzy Hash: 289a5697764abba9466339a83f189e9d0d2a9aed4e009b94b84994fc9335e3ae
                    • Instruction Fuzzy Hash: C132F275A00605DFDB28CF19C481E6AB7F1FF48710B15C5AEE9AA9B2A1D770E941CB40
                    APIs
                    • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00BE26D5
                    • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00BE270C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Internet$AvailableDataFileQueryRead
                    • String ID:
                    • API String ID: 599397726-0
                    • Opcode ID: 72da3204279a402e04189552f9fcdd81ce05b9efd73fa9325f319917ce925972
                    • Instruction ID: 163ff438c2e1f0be7a8cc58d40f61eaacddb14604e411a68724b982ff8e6bb6e
                    • Opcode Fuzzy Hash: 72da3204279a402e04189552f9fcdd81ce05b9efd73fa9325f319917ce925972
                    • Instruction Fuzzy Hash: 9B41C171A00249BFEB209B96DCC5EBBB7FCEB40724F1041AAFA01A6140EB719E419760
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00BDB5AE
                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00BDB608
                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00BDB655
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorMode$DiskFreeSpace
                    • String ID:
                    • API String ID: 1682464887-0
                    • Opcode ID: 8da3f10f069d72cba9d5ee2410f78b2edb2e979c7cb534ff5bf6f9faf73574f7
                    • Instruction ID: f01d83d1fc4217638792ddd4ddb6d0e5b4cf5ae59ad2b181aafaf2ecbbe39163
                    • Opcode Fuzzy Hash: 8da3f10f069d72cba9d5ee2410f78b2edb2e979c7cb534ff5bf6f9faf73574f7
                    • Instruction Fuzzy Hash: 12213C35A00518EFCB00EFA5D884EADFBF8FF88310F1580AAE945AB351DB31A955CB51
                    APIs
                      • Part of subcall function 00B90FF6: std::exception::exception.LIBCMT ref: 00B9102C
                      • Part of subcall function 00B90FF6: __CxxThrowException@8.LIBCMT ref: 00B91041
                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00BC8D0D
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00BC8D3A
                    • GetLastError.KERNEL32 ref: 00BC8D47
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                    • String ID:
                    • API String ID: 1922334811-0
                    • Opcode ID: 878ff76f55489e1f5597a1aededa65098440e33f8041aee69986bf691c23d342
                    • Instruction ID: 0cc66a6562d94fd513b56f4c227fdcd967dcd4670ee22d3102f1d2e0cd7d9fe8
                    • Opcode Fuzzy Hash: 878ff76f55489e1f5597a1aededa65098440e33f8041aee69986bf691c23d342
                    • Instruction Fuzzy Hash: F8118CB1814209AFE728AF68DC85E7BB7F8EF44711B20856EF45697241EF30AC40CB64
                    APIs
                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00BD4C2C
                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00BD4C43
                    • FreeSid.ADVAPI32(?), ref: 00BD4C53
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AllocateCheckFreeInitializeMembershipToken
                    • String ID:
                    • API String ID: 3429775523-0
                    • Opcode ID: 659b60932cf3c1b067b246ce74c6b64ef749da7b569b60b4a431b94cfefcba50
                    • Instruction ID: 8bda4e1663cdde1e994b7c295d6e90ccbb77448b8212819e6798befa104c8a0a
                    • Opcode Fuzzy Hash: 659b60932cf3c1b067b246ce74c6b64ef749da7b569b60b4a431b94cfefcba50
                    • Instruction Fuzzy Hash: 72F0E775A51209BBDB04DFF49D89ABEBBB8EF08211F5044A9A901E3281EA756A448B50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e490386abd21fdfc0fe0726ae7ebcb1783659ec33ea9d07384b9429c542011fb
                    • Instruction ID: ef49d8beb9b3e6296f018b1baebc6f2a54a17b10e19035171b3df2c3c42be40c
                    • Opcode Fuzzy Hash: e490386abd21fdfc0fe0726ae7ebcb1783659ec33ea9d07384b9429c542011fb
                    • Instruction Fuzzy Hash: 7F226A70A002169FDB24DF58C481AAEB7F1FF08304F14C5E9E86AAB351E775E985CB91
                    APIs
                    • FindFirstFileW.KERNEL32(?,?), ref: 00BDC966
                    • FindClose.KERNEL32(00000000), ref: 00BDC996
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID:
                    • API String ID: 2295610775-0
                    • Opcode ID: a377838086e6c1b6fe4a9a7d7f9626508af4468eada332d45616ccfe61453684
                    • Instruction ID: b80d2cc6016f1300bef625f35d3d5daedcc2e9f9420e1e609cf46b2cced84672
                    • Opcode Fuzzy Hash: a377838086e6c1b6fe4a9a7d7f9626508af4468eada332d45616ccfe61453684
                    • Instruction Fuzzy Hash: FE115E726106019FDB10EF29D885A2AF7E9EF84324F00856EF9A9D7391DB34AD05CB81
                    APIs
                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00BE977D,?,00BFFB84,?), ref: 00BDA302
                    • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00BE977D,?,00BFFB84,?), ref: 00BDA314
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorFormatLastMessage
                    • String ID:
                    • API String ID: 3479602957-0
                    • Opcode ID: 8d0996221f1d2b0910f14a4d898d5da7b8e062c7f44bc6a2df4eb9bf09633d16
                    • Instruction ID: 36c2227d144ea9d565e586952e7173bf6d526e958b8ec65016e93a21ea333894
                    • Opcode Fuzzy Hash: 8d0996221f1d2b0910f14a4d898d5da7b8e062c7f44bc6a2df4eb9bf09633d16
                    • Instruction Fuzzy Hash: D5F0823554422DABDB109FA4CC48FFA77ADFF09761F0081A6F918D7281DA309940CBA5
                    APIs
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00BC8851), ref: 00BC8728
                    • CloseHandle.KERNEL32(?,?,00BC8851), ref: 00BC873A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AdjustCloseHandlePrivilegesToken
                    • String ID:
                    • API String ID: 81990902-0
                    • Opcode ID: 82868d7d665cb619cad8fb3e9f1492d2861470cf66973cb12e2687ca55847601
                    • Instruction ID: c1494745be6e084dbe29fe99885833a1e81a40a099bbaa3ded7ced9a989430b6
                    • Opcode Fuzzy Hash: 82868d7d665cb619cad8fb3e9f1492d2861470cf66973cb12e2687ca55847601
                    • Instruction Fuzzy Hash: 55E0EC76010612EFEB252B64EC09E777BE9EF04390724897DF4A681470DF63AC90EB14
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00B98F97,?,?,?,00000001), ref: 00B9A39A
                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00B9A3A3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: f87e8734cdc4bd11876372194ec5e72dd6901e518857498606abaeac53727348
                    • Instruction ID: 6f2b761776f85585b8e34f9074d1f4d56b09e15ce108d470850fb943d4955915
                    • Opcode Fuzzy Hash: f87e8734cdc4bd11876372194ec5e72dd6901e518857498606abaeac53727348
                    • Instruction Fuzzy Hash: 85B0923105420AABCA102B91EC09BB83F6AEF44BA2F404020F60D87060CF625450CA99
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0aa53e91cb3b788534bd0fd4df8cf79d6716d121d2c52753a8db71f105672562
                    • Instruction ID: 16ad141f41131ab7507ea82b9c06c35f34d0a19d98c656ffce71edb06849eff2
                    • Opcode Fuzzy Hash: 0aa53e91cb3b788534bd0fd4df8cf79d6716d121d2c52753a8db71f105672562
                    • Instruction Fuzzy Hash: 99322621D69F024EDB279634D87233AA298EFB73D4F15D737E819B59A6EB28D4834100
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: effe33fbb5d566abbe23e63253e634498b1ed532236b60a77231ac3f21c2a923
                    • Instruction ID: 08254e424ee849f6f6538ffeb31022a34e44749361bba0e4c0686c2427af9df0
                    • Opcode Fuzzy Hash: effe33fbb5d566abbe23e63253e634498b1ed532236b60a77231ac3f21c2a923
                    • Instruction Fuzzy Hash: F5B11220D2AF414DD7239639883133ABB9CAFBB6D5F52D71BFC2670D62EB2185838141
                    APIs
                    • __time64.LIBCMT ref: 00BD8B25
                      • Part of subcall function 00B9543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00BD91F8,00000000,?,?,?,?,00BD93A9,00000000,?), ref: 00B95443
                      • Part of subcall function 00B9543A: __aulldiv.LIBCMT ref: 00B95463
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Time$FileSystem__aulldiv__time64
                    • String ID:
                    • API String ID: 2893107130-0
                    • Opcode ID: 9d21c6d72d69c71ed0f32c0cb61004c735826199ff643a4776a2f7ca48b64247
                    • Instruction ID: 2d3f2bada73859156935410792c1e4e84079381e9a7afa1298d013a8051de15f
                    • Opcode Fuzzy Hash: 9d21c6d72d69c71ed0f32c0cb61004c735826199ff643a4776a2f7ca48b64247
                    • Instruction Fuzzy Hash: CA21E4B26356108FC729CF29D841B52F3E1EBA4311B288F6DD0E9CB2D0DA35B905CB94
                    APIs
                    • BlockInput.USER32(00000001), ref: 00BE4218
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BlockInput
                    • String ID:
                    • API String ID: 3456056419-0
                    • Opcode ID: 3eaed9692d1b5794b806c2a0731246046bffd4860eef343b6fc0049a0fd45217
                    • Instruction ID: d673b1c51f04bcf4061b13ed1121bd03ace21887946ff4863192c59f6cebfbe6
                    • Opcode Fuzzy Hash: 3eaed9692d1b5794b806c2a0731246046bffd4860eef343b6fc0049a0fd45217
                    • Instruction Fuzzy Hash: B3E04F31250214AFC710EF6AD844A9AF7E8EF95760F00C0A6FD49C7352DB70E841CBA0
                    APIs
                    • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00BD4F18
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: mouse_event
                    • String ID:
                    • API String ID: 2434400541-0
                    • Opcode ID: c87dd8947c1a43cee6fc574833b771bd37cc08a3418d3c8b5c905cb4c4a8f060
                    • Instruction ID: 9725381c888caa002a37a3a2c8b5d3c9dd829222c9735d1b56b0569d106c1a00
                    • Opcode Fuzzy Hash: c87dd8947c1a43cee6fc574833b771bd37cc08a3418d3c8b5c905cb4c4a8f060
                    • Instruction Fuzzy Hash: D3D05EB01642053BFC284B20AC0FF768288E341781F8449DB32098A6E1BAF16800E134
                    APIs
                    • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00BC88D1), ref: 00BC8CB3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: LogonUser
                    • String ID:
                    • API String ID: 1244722697-0
                    • Opcode ID: d020bf299aef92e6a7fd0f31207b4dcae580bc76b5d25f3e51e13e571350418c
                    • Instruction ID: 89e6904db034e8b6c3820f980e298ff4ce1db0233cf47e60b6b1b761ec75cd60
                    • Opcode Fuzzy Hash: d020bf299aef92e6a7fd0f31207b4dcae580bc76b5d25f3e51e13e571350418c
                    • Instruction Fuzzy Hash: 49D05E3226050EABEF018EA4DC01EBE3B69EB04B01F408111FE15C60A1CB75D835EB60
                    APIs
                    • GetUserNameW.ADVAPI32(?,?), ref: 00BB2242
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: 7ebf1bf4afc0ef99bd9d93b2d01a367c06d28fb30fca654b28d2de134dcb685c
                    • Instruction ID: 718d843c65873b7c3170defeb730fd407355b92fe104b1f3e6b935189179ed41
                    • Opcode Fuzzy Hash: 7ebf1bf4afc0ef99bd9d93b2d01a367c06d28fb30fca654b28d2de134dcb685c
                    • Instruction Fuzzy Hash: DBC04CF1811109DBDB15DFA0D998DFE77BCAB04304F104495A101F3100DB749B44CE71
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00B9A36A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 5b492e3397b9aecd1c0f20fcf0f74625be28d6a2d553b074497f2c42d151d408
                    • Instruction ID: ce165f166f6b94d76cdc1b8621444e7dbfc4918925e3fd15f4e81ee349de80e7
                    • Opcode Fuzzy Hash: 5b492e3397b9aecd1c0f20fcf0f74625be28d6a2d553b074497f2c42d151d408
                    • Instruction Fuzzy Hash: C7A0123000010DA78A001B41EC044647F6DDA002907004020F40C420218B3254108584
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1366949eca1012ef3e4e202fec7b2eabe04f52ac609ee07a155765688d8a1fc6
                    • Instruction ID: c3cbe34d64a19e646d8bcd479aeeea14252be5b64d2a78edd8ced5cd97d7fa8b
                    • Opcode Fuzzy Hash: 1366949eca1012ef3e4e202fec7b2eabe04f52ac609ee07a155765688d8a1fc6
                    • Instruction Fuzzy Hash: CF220530505616CBDF38AB29C4D4B7D77E2EB41340FA885EAD8429B6A5DB34ADC1CF60
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                    • Instruction ID: 6ac0bfccd917a5225dad9c9c0e973141d7539e69c5afda9b07ed43b75e8b10cc
                    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                    • Instruction Fuzzy Hash: 95C1733260519309DF2D473D947413EBAE19EA27B131A0BFDE4B2DB5D5EF20D524E620
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                    • Instruction ID: 54a640ddc237df2d37f51ed2df6292e8ba9cbb7907ad2d3367e5dc235245526e
                    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                    • Instruction Fuzzy Hash: 6DC1833260519309DF6D473E947413EBBE19AA27B131A0BFDE4B2DB5D4EF20D524A620
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                    • Instruction ID: ab0c4c2cae5d02786d177586c8ae41eeac7564e821bdfdcf515f736b8b8d8faa
                    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                    • Instruction Fuzzy Hash: 49C1513620519309DF2D463D947413EBAE1DAA27B171A0FFDE4B2DB5D4EF20D524B620
                    Memory Dump Source
                    • Source File: 00000000.00000002.1361446928.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2570000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                    • Instruction ID: c7292479e3ff1ebb8946d47c3526be325af27dfc1bf4557c61a09bc555fd8171
                    • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                    • Instruction Fuzzy Hash: 1E41B3B1D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1361446928.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2570000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                    • Instruction ID: f7b44b8a3059de0956b586711457c11cbd14d212fe9aaebdf0d2d16c0c9f5248
                    • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                    • Instruction Fuzzy Hash: 76018078A10109EFCB44DF98D5909AEFBB5FB88320F608699D809A7701D730AE41DB84
                    Memory Dump Source
                    • Source File: 00000000.00000002.1361446928.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2570000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                    • Instruction ID: b8c193dae34e0c994ada97e723d74f21d59f79306204a68c3e7bc3da183db416
                    • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                    • Instruction Fuzzy Hash: 73019674A04109EFCB44DF98D5909ADF7B5FB48310F2085D9D819A7701D730AE41DB84
                    Memory Dump Source
                    • Source File: 00000000.00000002.1361446928.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2570000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                    • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                    • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                    • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                    APIs
                    • DeleteObject.GDI32(00000000), ref: 00BE7B70
                    • DeleteObject.GDI32(00000000), ref: 00BE7B82
                    • DestroyWindow.USER32 ref: 00BE7B90
                    • GetDesktopWindow.USER32 ref: 00BE7BAA
                    • GetWindowRect.USER32(00000000), ref: 00BE7BB1
                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00BE7CF2
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00BE7D02
                    • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7D4A
                    • GetClientRect.USER32(00000000,?), ref: 00BE7D56
                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00BE7D90
                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7DB2
                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7DC5
                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7DD0
                    • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7DD9
                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7DE8
                    • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7DF1
                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7DF8
                    • GlobalFree.KERNEL32(00000000), ref: 00BE7E03
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7E15
                    • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00C02CAC,00000000), ref: 00BE7E2B
                    • GlobalFree.KERNEL32(00000000), ref: 00BE7E3B
                    • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00BE7E61
                    • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00BE7E80
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE7EA2
                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BE808F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                    • String ID: $AutoIt v3$DISPLAY$static
                    • API String ID: 2211948467-2373415609
                    • Opcode ID: f858375fcdf83a8b57b6cd926c135da76f6f2fe7066be8886b29b419cd54f0d6
                    • Instruction ID: 784f03deb34a31fbba4bfae6e2a913cc60c9cecca38215700bfe2d8d0414be03
                    • Opcode Fuzzy Hash: f858375fcdf83a8b57b6cd926c135da76f6f2fe7066be8886b29b419cd54f0d6
                    • Instruction Fuzzy Hash: E0024971900159AFDB14DFA5DC89EBE7BF9EF48310F148598F919AB2A1CB70AD01CB60
                    APIs
                    • CharUpperBuffW.USER32(?,?,00BFF910), ref: 00BF38AF
                    • IsWindowVisible.USER32(?), ref: 00BF38D3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BuffCharUpperVisibleWindow
                    • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                    • API String ID: 4105515805-45149045
                    • Opcode ID: 844a321d530abc83da7221d35fae35402c1d4c27c29ea33a846f542813d8b3da
                    • Instruction ID: 1d2edd74eb1be80df4a7b767d416661f93ea3a8c1c0908199c0351d5ad5708ad
                    • Opcode Fuzzy Hash: 844a321d530abc83da7221d35fae35402c1d4c27c29ea33a846f542813d8b3da
                    • Instruction Fuzzy Hash: C4D16C302043199BCB14EF24C491A7ABBE5EF94754F1484ECF9865B7A2CB31EE4ACB41
                    APIs
                    • SetTextColor.GDI32(?,00000000), ref: 00BFA89F
                    • GetSysColorBrush.USER32(0000000F), ref: 00BFA8D0
                    • GetSysColor.USER32(0000000F), ref: 00BFA8DC
                    • SetBkColor.GDI32(?,000000FF), ref: 00BFA8F6
                    • SelectObject.GDI32(?,?), ref: 00BFA905
                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00BFA930
                    • GetSysColor.USER32(00000010), ref: 00BFA938
                    • CreateSolidBrush.GDI32(00000000), ref: 00BFA93F
                    • FrameRect.USER32(?,?,00000000), ref: 00BFA94E
                    • DeleteObject.GDI32(00000000), ref: 00BFA955
                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00BFA9A0
                    • FillRect.USER32(?,?,?), ref: 00BFA9D2
                    • GetWindowLongW.USER32(?,000000F0), ref: 00BFA9FD
                      • Part of subcall function 00BFAB60: GetSysColor.USER32(00000012), ref: 00BFAB99
                      • Part of subcall function 00BFAB60: SetTextColor.GDI32(?,?), ref: 00BFAB9D
                      • Part of subcall function 00BFAB60: GetSysColorBrush.USER32(0000000F), ref: 00BFABB3
                      • Part of subcall function 00BFAB60: GetSysColor.USER32(0000000F), ref: 00BFABBE
                      • Part of subcall function 00BFAB60: GetSysColor.USER32(00000011), ref: 00BFABDB
                      • Part of subcall function 00BFAB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00BFABE9
                      • Part of subcall function 00BFAB60: SelectObject.GDI32(?,00000000), ref: 00BFABFA
                      • Part of subcall function 00BFAB60: SetBkColor.GDI32(?,00000000), ref: 00BFAC03
                      • Part of subcall function 00BFAB60: SelectObject.GDI32(?,?), ref: 00BFAC10
                      • Part of subcall function 00BFAB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00BFAC2F
                      • Part of subcall function 00BFAB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00BFAC46
                      • Part of subcall function 00BFAB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00BFAC5B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                    • String ID:
                    • API String ID: 4124339563-0
                    • Opcode ID: 4295be73d4e7fce0caa436c4b07a8a405375a5eae3c453b0de279fcd579bbe52
                    • Instruction ID: 4d612a9bd767736f4bffd0a7843bd5af90d3ca23cc5a62745b7ed6a5f35fa6ff
                    • Opcode Fuzzy Hash: 4295be73d4e7fce0caa436c4b07a8a405375a5eae3c453b0de279fcd579bbe52
                    • Instruction Fuzzy Hash: D5A190B1008306AFD7149F64DC48A7B7BE9FF88321F104A29FA66971A0DB71D944CB52
                    APIs
                    • DestroyWindow.USER32(?,?,?), ref: 00B72CA2
                    • DeleteObject.GDI32(00000000), ref: 00B72CE8
                    • DeleteObject.GDI32(00000000), ref: 00B72CF3
                    • DestroyIcon.USER32(00000000,?,?,?), ref: 00B72CFE
                    • DestroyWindow.USER32(00000000,?,?,?), ref: 00B72D09
                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 00BAC68B
                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00BAC6C4
                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00BACAED
                      • Part of subcall function 00B71B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00B72036,?,00000000,?,?,?,?,00B716CB,00000000,?), ref: 00B71B9A
                    • SendMessageW.USER32(?,00001053), ref: 00BACB2A
                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00BACB41
                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00BACB57
                    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00BACB62
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                    • String ID: 0
                    • API String ID: 464785882-4108050209
                    • Opcode ID: 37b0d828c81311af1f1e83c4dec9d0c32792514cd4542e1f9f4caa5849c867ee
                    • Instruction ID: bb8ff1c602f910cb9ae26516c56ccef100d3343b47e2cc5245ff53656ff058a8
                    • Opcode Fuzzy Hash: 37b0d828c81311af1f1e83c4dec9d0c32792514cd4542e1f9f4caa5849c867ee
                    • Instruction Fuzzy Hash: 8B127F30608201EFDB25CF24C984BB9BBE5FF56310F5485A9E999DB262CB31EC51CB91
                    APIs
                    • DestroyWindow.USER32(00000000), ref: 00BE77F1
                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00BE78B0
                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00BE78EE
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00BE7900
                    • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00BE7946
                    • GetClientRect.USER32(00000000,?), ref: 00BE7952
                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00BE7996
                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00BE79A5
                    • GetStockObject.GDI32(00000011), ref: 00BE79B5
                    • SelectObject.GDI32(00000000,00000000), ref: 00BE79B9
                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00BE79C9
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BE79D2
                    • DeleteDC.GDI32(00000000), ref: 00BE79DB
                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00BE7A07
                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 00BE7A1E
                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00BE7A59
                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00BE7A6D
                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00BE7A7E
                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00BE7AAE
                    • GetStockObject.GDI32(00000011), ref: 00BE7AB9
                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00BE7AC4
                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00BE7ACE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                    • API String ID: 2910397461-517079104
                    • Opcode ID: f5bf6db98161226305f7b264b5774f79e6961bca80104218892fb93918a2dffe
                    • Instruction ID: 7245fef6de151ebd6a85fb569663abced5754917f27feecf5a659f96b726f24f
                    • Opcode Fuzzy Hash: f5bf6db98161226305f7b264b5774f79e6961bca80104218892fb93918a2dffe
                    • Instruction Fuzzy Hash: A2A16D71A40219BFEB149BA5DC4AFBF7BA9EF48710F008154FA15A72E0DB71AD10CB64
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00BDAF89
                    • GetDriveTypeW.KERNEL32(?,00BFFAC0,?,\\.\,00BFF910), ref: 00BDB066
                    • SetErrorMode.KERNEL32(00000000,00BFFAC0,?,\\.\,00BFF910), ref: 00BDB1C4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorMode$DriveType
                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                    • API String ID: 2907320926-4222207086
                    • Opcode ID: 6f8e41732f39dc21c89f781f19acb33ef4bd42d2347048a163537e9fbf2660ec
                    • Instruction ID: ddfe8b68f5518677a0da888ad5b7cec609f254b23cd0e2f8f19c64c007fc508c
                    • Opcode Fuzzy Hash: 6f8e41732f39dc21c89f781f19acb33ef4bd42d2347048a163537e9fbf2660ec
                    • Instruction Fuzzy Hash: 0F519C30690305EB8B04DB10D9A2EB9F3F1EB54B41B2280E7E42AB7791EB759D41DB46
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __wcsnicmp
                    • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                    • API String ID: 1038674560-86951937
                    • Opcode ID: 2ffc1d7f9466092f8ef85dfdfd96866926bc5f9b8ccd679a117151102723cdf4
                    • Instruction ID: 1b283b49c40209908d77e6c366c2980de54bcfa8c14887fff8f8c98538ca3519
                    • Opcode Fuzzy Hash: 2ffc1d7f9466092f8ef85dfdfd96866926bc5f9b8ccd679a117151102723cdf4
                    • Instruction Fuzzy Hash: 2F810970644605BACF20AB60CC83FBE77E8EF16700F0480F5F969AA1D2EB61DE55D261
                    APIs
                    • GetSysColor.USER32(00000012), ref: 00BFAB99
                    • SetTextColor.GDI32(?,?), ref: 00BFAB9D
                    • GetSysColorBrush.USER32(0000000F), ref: 00BFABB3
                    • GetSysColor.USER32(0000000F), ref: 00BFABBE
                    • CreateSolidBrush.GDI32(?), ref: 00BFABC3
                    • GetSysColor.USER32(00000011), ref: 00BFABDB
                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00BFABE9
                    • SelectObject.GDI32(?,00000000), ref: 00BFABFA
                    • SetBkColor.GDI32(?,00000000), ref: 00BFAC03
                    • SelectObject.GDI32(?,?), ref: 00BFAC10
                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00BFAC2F
                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00BFAC46
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00BFAC5B
                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00BFACA7
                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00BFACCE
                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00BFACEC
                    • DrawFocusRect.USER32(?,?), ref: 00BFACF7
                    • GetSysColor.USER32(00000011), ref: 00BFAD05
                    • SetTextColor.GDI32(?,00000000), ref: 00BFAD0D
                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00BFAD21
                    • SelectObject.GDI32(?,00BFA869), ref: 00BFAD38
                    • DeleteObject.GDI32(?), ref: 00BFAD43
                    • SelectObject.GDI32(?,?), ref: 00BFAD49
                    • DeleteObject.GDI32(?), ref: 00BFAD4E
                    • SetTextColor.GDI32(?,?), ref: 00BFAD54
                    • SetBkColor.GDI32(?,?), ref: 00BFAD5E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                    • String ID:
                    • API String ID: 1996641542-0
                    • Opcode ID: 0ee532e19809dd5eb8a41df3f198c22c7512778228cbf22fb2371061a23787eb
                    • Instruction ID: 2372f52926e5a09c2901df4b407895acca574e23af6885058dcc2f7df885a190
                    • Opcode Fuzzy Hash: 0ee532e19809dd5eb8a41df3f198c22c7512778228cbf22fb2371061a23787eb
                    • Instruction Fuzzy Hash: 4C613FB1900219FFDF159FA4DC48EBE7BB9EF08320F104165FA15AB2A1DA759E40DB90
                    APIs
                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00BF8D34
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00BF8D45
                    • CharNextW.USER32(0000014E), ref: 00BF8D74
                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00BF8DB5
                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00BF8DCB
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00BF8DDC
                    • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00BF8DF9
                    • SetWindowTextW.USER32(?,0000014E), ref: 00BF8E45
                    • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00BF8E5B
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00BF8E8C
                    • _memset.LIBCMT ref: 00BF8EB1
                    • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00BF8EFA
                    • _memset.LIBCMT ref: 00BF8F59
                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00BF8F83
                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 00BF8FDB
                    • SendMessageW.USER32(?,0000133D,?,?), ref: 00BF9088
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00BF90AA
                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00BF90F4
                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00BF9121
                    • DrawMenuBar.USER32(?), ref: 00BF9130
                    • SetWindowTextW.USER32(?,0000014E), ref: 00BF9158
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                    • String ID: 0
                    • API String ID: 1073566785-4108050209
                    • Opcode ID: baeb36d49ad997e7d2076e83149db14899033eecf2f90730119622b6a17e90cb
                    • Instruction ID: d3d01397e4d379b38edfa5a15d747ed1549f84250c56d9444ce41af8e9369ea0
                    • Opcode Fuzzy Hash: baeb36d49ad997e7d2076e83149db14899033eecf2f90730119622b6a17e90cb
                    • Instruction Fuzzy Hash: FAE14E7490021DBADF209F54CC84AFE7BF9EF05710F1081A9FA15AB291DB709A89DF61
                    APIs
                    • GetCursorPos.USER32(?), ref: 00BF4C51
                    • GetDesktopWindow.USER32 ref: 00BF4C66
                    • GetWindowRect.USER32(00000000), ref: 00BF4C6D
                    • GetWindowLongW.USER32(?,000000F0), ref: 00BF4CCF
                    • DestroyWindow.USER32(?), ref: 00BF4CFB
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00BF4D24
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BF4D42
                    • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00BF4D68
                    • SendMessageW.USER32(?,00000421,?,?), ref: 00BF4D7D
                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00BF4D90
                    • IsWindowVisible.USER32(?), ref: 00BF4DB0
                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00BF4DCB
                    • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00BF4DDF
                    • GetWindowRect.USER32(?,?), ref: 00BF4DF7
                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00BF4E1D
                    • GetMonitorInfoW.USER32(00000000,?), ref: 00BF4E37
                    • CopyRect.USER32(?,?), ref: 00BF4E4E
                    • SendMessageW.USER32(?,00000412,00000000), ref: 00BF4EB9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                    • String ID: ($0$tooltips_class32
                    • API String ID: 698492251-4156429822
                    • Opcode ID: b5f8b15eb41fd179149e8ee1b173b4839613a0d079720bf4cef7c8d1cf4bd699
                    • Instruction ID: f4d4e287f982c9a4efea9ec387467eb8373139bdfcee2f8ea3471cbc59164f27
                    • Opcode Fuzzy Hash: b5f8b15eb41fd179149e8ee1b173b4839613a0d079720bf4cef7c8d1cf4bd699
                    • Instruction Fuzzy Hash: 37B13A71604341AFDB04DF64C885A6BBBE4FF88710F008969F6999B2A1DB71EC09CB51
                    APIs
                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00BD46E8
                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00BD470E
                    • _wcscpy.LIBCMT ref: 00BD473C
                    • _wcscmp.LIBCMT ref: 00BD4747
                    • _wcscat.LIBCMT ref: 00BD475D
                    • _wcsstr.LIBCMT ref: 00BD4768
                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00BD4784
                    • _wcscat.LIBCMT ref: 00BD47CD
                    • _wcscat.LIBCMT ref: 00BD47D4
                    • _wcsncpy.LIBCMT ref: 00BD47FF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                    • API String ID: 699586101-1459072770
                    • Opcode ID: 4d339bf44873374e102d21c42839c31f6b94ccfe361213addb4319c7160ede8d
                    • Instruction ID: 92a8fc3aed0a339c9e915c9181e811898c19cb524bd9b91609777e88eb1e04f5
                    • Opcode Fuzzy Hash: 4d339bf44873374e102d21c42839c31f6b94ccfe361213addb4319c7160ede8d
                    • Instruction Fuzzy Hash: 2A41D372A00215BBDF10B7649C82EBFB7ECDF41750F1001F6F905A6292EB759A0196A5
                    APIs
                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00B728BC
                    • GetSystemMetrics.USER32(00000007), ref: 00B728C4
                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00B728EF
                    • GetSystemMetrics.USER32(00000008), ref: 00B728F7
                    • GetSystemMetrics.USER32(00000004), ref: 00B7291C
                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00B72939
                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00B72949
                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00B7297C
                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00B72990
                    • GetClientRect.USER32(00000000,000000FF), ref: 00B729AE
                    • GetStockObject.GDI32(00000011), ref: 00B729CA
                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B729D5
                      • Part of subcall function 00B72344: GetCursorPos.USER32(?), ref: 00B72357
                      • Part of subcall function 00B72344: ScreenToClient.USER32(00C367B0,?), ref: 00B72374
                      • Part of subcall function 00B72344: GetAsyncKeyState.USER32(00000001), ref: 00B72399
                      • Part of subcall function 00B72344: GetAsyncKeyState.USER32(00000002), ref: 00B723A7
                    • SetTimer.USER32(00000000,00000000,00000028,00B71256), ref: 00B729FC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                    • String ID: AutoIt v3 GUI
                    • API String ID: 1458621304-248962490
                    • Opcode ID: 7aff862bf7dd315fde90d9578d5302ac150c4db2ebca43e3124795543f620efe
                    • Instruction ID: e50552a88fd871cea855d7914f757f9abada634f33c66406914d3458c57497a3
                    • Opcode Fuzzy Hash: 7aff862bf7dd315fde90d9578d5302ac150c4db2ebca43e3124795543f620efe
                    • Instruction Fuzzy Hash: 89B13C71A0020AAFDF14DFA8DC85BAE7BF4FF08714F108169FA29A7290DB749950CB55
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 00BF40F6
                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00BF41B6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BuffCharMessageSendUpper
                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                    • API String ID: 3974292440-719923060
                    • Opcode ID: 3edcc98a54e520c6fa187f2995b6348a0aadde79cf3bcf4d3499820122385060
                    • Instruction ID: 9218419848539b316d10b7a55c690d8167f7a9d76939d10555c2946cd4ebab66
                    • Opcode Fuzzy Hash: 3edcc98a54e520c6fa187f2995b6348a0aadde79cf3bcf4d3499820122385060
                    • Instruction Fuzzy Hash: 1BA18E302142159FCB14EF24C981A7AB7E5EF84314F1489BCB9AA9B792DB30ED09CB41
                    APIs
                    • LoadCursorW.USER32(00000000,00007F89), ref: 00BE5309
                    • LoadCursorW.USER32(00000000,00007F8A), ref: 00BE5314
                    • LoadCursorW.USER32(00000000,00007F00), ref: 00BE531F
                    • LoadCursorW.USER32(00000000,00007F03), ref: 00BE532A
                    • LoadCursorW.USER32(00000000,00007F8B), ref: 00BE5335
                    • LoadCursorW.USER32(00000000,00007F01), ref: 00BE5340
                    • LoadCursorW.USER32(00000000,00007F81), ref: 00BE534B
                    • LoadCursorW.USER32(00000000,00007F88), ref: 00BE5356
                    • LoadCursorW.USER32(00000000,00007F80), ref: 00BE5361
                    • LoadCursorW.USER32(00000000,00007F86), ref: 00BE536C
                    • LoadCursorW.USER32(00000000,00007F83), ref: 00BE5377
                    • LoadCursorW.USER32(00000000,00007F85), ref: 00BE5382
                    • LoadCursorW.USER32(00000000,00007F82), ref: 00BE538D
                    • LoadCursorW.USER32(00000000,00007F84), ref: 00BE5398
                    • LoadCursorW.USER32(00000000,00007F04), ref: 00BE53A3
                    • LoadCursorW.USER32(00000000,00007F02), ref: 00BE53AE
                    • GetCursorInfo.USER32(?), ref: 00BE53BE
                    • GetLastError.KERNEL32(00000001,00000000), ref: 00BE53E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Cursor$Load$ErrorInfoLast
                    • String ID:
                    • API String ID: 3215588206-0
                    • Opcode ID: ffd4eca4929e653a8852915d702f54ce984aaec2927a11f6889294846ba6363f
                    • Instruction ID: 4f1c753093393ec8023130637afa392cb2f5d6b6fa8fd7125c4de7eb9882f749
                    • Opcode Fuzzy Hash: ffd4eca4929e653a8852915d702f54ce984aaec2927a11f6889294846ba6363f
                    • Instruction Fuzzy Hash: B1417170E043196ADB209FBA8C49D6EFFF8EF51B10B10453FE509E7290DAB8A500CE61
                    APIs
                    • GetClassNameW.USER32(?,?,00000100), ref: 00BCAAA5
                    • __swprintf.LIBCMT ref: 00BCAB46
                    • _wcscmp.LIBCMT ref: 00BCAB59
                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00BCABAE
                    • _wcscmp.LIBCMT ref: 00BCABEA
                    • GetClassNameW.USER32(?,?,00000400), ref: 00BCAC21
                    • GetDlgCtrlID.USER32(?), ref: 00BCAC73
                    • GetWindowRect.USER32(?,?), ref: 00BCACA9
                    • GetParent.USER32(?), ref: 00BCACC7
                    • ScreenToClient.USER32(00000000), ref: 00BCACCE
                    • GetClassNameW.USER32(?,?,00000100), ref: 00BCAD48
                    • _wcscmp.LIBCMT ref: 00BCAD5C
                    • GetWindowTextW.USER32(?,?,00000400), ref: 00BCAD82
                    • _wcscmp.LIBCMT ref: 00BCAD96
                      • Part of subcall function 00B9386C: _iswctype.LIBCMT ref: 00B93874
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                    • String ID: %s%u
                    • API String ID: 3744389584-679674701
                    • Opcode ID: 0d0850e6a0c0a77262e5cf9fed71bb82b3054dd61d22c97011ebef25b12c4ec4
                    • Instruction ID: e0b10ca3a659515da5ab2964df0da73c1923ced62964dbdd623aac422a48dcce
                    • Opcode Fuzzy Hash: 0d0850e6a0c0a77262e5cf9fed71bb82b3054dd61d22c97011ebef25b12c4ec4
                    • Instruction Fuzzy Hash: 93A1907160460AABDB14DF64C884FAAF7E8FF04319F10466DF99AD3150DB30E955CBA2
                    APIs
                    • GetClassNameW.USER32(00000008,?,00000400), ref: 00BCB3DB
                    • _wcscmp.LIBCMT ref: 00BCB3EC
                    • GetWindowTextW.USER32(00000001,?,00000400), ref: 00BCB414
                    • CharUpperBuffW.USER32(?,00000000), ref: 00BCB431
                    • _wcscmp.LIBCMT ref: 00BCB44F
                    • _wcsstr.LIBCMT ref: 00BCB460
                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00BCB498
                    • _wcscmp.LIBCMT ref: 00BCB4A8
                    • GetWindowTextW.USER32(00000002,?,00000400), ref: 00BCB4CF
                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00BCB518
                    • _wcscmp.LIBCMT ref: 00BCB528
                    • GetClassNameW.USER32(00000010,?,00000400), ref: 00BCB550
                    • GetWindowRect.USER32(00000004,?), ref: 00BCB5B9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                    • String ID: @$ThumbnailClass
                    • API String ID: 1788623398-1539354611
                    • Opcode ID: e0ee3ca0af4ee1c82b3faa136d9294639201770420d722bbc250ca53643d8239
                    • Instruction ID: ef286b7d762f0ce28a12c5c7fc6fb88d294451933d13cf81d8bbc1c081e11435
                    • Opcode Fuzzy Hash: e0ee3ca0af4ee1c82b3faa136d9294639201770420d722bbc250ca53643d8239
                    • Instruction Fuzzy Hash: 68819C720082069BDB15DF10C886FBEBBE8EF54714F0485ADFD899A1A2DB34DD49CB61
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __wcsnicmp
                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                    • API String ID: 1038674560-1810252412
                    • Opcode ID: 81e0296296102debde0a78853bf1b10834340f844de5f4478053a8637087f0a3
                    • Instruction ID: 90d03bf81fbfc6eece13e6893bf9aa571f92b89a819149798399d47e402670eb
                    • Opcode Fuzzy Hash: 81e0296296102debde0a78853bf1b10834340f844de5f4478053a8637087f0a3
                    • Instruction Fuzzy Hash: 9C31CF31A88215A6DF14FA60DD83FEE7BE8EF20B50F6040B8B855754E2EF616F04C551
                    APIs
                    • LoadIconW.USER32(00000063), ref: 00BCC4D4
                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00BCC4E6
                    • SetWindowTextW.USER32(?,?), ref: 00BCC4FD
                    • GetDlgItem.USER32(?,000003EA), ref: 00BCC512
                    • SetWindowTextW.USER32(00000000,?), ref: 00BCC518
                    • GetDlgItem.USER32(?,000003E9), ref: 00BCC528
                    • SetWindowTextW.USER32(00000000,?), ref: 00BCC52E
                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00BCC54F
                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00BCC569
                    • GetWindowRect.USER32(?,?), ref: 00BCC572
                    • SetWindowTextW.USER32(?,?), ref: 00BCC5DD
                    • GetDesktopWindow.USER32 ref: 00BCC5E3
                    • GetWindowRect.USER32(00000000), ref: 00BCC5EA
                    • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00BCC636
                    • GetClientRect.USER32(?,?), ref: 00BCC643
                    • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00BCC668
                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00BCC693
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                    • String ID:
                    • API String ID: 3869813825-0
                    • Opcode ID: e126a8666ec194ebc3ded4a01ed99b52ce3e2ba058a5f9f06050829c6830bdad
                    • Instruction ID: 27e317a62043d70b5e65011ded7de30f10d4fed8e2e3f4a3118003f8cab07848
                    • Opcode Fuzzy Hash: e126a8666ec194ebc3ded4a01ed99b52ce3e2ba058a5f9f06050829c6830bdad
                    • Instruction Fuzzy Hash: F151297190070AAFDB209FA8DD85F6EBBF5EF14705F00456CE686A35A0CB74A944CB50
                    APIs
                    • _memset.LIBCMT ref: 00BFA4C8
                    • DestroyWindow.USER32(?,?), ref: 00BFA542
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00BFA5BC
                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00BFA5DE
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BFA5F1
                    • DestroyWindow.USER32(00000000), ref: 00BFA613
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00B70000,00000000), ref: 00BFA64A
                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BFA663
                    • GetDesktopWindow.USER32 ref: 00BFA67C
                    • GetWindowRect.USER32(00000000), ref: 00BFA683
                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00BFA69B
                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00BFA6B3
                      • Part of subcall function 00B725DB: GetWindowLongW.USER32(?,000000EB), ref: 00B725EC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                    • String ID: 0$tooltips_class32
                    • API String ID: 1297703922-3619404913
                    • Opcode ID: 83a7b5d6f0f5ff3e5f21a21a8598dd0ca13378413f97937744cf1c474ae7aa51
                    • Instruction ID: ed3ea9be70bbbd80c1739d2eea3e21c26f99925b3d57c6962cea0bf93d527755
                    • Opcode Fuzzy Hash: 83a7b5d6f0f5ff3e5f21a21a8598dd0ca13378413f97937744cf1c474ae7aa51
                    • Instruction Fuzzy Hash: 15717AB1150209BFD724CF28CC45F7A7BE5EB88704F08456DFA99872A1DB70E905CB12
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                    • DragQueryPoint.SHELL32(?,?), ref: 00BFC917
                      • Part of subcall function 00BFADF1: ClientToScreen.USER32(?,?), ref: 00BFAE1A
                      • Part of subcall function 00BFADF1: GetWindowRect.USER32(?,?), ref: 00BFAE90
                      • Part of subcall function 00BFADF1: PtInRect.USER32(?,?,00BFC304), ref: 00BFAEA0
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00BFC980
                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00BFC98B
                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00BFC9AE
                    • _wcscat.LIBCMT ref: 00BFC9DE
                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00BFC9F5
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00BFCA0E
                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00BFCA25
                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00BFCA47
                    • DragFinish.SHELL32(?), ref: 00BFCA4E
                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00BFCB41
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                    • API String ID: 169749273-3440237614
                    • Opcode ID: ab6cc3b5fd715de43d288d4bd94806efb512e98a2ad585abfaef10ba423bf82c
                    • Instruction ID: a9d78966d570e476a3851f5ee594c9475d50653a7cff4032f30564ce4dc950be
                    • Opcode Fuzzy Hash: ab6cc3b5fd715de43d288d4bd94806efb512e98a2ad585abfaef10ba423bf82c
                    • Instruction Fuzzy Hash: 78617C71508305AFC711EF60DC85DAFBBE8EF88710F00496EF6A5972A1DB709A49CB52
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 00BF46AB
                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00BF46F6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BuffCharMessageSendUpper
                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                    • API String ID: 3974292440-4258414348
                    • Opcode ID: 8c2672410d5429c47733bc31297f8d4ee90a8a17bc831c474975e97cf99a20d5
                    • Instruction ID: 1d700b184e85ac136408a26b92b80ab70d1f7678686461f43081460601348637
                    • Opcode Fuzzy Hash: 8c2672410d5429c47733bc31297f8d4ee90a8a17bc831c474975e97cf99a20d5
                    • Instruction Fuzzy Hash: 46916C742043059FCB14EF14C491A7AB7E1AF84314F0488ECF9AA5B7A2DB30ED4ACB41
                    APIs
                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00BFBB6E
                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00BF9431), ref: 00BFBBCA
                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00BFBC03
                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00BFBC46
                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00BFBC7D
                    • FreeLibrary.KERNEL32(?), ref: 00BFBC89
                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00BFBC99
                    • DestroyIcon.USER32(?,?,?,?,?,00BF9431), ref: 00BFBCA8
                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00BFBCC5
                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00BFBCD1
                      • Part of subcall function 00B9313D: __wcsicmp_l.LIBCMT ref: 00B931C6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                    • String ID: .dll$.exe$.icl
                    • API String ID: 1212759294-1154884017
                    • Opcode ID: 3a703d34b4253865a498d558774f1587a7b60026132579aef0a73921f88d74a3
                    • Instruction ID: 4f4e63a36f4c485030e68429d1cdc482c9c966fc172c35f3294657e464934694
                    • Opcode Fuzzy Hash: 3a703d34b4253865a498d558774f1587a7b60026132579aef0a73921f88d74a3
                    • Instruction Fuzzy Hash: E9619071900619BAEB14DF64CC85FBE7BE8EF08710F1041A9FA15D71D1DB74AA94CBA0
                    APIs
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                    • CharLowerBuffW.USER32(?,?), ref: 00BDA636
                    • GetDriveTypeW.KERNEL32 ref: 00BDA683
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BDA6CB
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BDA702
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BDA730
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                    • API String ID: 2698844021-4113822522
                    • Opcode ID: e79e1b7dfcf115ca473e9c77e09674ce34031ea73984f270f61e735f9098835e
                    • Instruction ID: a2f43418e0220151296090eec610d59496b0845f560baaac78baf1b66bc3b5f4
                    • Opcode Fuzzy Hash: e79e1b7dfcf115ca473e9c77e09674ce34031ea73984f270f61e735f9098835e
                    • Instruction Fuzzy Hash: A3513E711043059FC710EF24D98196AB7F8FF98718F1489ADF8AA57261DB31EE0ACB52
                    APIs
                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00BDA47A
                    • __swprintf.LIBCMT ref: 00BDA49C
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00BDA4D9
                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00BDA4FE
                    • _memset.LIBCMT ref: 00BDA51D
                    • _wcsncpy.LIBCMT ref: 00BDA559
                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00BDA58E
                    • CloseHandle.KERNEL32(00000000), ref: 00BDA599
                    • RemoveDirectoryW.KERNEL32(?), ref: 00BDA5A2
                    • CloseHandle.KERNEL32(00000000), ref: 00BDA5AC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                    • String ID: :$\$\??\%s
                    • API String ID: 2733774712-3457252023
                    • Opcode ID: 9a57765d8943a8755b498b02d83ee82942c32e5b7f5d493c960991e96e83d007
                    • Instruction ID: 33484c21e6cb36c67488531cd4363dfad25b51da4a9e66e6eb679b853403c51a
                    • Opcode Fuzzy Hash: 9a57765d8943a8755b498b02d83ee82942c32e5b7f5d493c960991e96e83d007
                    • Instruction Fuzzy Hash: B0316DB650011AABDB219FA0DC89FBB77BCEF88705F1041B6F909D7260EB7097458B25
                    APIs
                    • __wsplitpath.LIBCMT ref: 00BDDC7B
                    • _wcscat.LIBCMT ref: 00BDDC93
                    • _wcscat.LIBCMT ref: 00BDDCA5
                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00BDDCBA
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00BDDCCE
                    • GetFileAttributesW.KERNEL32(?), ref: 00BDDCE6
                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00BDDD00
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00BDDD12
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                    • String ID: *.*
                    • API String ID: 34673085-438819550
                    • Opcode ID: 93740f7831fd01d3c1d8cbf8421f45a0e1f91b2d744f4ab8ee2f6e1bfcdeb97a
                    • Instruction ID: 332c02db11288267b855ff2eaf62ea8a7ee1379e18ff287c9360a5dcf61f188a
                    • Opcode Fuzzy Hash: 93740f7831fd01d3c1d8cbf8421f45a0e1f91b2d744f4ab8ee2f6e1bfcdeb97a
                    • Instruction Fuzzy Hash: F7816D715042419FCB24EF24C8859AAF7E8EB88314F1988ABF8C9C7350F631D944CB52
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00BFC4EC
                    • GetFocus.USER32 ref: 00BFC4FC
                    • GetDlgCtrlID.USER32(00000000), ref: 00BFC507
                    • _memset.LIBCMT ref: 00BFC632
                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00BFC65D
                    • GetMenuItemCount.USER32(?), ref: 00BFC67D
                    • GetMenuItemID.USER32(?,00000000), ref: 00BFC690
                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00BFC6C4
                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00BFC70C
                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00BFC744
                    • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00BFC779
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                    • String ID: 0
                    • API String ID: 1296962147-4108050209
                    • Opcode ID: 643df4779a58c2c19cdf10f644e2d5b6433160fb96c61f98a6ed2acc4cd90790
                    • Instruction ID: 3589864233041e04e0a098ab34ed935d7802ca09a1278a83d8cdc0b69a294a10
                    • Opcode Fuzzy Hash: 643df4779a58c2c19cdf10f644e2d5b6433160fb96c61f98a6ed2acc4cd90790
                    • Instruction Fuzzy Hash: C5817D70508349AFDB10DF24CA84A7ABBE4FF98314F1049ADFA9597291DB30DD49CB92
                    APIs
                      • Part of subcall function 00BC874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BC8766
                      • Part of subcall function 00BC874A: GetLastError.KERNEL32(?,00BC822A,?,?,?), ref: 00BC8770
                      • Part of subcall function 00BC874A: GetProcessHeap.KERNEL32(00000008,?,?,00BC822A,?,?,?), ref: 00BC877F
                      • Part of subcall function 00BC874A: HeapAlloc.KERNEL32(00000000,?,00BC822A,?,?,?), ref: 00BC8786
                      • Part of subcall function 00BC874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BC879D
                      • Part of subcall function 00BC87E7: GetProcessHeap.KERNEL32(00000008,00BC8240,00000000,00000000,?,00BC8240,?), ref: 00BC87F3
                      • Part of subcall function 00BC87E7: HeapAlloc.KERNEL32(00000000,?,00BC8240,?), ref: 00BC87FA
                      • Part of subcall function 00BC87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00BC8240,?), ref: 00BC880B
                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00BC8458
                    • _memset.LIBCMT ref: 00BC846D
                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00BC848C
                    • GetLengthSid.ADVAPI32(?), ref: 00BC849D
                    • GetAce.ADVAPI32(?,00000000,?), ref: 00BC84DA
                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00BC84F6
                    • GetLengthSid.ADVAPI32(?), ref: 00BC8513
                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00BC8522
                    • HeapAlloc.KERNEL32(00000000), ref: 00BC8529
                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00BC854A
                    • CopySid.ADVAPI32(00000000), ref: 00BC8551
                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00BC8582
                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00BC85A8
                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00BC85BC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                    • String ID:
                    • API String ID: 3996160137-0
                    • Opcode ID: 69413202d0a261de2467ef4825b57637188df6aeec95e509b723df67c12a8c24
                    • Instruction ID: 8d11968a1e718ccb68b2c34c74245d6b3daeab44c3e2a1b5cf0910fa398c8e08
                    • Opcode Fuzzy Hash: 69413202d0a261de2467ef4825b57637188df6aeec95e509b723df67c12a8c24
                    • Instruction Fuzzy Hash: 8961187190021AABDF149FA4DC85EBEBBB9FF08300F1481A9E915A7291DF719A15CF60
                    APIs
                    • GetDC.USER32(00000000), ref: 00BE76A2
                    • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00BE76AE
                    • CreateCompatibleDC.GDI32(?), ref: 00BE76BA
                    • SelectObject.GDI32(00000000,?), ref: 00BE76C7
                    • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00BE771B
                    • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00BE7757
                    • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00BE777B
                    • SelectObject.GDI32(00000006,?), ref: 00BE7783
                    • DeleteObject.GDI32(?), ref: 00BE778C
                    • DeleteDC.GDI32(00000006), ref: 00BE7793
                    • ReleaseDC.USER32(00000000,?), ref: 00BE779E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                    • String ID: (
                    • API String ID: 2598888154-3887548279
                    • Opcode ID: f85137a94d498c65de9c39123843217688b8860bf524091349373af008db1be2
                    • Instruction ID: ff4ae60e8f54ec045b37370ab48cd22b67fd1511e9e8ea32a7288fcef840054d
                    • Opcode Fuzzy Hash: f85137a94d498c65de9c39123843217688b8860bf524091349373af008db1be2
                    • Instruction Fuzzy Hash: AB515875904249EFCB14CFA9CC84EAEBBF9EF48710F14846DF94AA7210DB31A940CB60
                    APIs
                    • LoadStringW.USER32(00000066,?,00000FFF,00BFFB78), ref: 00BDA0FC
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                    • LoadStringW.USER32(?,?,00000FFF,?), ref: 00BDA11E
                    • __swprintf.LIBCMT ref: 00BDA177
                    • __swprintf.LIBCMT ref: 00BDA190
                    • _wprintf.LIBCMT ref: 00BDA246
                    • _wprintf.LIBCMT ref: 00BDA264
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: LoadString__swprintf_wprintf$_memmove
                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                    • API String ID: 311963372-2391861430
                    • Opcode ID: ad551cb1a07de4e52256ef7dc4c1cab51e2f081ad2851981ef68b59d1da149c5
                    • Instruction ID: 222e6d17c2c98d44ca74adfea60751821ef3ab55f29c58fb143cb8f3e3df3155
                    • Opcode Fuzzy Hash: ad551cb1a07de4e52256ef7dc4c1cab51e2f081ad2851981ef68b59d1da149c5
                    • Instruction Fuzzy Hash: E8513A71940219BACF15EBA0CD86EEEB7B9EF05300F2081E5F519721A1EB316F58DB61
                    APIs
                      • Part of subcall function 00B90B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00B76C6C,?,00008000), ref: 00B90BB7
                      • Part of subcall function 00B748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B748A1,?,?,00B737C0,?), ref: 00B748CE
                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00B76D0D
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B76E5A
                      • Part of subcall function 00B759CD: _wcscpy.LIBCMT ref: 00B75A05
                      • Part of subcall function 00B9387D: _iswctype.LIBCMT ref: 00B93885
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                    • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                    • API String ID: 537147316-1018226102
                    • Opcode ID: 260cbe02587fe65f4d44dd88605db5934d7eed922d3cb835445479c271cf0945
                    • Instruction ID: 1f16d9caf0e4802f837c4ba0e1b6860188e7d802a4573a14e0814ebd090c3f2c
                    • Opcode Fuzzy Hash: 260cbe02587fe65f4d44dd88605db5934d7eed922d3cb835445479c271cf0945
                    • Instruction Fuzzy Hash: 15029C3110C7419FC724EF24C881AAFBBE5EF85354F0489ADF4AA972A1DB30D949CB52
                    APIs
                    • _memset.LIBCMT ref: 00B745F9
                    • GetMenuItemCount.USER32(00C36890), ref: 00BAD7CD
                    • GetMenuItemCount.USER32(00C36890), ref: 00BAD87D
                    • GetCursorPos.USER32(?), ref: 00BAD8C1
                    • SetForegroundWindow.USER32(00000000), ref: 00BAD8CA
                    • TrackPopupMenuEx.USER32(00C36890,00000000,?,00000000,00000000,00000000), ref: 00BAD8DD
                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00BAD8E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                    • String ID:
                    • API String ID: 2751501086-0
                    • Opcode ID: fcdd39febe1b555993f8a4fbb48066bac814dffaac47765389c02b263db88831
                    • Instruction ID: 743f2fe19706e8a5c2f3c13ced5f58ae207cb2b0ad75982c0ffd830fc60ea3f3
                    • Opcode Fuzzy Hash: fcdd39febe1b555993f8a4fbb48066bac814dffaac47765389c02b263db88831
                    • Instruction Fuzzy Hash: 9471F870609205BEEB259F24DC89FAABFE4FF06364F104296F529671E1CBB19C50DB90
                    APIs
                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BF0038,?,?), ref: 00BF10BC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BuffCharUpper
                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                    • API String ID: 3964851224-909552448
                    • Opcode ID: 2aecbf8eb6f1329d17e65dbd38508f0e3fde59ebb5181b85cba25027a48d65ed
                    • Instruction ID: 7b407813bd2f20de1ee3ce0be4bac71c5ef9a35dbed65c927922cf66e2567d47
                    • Opcode Fuzzy Hash: 2aecbf8eb6f1329d17e65dbd38508f0e3fde59ebb5181b85cba25027a48d65ed
                    • Instruction Fuzzy Hash: FC415C7015025EDBCF10EF98E891AFE37A4EF11300F1048A4FEA16B691DB30AE5ACB50
                    APIs
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                      • Part of subcall function 00B77A84: _memmove.LIBCMT ref: 00B77B0D
                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00BD55D2
                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00BD55E8
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BD55F9
                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00BD560B
                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00BD561C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: SendString$_memmove
                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                    • API String ID: 2279737902-1007645807
                    • Opcode ID: f41ec184e13e10a343281c1a607c725a18a1c92c25de54503895352d51da6e94
                    • Instruction ID: 9279f9b36a72c84e66a19530d96b3898284c1cc64b3a58751296f9c36fef0248
                    • Opcode Fuzzy Hash: f41ec184e13e10a343281c1a607c725a18a1c92c25de54503895352d51da6e94
                    • Instruction Fuzzy Hash: CB1198205901697AD730F661DC49DFFBBBCEF95B10F4044BAB415A20E1EE609D05C6A1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                    • String ID: 0.0.0.0
                    • API String ID: 208665112-3771769585
                    • Opcode ID: afb7df9b4091fc9af33aa319d93aea9080ba92a2db499acb41367021fddef02b
                    • Instruction ID: 278ce60460ca0440f45303f83ba102d4d21428a7f7cdbd5db26fc238c6acafd9
                    • Opcode Fuzzy Hash: afb7df9b4091fc9af33aa319d93aea9080ba92a2db499acb41367021fddef02b
                    • Instruction Fuzzy Hash: D111C031904116AFCB20AB65AC4AEEBB7ECDF00720F1401F6F408971A1FFB59A819661
                    APIs
                    • timeGetTime.WINMM ref: 00BD521C
                      • Part of subcall function 00B90719: timeGetTime.WINMM(?,76C1B400,00B80FF9), ref: 00B9071D
                    • Sleep.KERNEL32(0000000A), ref: 00BD5248
                    • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00BD526C
                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00BD528E
                    • SetActiveWindow.USER32 ref: 00BD52AD
                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00BD52BB
                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00BD52DA
                    • Sleep.KERNEL32(000000FA), ref: 00BD52E5
                    • IsWindow.USER32 ref: 00BD52F1
                    • EndDialog.USER32(00000000), ref: 00BD5302
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                    • String ID: BUTTON
                    • API String ID: 1194449130-3405671355
                    • Opcode ID: be9b74d6c9ce9fc020c873fe61b81d2e58c91e9e355b2a139b584a2804bd9bb9
                    • Instruction ID: d86e06212db240056618e2656acccd2d5ade3ae00878071130a96ba09c6acbaa
                    • Opcode Fuzzy Hash: be9b74d6c9ce9fc020c873fe61b81d2e58c91e9e355b2a139b584a2804bd9bb9
                    • Instruction Fuzzy Hash: 932180B0114606BFEB205F70EC88B3ABBA9EB54356B0004B6F50293271EE619D04D765
                    APIs
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                    • CoInitialize.OLE32(00000000), ref: 00BDD855
                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00BDD8E8
                    • SHGetDesktopFolder.SHELL32(?), ref: 00BDD8FC
                    • CoCreateInstance.OLE32(00C02D7C,00000000,00000001,00C2A89C,?), ref: 00BDD948
                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00BDD9B7
                    • CoTaskMemFree.OLE32(?,?), ref: 00BDDA0F
                    • _memset.LIBCMT ref: 00BDDA4C
                    • SHBrowseForFolderW.SHELL32(?), ref: 00BDDA88
                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00BDDAAB
                    • CoTaskMemFree.OLE32(00000000), ref: 00BDDAB2
                    • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00BDDAE9
                    • CoUninitialize.OLE32(00000001,00000000), ref: 00BDDAEB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                    • String ID:
                    • API String ID: 1246142700-0
                    • Opcode ID: fad3e87ad6d03d9c3cf8bedba3bd87f5773fbcc3725e8827f92e6a3926d9ba24
                    • Instruction ID: 05ad1a2d3639f909fa745668649756fc712719d9db5a67b3006386ad5a64ff5a
                    • Opcode Fuzzy Hash: fad3e87ad6d03d9c3cf8bedba3bd87f5773fbcc3725e8827f92e6a3926d9ba24
                    • Instruction Fuzzy Hash: 71B1FA75A00109AFDB04DFA4C888EAEBBF9EF48314B0484A9F559EB361DB31ED45CB50
                    APIs
                    • GetKeyboardState.USER32(?), ref: 00BD05A7
                    • SetKeyboardState.USER32(?), ref: 00BD0612
                    • GetAsyncKeyState.USER32(000000A0), ref: 00BD0632
                    • GetKeyState.USER32(000000A0), ref: 00BD0649
                    • GetAsyncKeyState.USER32(000000A1), ref: 00BD0678
                    • GetKeyState.USER32(000000A1), ref: 00BD0689
                    • GetAsyncKeyState.USER32(00000011), ref: 00BD06B5
                    • GetKeyState.USER32(00000011), ref: 00BD06C3
                    • GetAsyncKeyState.USER32(00000012), ref: 00BD06EC
                    • GetKeyState.USER32(00000012), ref: 00BD06FA
                    • GetAsyncKeyState.USER32(0000005B), ref: 00BD0723
                    • GetKeyState.USER32(0000005B), ref: 00BD0731
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: State$Async$Keyboard
                    • String ID:
                    • API String ID: 541375521-0
                    • Opcode ID: 5d89b13441b582ec708974c1c9db89ac0f214fee384a273f42eae4f3a166b2df
                    • Instruction ID: 35374c4144ae04eb9f6c5f60dd2f2d0ad14378c4bb91b544fb1bc0dd34e58adc
                    • Opcode Fuzzy Hash: 5d89b13441b582ec708974c1c9db89ac0f214fee384a273f42eae4f3a166b2df
                    • Instruction Fuzzy Hash: 4551C760A1478429FB34EBA494557EAFFF4DF11380F0845DB99C25B2C2FA64DA4CCB51
                    APIs
                    • GetDlgItem.USER32(?,00000001), ref: 00BCC746
                    • GetWindowRect.USER32(00000000,?), ref: 00BCC758
                    • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00BCC7B6
                    • GetDlgItem.USER32(?,00000002), ref: 00BCC7C1
                    • GetWindowRect.USER32(00000000,?), ref: 00BCC7D3
                    • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00BCC827
                    • GetDlgItem.USER32(?,000003E9), ref: 00BCC835
                    • GetWindowRect.USER32(00000000,?), ref: 00BCC846
                    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00BCC889
                    • GetDlgItem.USER32(?,000003EA), ref: 00BCC897
                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00BCC8B4
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00BCC8C1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$ItemMoveRect$Invalidate
                    • String ID:
                    • API String ID: 3096461208-0
                    • Opcode ID: 543228a7324a2aa1c1b01d5e068e7537b7059196020e09ad9225399f8bf8079d
                    • Instruction ID: efcf648e38b78214198de0fedc6e320d1a7a66cb71c1ab4902327c7dd920577f
                    • Opcode Fuzzy Hash: 543228a7324a2aa1c1b01d5e068e7537b7059196020e09ad9225399f8bf8079d
                    • Instruction Fuzzy Hash: F1513D71B00205ABDB18CF68DD99ABEBBB6EF98710F14816DF519D7290DB70AD00CB50
                    APIs
                      • Part of subcall function 00B71B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00B72036,?,00000000,?,?,?,?,00B716CB,00000000,?), ref: 00B71B9A
                    • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00B720D3
                    • KillTimer.USER32(-00000001,?,?,?,?,00B716CB,00000000,?,?,00B71AE2,?,?), ref: 00B7216E
                    • DestroyAcceleratorTable.USER32(00000000), ref: 00BABEF6
                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00B716CB,00000000,?,?,00B71AE2,?,?), ref: 00BABF27
                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00B716CB,00000000,?,?,00B71AE2,?,?), ref: 00BABF3E
                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00B716CB,00000000,?,?,00B71AE2,?,?), ref: 00BABF5A
                    • DeleteObject.GDI32(00000000), ref: 00BABF6C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                    • String ID:
                    • API String ID: 641708696-0
                    • Opcode ID: 5da344eb55245b3da1d600fd556c6fc68c009b4fbe861bed0ee51c47a42499e4
                    • Instruction ID: 6b3cf7ef2294ca2a61f6ff394372249c89c88e29b8806933b9bf8be8f2a23168
                    • Opcode Fuzzy Hash: 5da344eb55245b3da1d600fd556c6fc68c009b4fbe861bed0ee51c47a42499e4
                    • Instruction Fuzzy Hash: 9D61AA30114601EFDB259F18CD88B39B7F1FF45312F54C4A9E16697AA1CB32A890DFA1
                    APIs
                      • Part of subcall function 00B725DB: GetWindowLongW.USER32(?,000000EB), ref: 00B725EC
                    • GetSysColor.USER32(0000000F), ref: 00B721D3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ColorLongWindow
                    • String ID:
                    • API String ID: 259745315-0
                    • Opcode ID: 804bcc3c6d2ba44fe4b714ed04abaabf954e18f2652ce5f562694a7ae4fb6659
                    • Instruction ID: 8c4f1300fa0d96dc1954427151d57d858d7526ba953462aa5880fc028da00242
                    • Opcode Fuzzy Hash: 804bcc3c6d2ba44fe4b714ed04abaabf954e18f2652ce5f562694a7ae4fb6659
                    • Instruction Fuzzy Hash: B3416031104140AADB255F28DC88BB93BE5EF16321F2582A5FD799B1E6CB318E42DB61
                    APIs
                    • CharLowerBuffW.USER32(?,?,00BFF910), ref: 00BDAB76
                    • GetDriveTypeW.KERNEL32(00000061,00C2A620,00000061), ref: 00BDAC40
                    • _wcscpy.LIBCMT ref: 00BDAC6A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BuffCharDriveLowerType_wcscpy
                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                    • API String ID: 2820617543-1000479233
                    • Opcode ID: d77bb41c6ebd4c7e3e26608481da20af843d404d08ac955df7c81f3c89c3ed1b
                    • Instruction ID: e9149b27e068c2210889c53917e7421abadb1bb860c3433637738ceb0ded912a
                    • Opcode Fuzzy Hash: d77bb41c6ebd4c7e3e26608481da20af843d404d08ac955df7c81f3c89c3ed1b
                    • Instruction Fuzzy Hash: 00517F301183019FCB10EF14D891AAAF7E5EF85314F5488AEF496572A2EB31D94ACB53
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __i64tow__itow__swprintf
                    • String ID: %.15g$0x%p$False$True
                    • API String ID: 421087845-2263619337
                    • Opcode ID: c9f8cd099e992ddebdeec7a30e0d000a2f1c9a0bc12c8eb28fd1e1ea4b262cea
                    • Instruction ID: d203f5cd0719ad87a95433b5a14e3e565cd99d0d62b7d2a98477fc629a4c949f
                    • Opcode Fuzzy Hash: c9f8cd099e992ddebdeec7a30e0d000a2f1c9a0bc12c8eb28fd1e1ea4b262cea
                    • Instruction Fuzzy Hash: 39419471508606AFEF24AB74D881F7673E4EB45300F2088FEE65DD6291EA71D941D711
                    APIs
                    • _memset.LIBCMT ref: 00BF73D9
                    • CreateMenu.USER32 ref: 00BF73F4
                    • SetMenu.USER32(?,00000000), ref: 00BF7403
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BF7490
                    • IsMenu.USER32(?), ref: 00BF74A6
                    • CreatePopupMenu.USER32 ref: 00BF74B0
                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00BF74DD
                    • DrawMenuBar.USER32 ref: 00BF74E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                    • String ID: 0$F
                    • API String ID: 176399719-3044882817
                    • Opcode ID: 5e926a8126a63cb72c3b4e801223eebd70dfa2f042b6acdc787cfda7589c70a6
                    • Instruction ID: 89ea503d1a8ea78c8b16289acd93a73132242643b86dc2e4ec278eb959576b21
                    • Opcode Fuzzy Hash: 5e926a8126a63cb72c3b4e801223eebd70dfa2f042b6acdc787cfda7589c70a6
                    • Instruction Fuzzy Hash: 08411675A01209EFDB20DF64D884BEABBF9FF49350F1440A9EA5597360DB31A914CBA0
                    APIs
                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00BF77CD
                    • CreateCompatibleDC.GDI32(00000000), ref: 00BF77D4
                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00BF77E7
                    • SelectObject.GDI32(00000000,00000000), ref: 00BF77EF
                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00BF77FA
                    • DeleteDC.GDI32(00000000), ref: 00BF7803
                    • GetWindowLongW.USER32(?,000000EC), ref: 00BF780D
                    • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00BF7821
                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00BF782D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                    • String ID: static
                    • API String ID: 2559357485-2160076837
                    • Opcode ID: df8ff4dbf715bbb184433a9a10df7232c97fffe9518a2a3f38c8dd533a1ca3a2
                    • Instruction ID: 9cb9490a8c21f5faea4cf5119a808f325d327090fbdb4b74df26824328e2c19a
                    • Opcode Fuzzy Hash: df8ff4dbf715bbb184433a9a10df7232c97fffe9518a2a3f38c8dd533a1ca3a2
                    • Instruction Fuzzy Hash: 64316C3210511ABBDF119F75DC09FFA3BA9EF09360F1142A4FA15A71A0CB31D825DBA4
                    APIs
                    • _memset.LIBCMT ref: 00B9707B
                      • Part of subcall function 00B98D68: __getptd_noexit.LIBCMT ref: 00B98D68
                    • __gmtime64_s.LIBCMT ref: 00B97114
                    • __gmtime64_s.LIBCMT ref: 00B9714A
                    • __gmtime64_s.LIBCMT ref: 00B97167
                    • __allrem.LIBCMT ref: 00B971BD
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B971D9
                    • __allrem.LIBCMT ref: 00B971F0
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B9720E
                    • __allrem.LIBCMT ref: 00B97225
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B97243
                    • __invoke_watson.LIBCMT ref: 00B972B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                    • String ID:
                    • API String ID: 384356119-0
                    • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                    • Instruction ID: 5ef2adf280f7314d1bdf1c212c067dbb1e0630ee0f27a5d12874303c714279ce
                    • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                    • Instruction Fuzzy Hash: 6871F871A58716ABDF14DF79CC81B6AB3E8EF52724F1442BAF414E7281EB70DA408790
                    APIs
                    • _memset.LIBCMT ref: 00BD2A31
                    • GetMenuItemInfoW.USER32(00C36890,000000FF,00000000,00000030), ref: 00BD2A92
                    • SetMenuItemInfoW.USER32(00C36890,00000004,00000000,00000030), ref: 00BD2AC8
                    • Sleep.KERNEL32(000001F4), ref: 00BD2ADA
                    • GetMenuItemCount.USER32(?), ref: 00BD2B1E
                    • GetMenuItemID.USER32(?,00000000), ref: 00BD2B3A
                    • GetMenuItemID.USER32(?,-00000001), ref: 00BD2B64
                    • GetMenuItemID.USER32(?,?), ref: 00BD2BA9
                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00BD2BEF
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BD2C03
                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BD2C24
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                    • String ID:
                    • API String ID: 4176008265-0
                    • Opcode ID: 857bceed808882e6cc46a761ffcbc4689450a5acb9780d0619b4695b63ad15e4
                    • Instruction ID: bed02041c0318b316bd6b79a2bb899bac274ddc5380cf11c5ab3d1b57340f577
                    • Opcode Fuzzy Hash: 857bceed808882e6cc46a761ffcbc4689450a5acb9780d0619b4695b63ad15e4
                    • Instruction Fuzzy Hash: BC618FB091428AAFDF11CF64D888EBEBBF8EB61304F14459AE84197351EB71AD05DB20
                    APIs
                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00BF7214
                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00BF7217
                    • GetWindowLongW.USER32(?,000000F0), ref: 00BF723B
                    • _memset.LIBCMT ref: 00BF724C
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00BF725E
                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00BF72D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$LongWindow_memset
                    • String ID:
                    • API String ID: 830647256-0
                    • Opcode ID: a574be9236914ba58df1d9c47630b202c50e03941c0cc8989acf55015b9ef73a
                    • Instruction ID: 6baa917c93a0bcf04e0107f9e77b818ca06a7b8c83d767a3009a4aa2c0552c50
                    • Opcode Fuzzy Hash: a574be9236914ba58df1d9c47630b202c50e03941c0cc8989acf55015b9ef73a
                    • Instruction Fuzzy Hash: B9617C71940208AFDB10DFA4CC81EFE77F8EB09700F144199FA14A72A1CB70AA46DB60
                    APIs
                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00BC7135
                    • SafeArrayAllocData.OLEAUT32(?), ref: 00BC718E
                    • VariantInit.OLEAUT32(?), ref: 00BC71A0
                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00BC71C0
                    • VariantCopy.OLEAUT32(?,?), ref: 00BC7213
                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00BC7227
                    • VariantClear.OLEAUT32(?), ref: 00BC723C
                    • SafeArrayDestroyData.OLEAUT32(?), ref: 00BC7249
                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00BC7252
                    • VariantClear.OLEAUT32(?), ref: 00BC7264
                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00BC726F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                    • String ID:
                    • API String ID: 2706829360-0
                    • Opcode ID: 400d8a41b61d9adfe3057a40e203c2f85e3d7ffe44102af32cc387d321bc0d2f
                    • Instruction ID: 43a1f59317802e63bb07f71dfe9e2582f1ab465538b8c6c62e0484494a559f98
                    • Opcode Fuzzy Hash: 400d8a41b61d9adfe3057a40e203c2f85e3d7ffe44102af32cc387d321bc0d2f
                    • Instruction Fuzzy Hash: D641FC75A04219AFCF04DF64D848EAEBBF9EF48354F0480A9F955AB361DB30A945CF90
                    APIs
                    • WSAStartup.WSOCK32(00000101,?), ref: 00BE5AA6
                    • inet_addr.WSOCK32(?,?,?), ref: 00BE5AEB
                    • gethostbyname.WSOCK32(?), ref: 00BE5AF7
                    • IcmpCreateFile.IPHLPAPI ref: 00BE5B05
                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00BE5B75
                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00BE5B8B
                    • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00BE5C00
                    • WSACleanup.WSOCK32 ref: 00BE5C06
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                    • String ID: Ping
                    • API String ID: 1028309954-2246546115
                    • Opcode ID: 276ba17bf22f9fa10c75cbec25217f19e9d7b420202b03db9acb728462934ec6
                    • Instruction ID: bf1594d15d567892cf48f1271dc0ce911af7d9d58c8c0ec067905519e7bb0a12
                    • Opcode Fuzzy Hash: 276ba17bf22f9fa10c75cbec25217f19e9d7b420202b03db9acb728462934ec6
                    • Instruction Fuzzy Hash: 3E51AF316047019FDB20AF25CC85B2AB7E4EF48714F1489A9F55ADB2A1DB70ED40CB56
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00BDB73B
                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00BDB7B1
                    • GetLastError.KERNEL32 ref: 00BDB7BB
                    • SetErrorMode.KERNEL32(00000000,READY), ref: 00BDB828
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Error$Mode$DiskFreeLastSpace
                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                    • API String ID: 4194297153-14809454
                    • Opcode ID: 6eb6fe85cabcc442d1d6bcb7b3fe1d92447b7a9ade3280f7c5979d2c5aadcda5
                    • Instruction ID: 8f6e44fff6f0aa0a6bacfdb6fff48b201a4a2dbcb592f6d65230040612369f90
                    • Opcode Fuzzy Hash: 6eb6fe85cabcc442d1d6bcb7b3fe1d92447b7a9ade3280f7c5979d2c5aadcda5
                    • Instruction Fuzzy Hash: DC312B35A00209DFDB10EF64D885EBABBF8EF84710F1580AAE516A7391EB719D42CA51
                    APIs
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                      • Part of subcall function 00BCB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00BCB0E7
                    • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00BC94F6
                    • GetDlgCtrlID.USER32 ref: 00BC9501
                    • GetParent.USER32 ref: 00BC951D
                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00BC9520
                    • GetDlgCtrlID.USER32(?), ref: 00BC9529
                    • GetParent.USER32(?), ref: 00BC9545
                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00BC9548
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 1536045017-1403004172
                    • Opcode ID: d9d51e872435699b6dd04c78e149e7367833e0cf5433ea6cfc112a693719b6a9
                    • Instruction ID: 6052857dad196e0909094717641e73ae6201b17be90f4a3a278437ac607e3179
                    • Opcode Fuzzy Hash: d9d51e872435699b6dd04c78e149e7367833e0cf5433ea6cfc112a693719b6a9
                    • Instruction Fuzzy Hash: D321B070A00204BBDF05AB64CCC9EFEBBA4EF59300F1041A9F962972A2DF755919DA20
                    APIs
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                      • Part of subcall function 00BCB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00BCB0E7
                    • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00BC95DF
                    • GetDlgCtrlID.USER32 ref: 00BC95EA
                    • GetParent.USER32 ref: 00BC9606
                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00BC9609
                    • GetDlgCtrlID.USER32(?), ref: 00BC9612
                    • GetParent.USER32(?), ref: 00BC962E
                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00BC9631
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$CtrlParent$ClassName_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 1536045017-1403004172
                    • Opcode ID: 68f9bd5fad043500773b9132f305471161453077d6c060027c4ed0546aa1c5fb
                    • Instruction ID: 3d39e8beb2484805c10086e8a5e8897f871efc7d67358ccb9e8a9fb041cc1646
                    • Opcode Fuzzy Hash: 68f9bd5fad043500773b9132f305471161453077d6c060027c4ed0546aa1c5fb
                    • Instruction Fuzzy Hash: F1218375A00204BBDF05AB60CCC5EFEBBB8EF58300F1041A9F961972E1DF759919DA20
                    APIs
                    • GetParent.USER32 ref: 00BC9651
                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00BC9666
                    • _wcscmp.LIBCMT ref: 00BC9678
                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00BC96F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ClassMessageNameParentSend_wcscmp
                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                    • API String ID: 1704125052-3381328864
                    • Opcode ID: bd1234a6cbc80fe2eedd1b91c7b826556fc02035f6c85e022110a16cdef262c5
                    • Instruction ID: 83e25296c20e591e1812da50d1e9039571e7dff9007404f62873ad3f92fad060
                    • Opcode Fuzzy Hash: bd1234a6cbc80fe2eedd1b91c7b826556fc02035f6c85e022110a16cdef262c5
                    • Instruction Fuzzy Hash: 3611CA76248327BAFB012620EC4EEB677DCDF05760F2001BAF900E54E1FE6159519558
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00BE8BEC
                    • CoInitialize.OLE32(00000000), ref: 00BE8C19
                    • CoUninitialize.OLE32 ref: 00BE8C23
                    • GetRunningObjectTable.OLE32(00000000,?), ref: 00BE8D23
                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00BE8E50
                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00C02C0C), ref: 00BE8E84
                    • CoGetObject.OLE32(?,00000000,00C02C0C,?), ref: 00BE8EA7
                    • SetErrorMode.KERNEL32(00000000), ref: 00BE8EBA
                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00BE8F3A
                    • VariantClear.OLEAUT32(?), ref: 00BE8F4A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                    • String ID:
                    • API String ID: 2395222682-0
                    • Opcode ID: 97adbab6084f88834d1d6c4fe1c3b9ee3ea1528b654108230f4291e18daa036a
                    • Instruction ID: adc7821d6757523aefd906f67c7d50271271ba27e0659eec0766481937dee3a8
                    • Opcode Fuzzy Hash: 97adbab6084f88834d1d6c4fe1c3b9ee3ea1528b654108230f4291e18daa036a
                    • Instruction Fuzzy Hash: 07C14471208745AFD700DF65C88492BB7E9FF88748F0089ADF58A9B261DB71ED05CB52
                    APIs
                    • __swprintf.LIBCMT ref: 00BD419D
                    • __swprintf.LIBCMT ref: 00BD41AA
                      • Part of subcall function 00B938D8: __woutput_l.LIBCMT ref: 00B93931
                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 00BD41D4
                    • LoadResource.KERNEL32(?,00000000), ref: 00BD41E0
                    • LockResource.KERNEL32(00000000), ref: 00BD41ED
                    • FindResourceW.KERNEL32(?,?,00000003), ref: 00BD420D
                    • LoadResource.KERNEL32(?,00000000), ref: 00BD421F
                    • SizeofResource.KERNEL32(?,00000000), ref: 00BD422E
                    • LockResource.KERNEL32(?), ref: 00BD423A
                    • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00BD429B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                    • String ID:
                    • API String ID: 1433390588-0
                    • Opcode ID: fd7e690876cf4609109d1d9f82df3e6c1c55b6d10a01d75d9216125c18cf54dd
                    • Instruction ID: c54298373a89f74d4c6dddc85ee56ce98ee0d1e65202a7ccbd2454c00e4c8c51
                    • Opcode Fuzzy Hash: fd7e690876cf4609109d1d9f82df3e6c1c55b6d10a01d75d9216125c18cf54dd
                    • Instruction Fuzzy Hash: 65318EB560521AABDB159F61DC89ABFBBECEF04301F004566F915D3250EB30DA61CBB4
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 00BD1700
                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00BD0778,?,00000001), ref: 00BD1714
                    • GetWindowThreadProcessId.USER32(00000000), ref: 00BD171B
                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00BD0778,?,00000001), ref: 00BD172A
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00BD173C
                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00BD0778,?,00000001), ref: 00BD1755
                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00BD0778,?,00000001), ref: 00BD1767
                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00BD0778,?,00000001), ref: 00BD17AC
                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00BD0778,?,00000001), ref: 00BD17C1
                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00BD0778,?,00000001), ref: 00BD17CC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                    • String ID:
                    • API String ID: 2156557900-0
                    • Opcode ID: 7890ffd0b5d9afd48e835d62f576c8eb0a89b72994b0a3feeea65cad86a84ff0
                    • Instruction ID: b9522f8f815d23aee1ffb626fb8baf81afed165aac767d57cfadbf2d58e634d6
                    • Opcode Fuzzy Hash: 7890ffd0b5d9afd48e835d62f576c8eb0a89b72994b0a3feeea65cad86a84ff0
                    • Instruction Fuzzy Hash: 9C3180B5614204BBDB219F98DC88BB9B7EAFB59711F104556F804DB3B0EB749D80CB60
                    APIs
                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00B7FC06
                    • OleUninitialize.OLE32(?,00000000), ref: 00B7FCA5
                    • UnregisterHotKey.USER32(?), ref: 00B7FDFC
                    • DestroyWindow.USER32(?), ref: 00BB4A00
                    • FreeLibrary.KERNEL32(?), ref: 00BB4A65
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BB4A92
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                    • String ID: close all
                    • API String ID: 469580280-3243417748
                    • Opcode ID: 2e9ddf30fd9759eb1aecdcd651e090fbcdff96d278df9e8955d90aef2703fc17
                    • Instruction ID: d081e1c8e127002e6a6d4216349d38b1eb4f39996c9ba9928188c4a2e355650f
                    • Opcode Fuzzy Hash: 2e9ddf30fd9759eb1aecdcd651e090fbcdff96d278df9e8955d90aef2703fc17
                    • Instruction Fuzzy Hash: E0A118317012128FCB29EB14C595A79F7E5FF04740F1482EDE91AAB262DB70AD16CF58
                    APIs
                    • EnumChildWindows.USER32(?,00BCAA64), ref: 00BCA9A2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ChildEnumWindows
                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                    • API String ID: 3555792229-1603158881
                    • Opcode ID: 9ed987bee35a61e7088f0b873849a8ea90e3f2c35b8fbe6af7ca5c936bfb8299
                    • Instruction ID: 880c88c8bef79fb6438eb7fa316a80d2504a7c3038c0ea39b298a29129726e43
                    • Opcode Fuzzy Hash: 9ed987bee35a61e7088f0b873849a8ea90e3f2c35b8fbe6af7ca5c936bfb8299
                    • Instruction Fuzzy Hash: E8916470A0050AABDF18DF60C482FE9FBF4FF04308F5481A9E99AA7551DF706999CB91
                    APIs
                    • SetWindowLongW.USER32(?,000000EB), ref: 00B72EAE
                      • Part of subcall function 00B71DB3: GetClientRect.USER32(?,?), ref: 00B71DDC
                      • Part of subcall function 00B71DB3: GetWindowRect.USER32(?,?), ref: 00B71E1D
                      • Part of subcall function 00B71DB3: ScreenToClient.USER32(?,?), ref: 00B71E45
                    • GetDC.USER32 ref: 00BACF82
                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00BACF95
                    • SelectObject.GDI32(00000000,00000000), ref: 00BACFA3
                    • SelectObject.GDI32(00000000,00000000), ref: 00BACFB8
                    • ReleaseDC.USER32(?,00000000), ref: 00BACFC0
                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00BAD04B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                    • String ID: U
                    • API String ID: 4009187628-3372436214
                    • Opcode ID: 39eaa66197db71b11a55c18ac5e64bcb9b7e65a1bbba754e7c5105a4667db8cc
                    • Instruction ID: cec3118c74e5cd84b1528aa32e9fdb57153d8bfe52ea69d7080a7523483da52a
                    • Opcode Fuzzy Hash: 39eaa66197db71b11a55c18ac5e64bcb9b7e65a1bbba754e7c5105a4667db8cc
                    • Instruction Fuzzy Hash: DD71A330504205EFCF218F64C895ABA7BF6FF4A350F1482EAED569B2A5C7318C45DB61
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                      • Part of subcall function 00B72344: GetCursorPos.USER32(?), ref: 00B72357
                      • Part of subcall function 00B72344: ScreenToClient.USER32(00C367B0,?), ref: 00B72374
                      • Part of subcall function 00B72344: GetAsyncKeyState.USER32(00000001), ref: 00B72399
                      • Part of subcall function 00B72344: GetAsyncKeyState.USER32(00000002), ref: 00B723A7
                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00BFC2E4
                    • ImageList_EndDrag.COMCTL32 ref: 00BFC2EA
                    • ReleaseCapture.USER32 ref: 00BFC2F0
                    • SetWindowTextW.USER32(?,00000000), ref: 00BFC39A
                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00BFC3AD
                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00BFC48F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                    • API String ID: 1924731296-2107944366
                    • Opcode ID: 78893e2ac8cae4d043487783996dadfd5999fe47d0af3b3ae549cacc3a26e370
                    • Instruction ID: b1b4d325cf773c08664046345e5814dec063adabc305d0d21a1600d51d3c9eeb
                    • Opcode Fuzzy Hash: 78893e2ac8cae4d043487783996dadfd5999fe47d0af3b3ae549cacc3a26e370
                    • Instruction Fuzzy Hash: D6516D70604309AFDB14DF24C895F7A7BE5EF88310F10856DF6A58B2E1DB71A948CB52
                    APIs
                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00BFF910), ref: 00BE903D
                    • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00BFF910), ref: 00BE9071
                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00BE91EB
                    • SysFreeString.OLEAUT32(?), ref: 00BE9215
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Free$FileLibraryModuleNamePathQueryStringType
                    • String ID:
                    • API String ID: 560350794-0
                    • Opcode ID: 88904452ed0434f13d3197c129dacad2b9aa3ca5d7eda6bd07c328f6a4ef3d81
                    • Instruction ID: f12db89fc57f8984f4ca3a67917799331e1725de205f9059e8d505664160db15
                    • Opcode Fuzzy Hash: 88904452ed0434f13d3197c129dacad2b9aa3ca5d7eda6bd07c328f6a4ef3d81
                    • Instruction Fuzzy Hash: 20F14C71A00209EFDF04DF95C888EAEB7B9FF49314F108499F915AB291DB31AE49CB50
                    APIs
                    • _memset.LIBCMT ref: 00BEF9C9
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00BEFB5C
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00BEFB80
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00BEFBC0
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00BEFBE2
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00BEFD5E
                    • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00BEFD90
                    • CloseHandle.KERNEL32(?), ref: 00BEFDBF
                    • CloseHandle.KERNEL32(?), ref: 00BEFE36
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                    • String ID:
                    • API String ID: 4090791747-0
                    • Opcode ID: 9e6cfd141034ca3b74ac78cc77d2ed3deb6c2edcb2e9903faeb8d263dfec4cb5
                    • Instruction ID: 74a39d2816f27abede26dc758752952641eb9502ee31f01cc521171ef61be67d
                    • Opcode Fuzzy Hash: 9e6cfd141034ca3b74ac78cc77d2ed3deb6c2edcb2e9903faeb8d263dfec4cb5
                    • Instruction Fuzzy Hash: 8FE191316042429FCB14EF25C891A7ABBE1EF84354F1485BDF8999B3A2DB31EC45CB52
                    APIs
                      • Part of subcall function 00BD48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00BD38D3,?), ref: 00BD48C7
                      • Part of subcall function 00BD48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00BD38D3,?), ref: 00BD48E0
                      • Part of subcall function 00BD4CD3: GetFileAttributesW.KERNEL32(?,00BD3947), ref: 00BD4CD4
                    • lstrcmpiW.KERNEL32(?,?), ref: 00BD4FE2
                    • _wcscmp.LIBCMT ref: 00BD4FFC
                    • MoveFileW.KERNEL32(?,?), ref: 00BD5017
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                    • String ID:
                    • API String ID: 793581249-0
                    • Opcode ID: a5491247d916692b643597d1c7725ac63e31a0bea9494f697f5075ef37dffde6
                    • Instruction ID: 5587b095facdfb7ccbb95117ddba4862ff3a30e1f1e164cb864e6387ddd622a9
                    • Opcode Fuzzy Hash: a5491247d916692b643597d1c7725ac63e31a0bea9494f697f5075ef37dffde6
                    • Instruction Fuzzy Hash: 295151B24087859BC724EBA0C8819DFF3ECEF84340F14496FB199D7251EF75A6888766
                    APIs
                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00BF896E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: InvalidateRect
                    • String ID:
                    • API String ID: 634782764-0
                    • Opcode ID: 1f4af682fca2d929f6766ab6d463d5fcf75d0f0e3603b35fc7d8cf4b07d8c502
                    • Instruction ID: 9824939377e636f3d08592699030680370c011bc3fcb25ea5413114675404865
                    • Opcode Fuzzy Hash: 1f4af682fca2d929f6766ab6d463d5fcf75d0f0e3603b35fc7d8cf4b07d8c502
                    • Instruction Fuzzy Hash: 69517030A0020DBADF209F28CC85BB97BE5EF05350F608196FB15E71A1DF71A998DB91
                    APIs
                    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00BAC547
                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00BAC569
                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00BAC581
                    • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00BAC59F
                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00BAC5C0
                    • DestroyIcon.USER32(00000000), ref: 00BAC5CF
                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00BAC5EC
                    • DestroyIcon.USER32(?), ref: 00BAC5FB
                      • Part of subcall function 00BFA71E: DeleteObject.GDI32(00000000), ref: 00BFA757
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                    • String ID:
                    • API String ID: 2819616528-0
                    • Opcode ID: 3f5e99d318f2e8cca359eb4a8d20dfc1312536116543663f4d4202672fbca414
                    • Instruction ID: 0bb5c70a062a9a91d36f9ec04e9180d85215c6ec0d681fe44838a86ef0daba31
                    • Opcode Fuzzy Hash: 3f5e99d318f2e8cca359eb4a8d20dfc1312536116543663f4d4202672fbca414
                    • Instruction Fuzzy Hash: 56514970A00209AFDB24DF24CC86BBA7BF5EF59310F1085A9F916972A0DB70ED90DB50
                    APIs
                    • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00BC8A84,00000B00,?,?), ref: 00BC8E0C
                    • HeapAlloc.KERNEL32(00000000,?,00BC8A84,00000B00,?,?), ref: 00BC8E13
                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00BC8A84,00000B00,?,?), ref: 00BC8E28
                    • GetCurrentProcess.KERNEL32(?,00000000,?,00BC8A84,00000B00,?,?), ref: 00BC8E30
                    • DuplicateHandle.KERNEL32(00000000,?,00BC8A84,00000B00,?,?), ref: 00BC8E33
                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00BC8A84,00000B00,?,?), ref: 00BC8E43
                    • GetCurrentProcess.KERNEL32(00BC8A84,00000000,?,00BC8A84,00000B00,?,?), ref: 00BC8E4B
                    • DuplicateHandle.KERNEL32(00000000,?,00BC8A84,00000B00,?,?), ref: 00BC8E4E
                    • CreateThread.KERNEL32(00000000,00000000,00BC8E74,00000000,00000000,00000000), ref: 00BC8E68
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                    • String ID:
                    • API String ID: 1957940570-0
                    • Opcode ID: c623ffc7268015835dda13d8b2f34bf787fdb5960213748eca6e307fc71c594b
                    • Instruction ID: 4268a354dcbc51311d9393d0e60e02603a9a983ce9bb0ec0c205f388ab8d7245
                    • Opcode Fuzzy Hash: c623ffc7268015835dda13d8b2f34bf787fdb5960213748eca6e307fc71c594b
                    • Instruction Fuzzy Hash: 6801A8B5240309FFEA10ABA5DC89F7B3BACEF89711F004421FA05DB2A1CA709910CA20
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Variant$ClearInit$_memset
                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                    • API String ID: 2862541840-625585964
                    • Opcode ID: c00b4a2ff1f54e333ad1300a6d30b56bd879548852ebed3104b0ed48ad07478e
                    • Instruction ID: ac6cc9ca6125c99bde1a363fa04c89b8d5a7225861a0492e779e66c8db569ecb
                    • Opcode Fuzzy Hash: c00b4a2ff1f54e333ad1300a6d30b56bd879548852ebed3104b0ed48ad07478e
                    • Instruction Fuzzy Hash: 3891B271A00255AFDF24DFA6D884FAEB7F8EF45710F1081AAF515AB280D7709949CFA0
                    APIs
                      • Part of subcall function 00BC7652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BC758C,80070057,?,?,?,00BC799D), ref: 00BC766F
                      • Part of subcall function 00BC7652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BC758C,80070057,?,?), ref: 00BC768A
                      • Part of subcall function 00BC7652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BC758C,80070057,?,?), ref: 00BC7698
                      • Part of subcall function 00BC7652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BC758C,80070057,?), ref: 00BC76A8
                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00BE9B1B
                    • _memset.LIBCMT ref: 00BE9B28
                    • _memset.LIBCMT ref: 00BE9C6B
                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00BE9C97
                    • CoTaskMemFree.OLE32(?), ref: 00BE9CA2
                    Strings
                    • NULL Pointer assignment, xrefs: 00BE9CF0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                    • String ID: NULL Pointer assignment
                    • API String ID: 1300414916-2785691316
                    • Opcode ID: 7a8d83533d58c983d70ec00b4e4f44ae52c09c9d20819d49a18b78804df5b3a9
                    • Instruction ID: d970b76c4710b2197d7d6bc47993ea38f1e587211426abcb19ad4fbd5f91b794
                    • Opcode Fuzzy Hash: 7a8d83533d58c983d70ec00b4e4f44ae52c09c9d20819d49a18b78804df5b3a9
                    • Instruction Fuzzy Hash: 59911A71D00229ABDF10DFA5DC85ADEBBF9EF08710F2081AAE519A7241DB715A44CFA0
                    APIs
                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00BF7093
                    • SendMessageW.USER32(?,00001036,00000000,?), ref: 00BF70A7
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00BF70C1
                    • _wcscat.LIBCMT ref: 00BF711C
                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00BF7133
                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00BF7161
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$Window_wcscat
                    • String ID: SysListView32
                    • API String ID: 307300125-78025650
                    • Opcode ID: 850978ab9ab12c3b7a453ed88e9928b33859eef98b7453077d33ceaa1ca38dac
                    • Instruction ID: 6534a264c49c02dd2e6edafe502c40da50ccfcb56a5bc4895707364bcce3ee89
                    • Opcode Fuzzy Hash: 850978ab9ab12c3b7a453ed88e9928b33859eef98b7453077d33ceaa1ca38dac
                    • Instruction Fuzzy Hash: 2A416F71944309ABDB219F64CC85BFE77E8EF08350F1045AAF644E7291DA719D88CB60
                    APIs
                      • Part of subcall function 00BD3E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00BD3EB6
                      • Part of subcall function 00BD3E91: Process32FirstW.KERNEL32(00000000,?), ref: 00BD3EC4
                      • Part of subcall function 00BD3E91: CloseHandle.KERNEL32(00000000), ref: 00BD3F8E
                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00BEECB8
                    • GetLastError.KERNEL32 ref: 00BEECCB
                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00BEECFA
                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00BEED77
                    • GetLastError.KERNEL32(00000000), ref: 00BEED82
                    • CloseHandle.KERNEL32(00000000), ref: 00BEEDB7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                    • String ID: SeDebugPrivilege
                    • API String ID: 2533919879-2896544425
                    • Opcode ID: 99a36b20fb2b0642f17b7b4da4d00a081c8cabba39830cc96d2049868d91d09e
                    • Instruction ID: 64e99e2a010b802fb6b71841931c650122f26281d8739ce707829428956530e8
                    • Opcode Fuzzy Hash: 99a36b20fb2b0642f17b7b4da4d00a081c8cabba39830cc96d2049868d91d09e
                    • Instruction Fuzzy Hash: 9A4174712002029FDB15EF24CC95F7AB7E1AF80714F0880A9F9569B292DBB5A904CB96
                    APIs
                    • LoadIconW.USER32(00000000,00007F03), ref: 00BD32C5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: IconLoad
                    • String ID: blank$info$question$stop$warning
                    • API String ID: 2457776203-404129466
                    • Opcode ID: 76391982e99ce98ce2953eecb9f3ad930a684f0b96a395acc33b44929cd3a69b
                    • Instruction ID: b463a86295add4a6e33a8569dd30bb329f90fa44680be7fe634db5b99bb259b9
                    • Opcode Fuzzy Hash: 76391982e99ce98ce2953eecb9f3ad930a684f0b96a395acc33b44929cd3a69b
                    • Instruction Fuzzy Hash: 2D11EB35A48356BB9B016A54EC82C6BF3DCDF19B70F2000BBF504B6383F6655B4045A6
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00BD454E
                    • LoadStringW.USER32(00000000), ref: 00BD4555
                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00BD456B
                    • LoadStringW.USER32(00000000), ref: 00BD4572
                    • _wprintf.LIBCMT ref: 00BD4598
                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00BD45B6
                    Strings
                    • %s (%d) : ==> %s: %s %s, xrefs: 00BD4593
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: HandleLoadModuleString$Message_wprintf
                    • String ID: %s (%d) : ==> %s: %s %s
                    • API String ID: 3648134473-3128320259
                    • Opcode ID: b650a2e371fa0cafa756c12943c41d1b92977eb6775f6ff59ed6ef20a74a60b8
                    • Instruction ID: 7e32d95c053ed1a3aecede56d93c7495f18eec7743f0e5743d231d22bb3c79cc
                    • Opcode Fuzzy Hash: b650a2e371fa0cafa756c12943c41d1b92977eb6775f6ff59ed6ef20a74a60b8
                    • Instruction Fuzzy Hash: C7014FF2900209BFE710A7A49D89EF677ACDB08701F0005A6BB45E3151EE749E85CB75
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                    • GetSystemMetrics.USER32(0000000F), ref: 00BFD78A
                    • GetSystemMetrics.USER32(0000000F), ref: 00BFD7AA
                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00BFD9E5
                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00BFDA03
                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00BFDA24
                    • ShowWindow.USER32(00000003,00000000), ref: 00BFDA43
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00BFDA68
                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00BFDA8B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                    • String ID:
                    • API String ID: 1211466189-0
                    • Opcode ID: 88aa55a055ba86e1518ad8743dba7bc2d2f6b8c1315a6aacabf586c8eeaa8c82
                    • Instruction ID: 77dfcda9b25e911282e8fd0a638797afd2fae7bce8644cd5bd16792f16c8e2e8
                    • Opcode Fuzzy Hash: 88aa55a055ba86e1518ad8743dba7bc2d2f6b8c1315a6aacabf586c8eeaa8c82
                    • Instruction Fuzzy Hash: 3DB1687160021AABDF14CF68C9857BD7BF2FF04701F08C1A9EE489B295DB74A958CB60
                    APIs
                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00BAC417,00000004,00000000,00000000,00000000), ref: 00B72ACF
                    • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00BAC417,00000004,00000000,00000000,00000000,000000FF), ref: 00B72B17
                    • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00BAC417,00000004,00000000,00000000,00000000), ref: 00BAC46A
                    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00BAC417,00000004,00000000,00000000,00000000), ref: 00BAC4D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ShowWindow
                    • String ID:
                    • API String ID: 1268545403-0
                    • Opcode ID: ee35cbe485aa442726b8c03d67228aebed23bf32ef81a4a56ab5a7cda2f87402
                    • Instruction ID: cbb00b6e7bf881b14231a0e674dd59c47c66ae1c8127d1b2c1cf4431f847e560
                    • Opcode Fuzzy Hash: ee35cbe485aa442726b8c03d67228aebed23bf32ef81a4a56ab5a7cda2f87402
                    • Instruction Fuzzy Hash: 4B410930608B81AEC7358B288CD9B7A7FD2EF4A300F28C8DDE06F87661CA759845D711
                    APIs
                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 00BD737F
                      • Part of subcall function 00B90FF6: std::exception::exception.LIBCMT ref: 00B9102C
                      • Part of subcall function 00B90FF6: __CxxThrowException@8.LIBCMT ref: 00B91041
                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00BD73B6
                    • EnterCriticalSection.KERNEL32(?), ref: 00BD73D2
                    • _memmove.LIBCMT ref: 00BD7420
                    • _memmove.LIBCMT ref: 00BD743D
                    • LeaveCriticalSection.KERNEL32(?), ref: 00BD744C
                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00BD7461
                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00BD7480
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                    • String ID:
                    • API String ID: 256516436-0
                    • Opcode ID: 923e1eca28d274cbf18ae3b62f55f566d40746a0e6627bcf74a3bd830fd3f2bb
                    • Instruction ID: 3b8ca1454f93c39f65c8c067e0463bfe3d54e4aa6f82b19e3d5c12c8ed14e0dd
                    • Opcode Fuzzy Hash: 923e1eca28d274cbf18ae3b62f55f566d40746a0e6627bcf74a3bd830fd3f2bb
                    • Instruction Fuzzy Hash: 13318131904206EBCF10EF58DC85ABEBBB8EF44710B1441F5F904AB246EB319A10DBA4
                    APIs
                    • DeleteObject.GDI32(00000000), ref: 00BF645A
                    • GetDC.USER32(00000000), ref: 00BF6462
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BF646D
                    • ReleaseDC.USER32(00000000,00000000), ref: 00BF6479
                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00BF64B5
                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00BF64C6
                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00BF9299,?,?,000000FF,00000000,?,000000FF,?), ref: 00BF6500
                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00BF6520
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                    • String ID:
                    • API String ID: 3864802216-0
                    • Opcode ID: c66370d4b29b53c68dddee404aaef2218147c27581ad864fb8da2e1a7160c5ac
                    • Instruction ID: d8e7c340ba6f2560f8bfa57a99098bc63dd46f25d84ec8241ebc0fb6616dc79c
                    • Opcode Fuzzy Hash: c66370d4b29b53c68dddee404aaef2218147c27581ad864fb8da2e1a7160c5ac
                    • Instruction Fuzzy Hash: 3B315C72201218BFEB118F54CC8AFBA3BA9EF19761F044065FE08EB295DA759841CB64
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memcmp
                    • String ID:
                    • API String ID: 2931989736-0
                    • Opcode ID: 4fa53bbdbb6c142e767a6a8d73a0133307866551ebca33c59924b6b020ce426f
                    • Instruction ID: bc91474fba253731881aedd5af24f00d7ba077491f116f931bd8f75ec2c155db
                    • Opcode Fuzzy Hash: 4fa53bbdbb6c142e767a6a8d73a0133307866551ebca33c59924b6b020ce426f
                    • Instruction Fuzzy Hash: 5421A762A00206B7EA15A5258D86FAF3BDCEF30394B0840B9FE0D962C2E751DD11D2A5
                    APIs
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                      • Part of subcall function 00B8FEC6: _wcscpy.LIBCMT ref: 00B8FEE9
                    • _wcstok.LIBCMT ref: 00BDEEFF
                    • _wcscpy.LIBCMT ref: 00BDEF8E
                    • _memset.LIBCMT ref: 00BDEFC1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                    • String ID: X
                    • API String ID: 774024439-3081909835
                    • Opcode ID: 2f5d0f13737c527218dff8b8cf5becda2bd926c185bbf3c5dd26e72fa3b53f53
                    • Instruction ID: b73508ccd44a5f7fac5d148bba23cae822e4571ae33414981e93e448882c6983
                    • Opcode Fuzzy Hash: 2f5d0f13737c527218dff8b8cf5becda2bd926c185bbf3c5dd26e72fa3b53f53
                    • Instruction Fuzzy Hash: E5C153715083019FD724EF24C881A6AF7E4EF85310F1489ADF5AA9B3A2DB70ED45CB52
                    APIs
                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00BE6F14
                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00BE6F35
                    • WSAGetLastError.WSOCK32(00000000), ref: 00BE6F48
                    • htons.WSOCK32(?,?,?,00000000,?), ref: 00BE6FFE
                    • inet_ntoa.WSOCK32(?), ref: 00BE6FBB
                      • Part of subcall function 00BCAE14: _strlen.LIBCMT ref: 00BCAE1E
                      • Part of subcall function 00BCAE14: _memmove.LIBCMT ref: 00BCAE40
                    • _strlen.LIBCMT ref: 00BE7058
                    • _memmove.LIBCMT ref: 00BE70C1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                    • String ID:
                    • API String ID: 3619996494-0
                    • Opcode ID: 80a5778101cf8bc56bf547b4f18642191c94a68a194d53167f1a9733a77ae048
                    • Instruction ID: e86f1f73685e38bcbd5ae1dd36bd9e7d150fe33a5439faf906e7174cbf177899
                    • Opcode Fuzzy Hash: 80a5778101cf8bc56bf547b4f18642191c94a68a194d53167f1a9733a77ae048
                    • Instruction Fuzzy Hash: 1E81D131508340ABD710EB25CC85E6BB7E9EF84714F1089ADF56A9B2A2DF709D05CB92
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 222a8a70f52a55c4bc5321a6f2d0d5653ea2198f3a15a2b4566a2a2ec075bf60
                    • Instruction ID: 35d86905f4ce835922f367b881e012265d186836b98f55be9d213eed833707c3
                    • Opcode Fuzzy Hash: 222a8a70f52a55c4bc5321a6f2d0d5653ea2198f3a15a2b4566a2a2ec075bf60
                    • Instruction Fuzzy Hash: 87714B70904109EFCB148F9DC889EBEBBB9FF85310F14C599E929AB251C734AA51CF64
                    APIs
                    • IsWindow.USER32(016954A0), ref: 00BFB6A5
                    • IsWindowEnabled.USER32(016954A0), ref: 00BFB6B1
                    • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00BFB795
                    • SendMessageW.USER32(016954A0,000000B0,?,?), ref: 00BFB7CC
                    • IsDlgButtonChecked.USER32(?,?), ref: 00BFB809
                    • GetWindowLongW.USER32(016954A0,000000EC), ref: 00BFB82B
                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00BFB843
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                    • String ID:
                    • API String ID: 4072528602-0
                    • Opcode ID: 2786394aec2ea4f27ebc64db6e24c9ecbdabf0bc98657007d68738aca25ba124
                    • Instruction ID: b089282ff3a3b8b7cb3f76ac19ef49be79a673540fe52cc1187e782f8e0bca43
                    • Opcode Fuzzy Hash: 2786394aec2ea4f27ebc64db6e24c9ecbdabf0bc98657007d68738aca25ba124
                    • Instruction Fuzzy Hash: 48717D74604209BFDB24AF64C8D4FBABBF9FF49300F1440A9EA55972A1CB31AD49CB54
                    APIs
                    • _memset.LIBCMT ref: 00BEF75C
                    • _memset.LIBCMT ref: 00BEF825
                    • ShellExecuteExW.SHELL32(?), ref: 00BEF86A
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                      • Part of subcall function 00B8FEC6: _wcscpy.LIBCMT ref: 00B8FEE9
                    • GetProcessId.KERNEL32(00000000), ref: 00BEF8E1
                    • CloseHandle.KERNEL32(00000000), ref: 00BEF910
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                    • String ID: @
                    • API String ID: 3522835683-2766056989
                    • Opcode ID: 8c5fc0295edd88c5836e5e3e954908ac8473d3d468009e0541c592dac5d3d08c
                    • Instruction ID: 5b1169eac3eae11c2e1ce383f10daa7d11ec899718013d9cdd89d1de28265f70
                    • Opcode Fuzzy Hash: 8c5fc0295edd88c5836e5e3e954908ac8473d3d468009e0541c592dac5d3d08c
                    • Instruction Fuzzy Hash: 10618F75A0065ADFCF14EF55C481AAEBBF5FF48310F1484A9E85AAB351CB31AE41CB90
                    APIs
                    • GetParent.USER32(?), ref: 00BD149C
                    • GetKeyboardState.USER32(?), ref: 00BD14B1
                    • SetKeyboardState.USER32(?), ref: 00BD1512
                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 00BD1540
                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 00BD155F
                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00BD15A5
                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00BD15C8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: 2ce0c7a1d99f339d1d2991eb6b7b445ad65258701269cd27d478b9022ac7ee8c
                    • Instruction ID: 321c326f4361f800ea8458df1309afa40bcce0ccc2132972a7fc459e3a568f5f
                    • Opcode Fuzzy Hash: 2ce0c7a1d99f339d1d2991eb6b7b445ad65258701269cd27d478b9022ac7ee8c
                    • Instruction Fuzzy Hash: BD51E5A06047D63DFB36463C8C45BB6FEE99B46304F0848CAE1D556AD2E698EC84DB50
                    APIs
                    • GetParent.USER32(00000000), ref: 00BD12B5
                    • GetKeyboardState.USER32(?), ref: 00BD12CA
                    • SetKeyboardState.USER32(?), ref: 00BD132B
                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00BD1357
                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00BD1374
                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00BD13B8
                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00BD13D9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: c137e4409d9125473110380397fcf7132a735ec962b8edaccbd5a197748946e9
                    • Instruction ID: 5f6a5274e2ef96cf2ec8fb7f12171443ab080163cfbc2dda2d1023500f610c0e
                    • Opcode Fuzzy Hash: c137e4409d9125473110380397fcf7132a735ec962b8edaccbd5a197748946e9
                    • Instruction Fuzzy Hash: 2B5126A05047D63DFB3287288C41B7AFFE99F06310F0888CAE1D856AC2E795EC94D754
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _wcsncpy$LocalTime
                    • String ID:
                    • API String ID: 2945705084-0
                    • Opcode ID: 50b1c420be89c4d2079c16bfb28f38ef8660e29d28876579d19bcb14fa7ecc17
                    • Instruction ID: f42054fbd209016ce0e68befb8ce7cf13e99d268daa0e8cc5281a7f8acf57c0e
                    • Opcode Fuzzy Hash: 50b1c420be89c4d2079c16bfb28f38ef8660e29d28876579d19bcb14fa7ecc17
                    • Instruction Fuzzy Hash: CE413E65C2062876CF11EBB48886DCFB7E8AF05710F5095A6F518E3221F734E715C7AA
                    APIs
                      • Part of subcall function 00BD48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00BD38D3,?), ref: 00BD48C7
                      • Part of subcall function 00BD48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00BD38D3,?), ref: 00BD48E0
                    • lstrcmpiW.KERNEL32(?,?), ref: 00BD38F3
                    • _wcscmp.LIBCMT ref: 00BD390F
                    • MoveFileW.KERNEL32(?,?), ref: 00BD3927
                    • _wcscat.LIBCMT ref: 00BD396F
                    • SHFileOperationW.SHELL32(?), ref: 00BD39DB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                    • String ID: \*.*
                    • API String ID: 1377345388-1173974218
                    • Opcode ID: 7172341d51ff2e195aec192ff45db4ff4f629b4b7f7112538efe0b3bda918f25
                    • Instruction ID: 6abe600e6bb2fb09b0c92d6c9eb563b31795ec81ccb4e7c1fd9ea9c599a28cc5
                    • Opcode Fuzzy Hash: 7172341d51ff2e195aec192ff45db4ff4f629b4b7f7112538efe0b3bda918f25
                    • Instruction Fuzzy Hash: 9C417EB14093449AC751EF64C491AEBF7E8EF88740F4409AFB48AC3252FB78D688C752
                    APIs
                    • _memset.LIBCMT ref: 00BF7519
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BF75C0
                    • IsMenu.USER32(?), ref: 00BF75D8
                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00BF7620
                    • DrawMenuBar.USER32 ref: 00BF7633
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Menu$Item$DrawInfoInsert_memset
                    • String ID: 0
                    • API String ID: 3866635326-4108050209
                    • Opcode ID: 1aa93808aa4b3e16c8318e3e7ef6b0cdf86bcf7ee3591e1cba3a1a124a77a87c
                    • Instruction ID: 6bd38599a6dd77cba09a4f5afac0ae3a54507ef87ea54a73af124fc22bf2e9bf
                    • Opcode Fuzzy Hash: 1aa93808aa4b3e16c8318e3e7ef6b0cdf86bcf7ee3591e1cba3a1a124a77a87c
                    • Instruction Fuzzy Hash: A4411B75A04609EFDB10DF94D884EAABBF9FF08354F0481A9EA5597390DB30AD54CFA0
                    APIs
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00BF125C
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00BF1286
                    • FreeLibrary.KERNEL32(00000000), ref: 00BF133D
                      • Part of subcall function 00BF122D: RegCloseKey.ADVAPI32(?), ref: 00BF12A3
                      • Part of subcall function 00BF122D: FreeLibrary.KERNEL32(?), ref: 00BF12F5
                      • Part of subcall function 00BF122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00BF1318
                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00BF12E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: EnumFreeLibrary$CloseDeleteOpen
                    • String ID:
                    • API String ID: 395352322-0
                    • Opcode ID: bd03b53d90dacc85a48103f00d4795e1d8226f5608b8cd9dba2e79b4921d9bf1
                    • Instruction ID: cdcfebb469ccd74bf20c1de99d9f687c27ca56627f56037c7fb0ceccea6910f9
                    • Opcode Fuzzy Hash: bd03b53d90dacc85a48103f00d4795e1d8226f5608b8cd9dba2e79b4921d9bf1
                    • Instruction Fuzzy Hash: 68310AB190111DFFDB159FA4DC89AFEB7BCEF08300F0009A9E601E3551EA749E499AA4
                    APIs
                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00BF655B
                    • GetWindowLongW.USER32(016954A0,000000F0), ref: 00BF658E
                    • GetWindowLongW.USER32(016954A0,000000F0), ref: 00BF65C3
                    • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00BF65F5
                    • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00BF661F
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00BF6630
                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00BF664A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: LongWindow$MessageSend
                    • String ID:
                    • API String ID: 2178440468-0
                    • Opcode ID: 48986ef8e03174846f4a7f565a8475ea5f513ac7f6be05edbbd1da061e1e1eb0
                    • Instruction ID: b2a4baf895134ad1fde0e0df4dad2be25e0296ddd187b8a6bb51d326199828b6
                    • Opcode Fuzzy Hash: 48986ef8e03174846f4a7f565a8475ea5f513ac7f6be05edbbd1da061e1e1eb0
                    • Instruction Fuzzy Hash: 1A310331604259AFDB20CF18DC85F693BE1FB5A710F1941A8FA11DB2B6CB71AC48DB51
                    APIs
                      • Part of subcall function 00BE80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00BE80CB
                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00BE64D9
                    • WSAGetLastError.WSOCK32(00000000), ref: 00BE64E8
                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00BE6521
                    • connect.WSOCK32(00000000,?,00000010), ref: 00BE652A
                    • WSAGetLastError.WSOCK32 ref: 00BE6534
                    • closesocket.WSOCK32(00000000), ref: 00BE655D
                    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00BE6576
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                    • String ID:
                    • API String ID: 910771015-0
                    • Opcode ID: 56616efded7e3bdce385c639a5a6ca76e7897403601a5af9a14f5c72a0db9da4
                    • Instruction ID: bcbc69d438eded3947d6d765ca6a347a890491f3a2af948093a30ada2694ada8
                    • Opcode Fuzzy Hash: 56616efded7e3bdce385c639a5a6ca76e7897403601a5af9a14f5c72a0db9da4
                    • Instruction Fuzzy Hash: 88319371600118AFDB10AF25CC85BBE7BF9EF54764F0480A9F90997291DB74AD04CB61
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BCE0FA
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BCE120
                    • SysAllocString.OLEAUT32(00000000), ref: 00BCE123
                    • SysAllocString.OLEAUT32 ref: 00BCE144
                    • SysFreeString.OLEAUT32 ref: 00BCE14D
                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00BCE167
                    • SysAllocString.OLEAUT32(?), ref: 00BCE175
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                    • String ID:
                    • API String ID: 3761583154-0
                    • Opcode ID: 4bbd2b75aa8b0edf5c505b06641b9897328871678ef9b5efe557553e5647d095
                    • Instruction ID: dd3fccde45cae7950d4cfb2746ceadf23df10540ada6ee6e0045c7490cb65a89
                    • Opcode Fuzzy Hash: 4bbd2b75aa8b0edf5c505b06641b9897328871678ef9b5efe557553e5647d095
                    • Instruction Fuzzy Hash: 44214136604109EF9B10AFA8DC89DBB77ECEF09760B148179FA25DB260DA70DD41CB64
                    APIs
                      • Part of subcall function 00B71D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B71D73
                      • Part of subcall function 00B71D35: GetStockObject.GDI32(00000011), ref: 00B71D87
                      • Part of subcall function 00B71D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B71D91
                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00BF78A1
                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00BF78AE
                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00BF78B9
                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00BF78C8
                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00BF78D4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$CreateObjectStockWindow
                    • String ID: Msctls_Progress32
                    • API String ID: 1025951953-3636473452
                    • Opcode ID: 36ab5ce244249309e87044cb9790d1178f976ef8fe784ba8811159d528ac7a60
                    • Instruction ID: 130e62f6c28363217597ecfd626b49e26f0b8a5397bca748eca298cb35120f5d
                    • Opcode Fuzzy Hash: 36ab5ce244249309e87044cb9790d1178f976ef8fe784ba8811159d528ac7a60
                    • Instruction Fuzzy Hash: 26118EB215021DBEEF159E65CC85EEB7F6DEF08798F014124BB04A3090CB72AC21DBA4
                    APIs
                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00B94292,?), ref: 00B941E3
                    • GetProcAddress.KERNEL32(00000000), ref: 00B941EA
                    • EncodePointer.KERNEL32(00000000), ref: 00B941F6
                    • DecodePointer.KERNEL32(00000001,00B94292,?), ref: 00B94213
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                    • String ID: RoInitialize$combase.dll
                    • API String ID: 3489934621-340411864
                    • Opcode ID: 9030f59d12e1dc0ecab761f94616e22675a7cff45e71156a648954f50f89aaf9
                    • Instruction ID: b22c44451fc06ed08f9bc204b6cd74d68fbb89a78b2d34ac1bdf7f2190f9d0c3
                    • Opcode Fuzzy Hash: 9030f59d12e1dc0ecab761f94616e22675a7cff45e71156a648954f50f89aaf9
                    • Instruction Fuzzy Hash: 1CE0E5B06A0742AAEF246BB0EC4DB3C3AA4BB22702F104474B411E70E0DBB55491CE04
                    APIs
                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00B941B8), ref: 00B942B8
                    • GetProcAddress.KERNEL32(00000000), ref: 00B942BF
                    • EncodePointer.KERNEL32(00000000), ref: 00B942CA
                    • DecodePointer.KERNEL32(00B941B8), ref: 00B942E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                    • String ID: RoUninitialize$combase.dll
                    • API String ID: 3489934621-2819208100
                    • Opcode ID: 2851f1f6a1bf5a6495cb6583de97816b6b79db727b50b5dd316c849e4d67a4d7
                    • Instruction ID: 71986f9c0f25f6318b43334531bc33a77d3d63652acdf3d789cc255e8e106a0a
                    • Opcode Fuzzy Hash: 2851f1f6a1bf5a6495cb6583de97816b6b79db727b50b5dd316c849e4d67a4d7
                    • Instruction Fuzzy Hash: 7BE0B6785A1702ABEF149B60ED0DF2D3AA4BB24742F104034F001E31A0CFB45984DA18
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memmove$__itow__swprintf
                    • String ID:
                    • API String ID: 3253778849-0
                    • Opcode ID: cd0f19026607771e4206361ee0657024ef77af5333a46932f83a890dab33a7b6
                    • Instruction ID: 14b1c6e1fc66b92a05f0c5c9689d05de8a8c571f2eb1127ed66ccab33705fca2
                    • Opcode Fuzzy Hash: cd0f19026607771e4206361ee0657024ef77af5333a46932f83a890dab33a7b6
                    • Instruction Fuzzy Hash: 7961AD3050065A9BDF11EF24CC91EFEB7E5EF44308F0485AAF9695B292EB35AD01DB50
                    APIs
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                      • Part of subcall function 00BF10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BF0038,?,?), ref: 00BF10BC
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BF0548
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00BF0588
                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00BF05AB
                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00BF05D4
                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00BF0617
                    • RegCloseKey.ADVAPI32(00000000), ref: 00BF0624
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                    • String ID:
                    • API String ID: 4046560759-0
                    • Opcode ID: 274d7fc4d9413d3cdf057900d6f9323d1467d669ae7c42aca0df1b0ded2ed825
                    • Instruction ID: b1baf86a23a61acb27ae2c99f132aa4414d5a6075cce6e7211893b050f2a54c5
                    • Opcode Fuzzy Hash: 274d7fc4d9413d3cdf057900d6f9323d1467d669ae7c42aca0df1b0ded2ed825
                    • Instruction Fuzzy Hash: 85514C31118205AFCB14EF64C885E7EBBE9FF84314F0489ADF555972A2DB71E908CB52
                    APIs
                    • GetMenu.USER32(?), ref: 00BF5A82
                    • GetMenuItemCount.USER32(00000000), ref: 00BF5AB9
                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00BF5AE1
                    • GetMenuItemID.USER32(?,?), ref: 00BF5B50
                    • GetSubMenu.USER32(?,?), ref: 00BF5B5E
                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 00BF5BAF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Menu$Item$CountMessagePostString
                    • String ID:
                    • API String ID: 650687236-0
                    • Opcode ID: 4e39b1f8600e845e0d870e77c5c8907cf566670f2abba3688dc26af818946bac
                    • Instruction ID: 4218266bf0914036ea86679b15c302a1ba3fc3324fd9a7b40973b3d60727230d
                    • Opcode Fuzzy Hash: 4e39b1f8600e845e0d870e77c5c8907cf566670f2abba3688dc26af818946bac
                    • Instruction Fuzzy Hash: 4B516035A00619AFDF21DF64C885ABEB7F4EF48310F1044A9EA15B7352CB71AE45CB90
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00BCF3F7
                    • VariantClear.OLEAUT32(00000013), ref: 00BCF469
                    • VariantClear.OLEAUT32(00000000), ref: 00BCF4C4
                    • _memmove.LIBCMT ref: 00BCF4EE
                    • VariantClear.OLEAUT32(?), ref: 00BCF53B
                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00BCF569
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Variant$Clear$ChangeInitType_memmove
                    • String ID:
                    • API String ID: 1101466143-0
                    • Opcode ID: 2881c7efea1aaf2d279c4a1276af4b1fb08091b78ed404e60c1bea9ae2ed9977
                    • Instruction ID: 08714c52c7d7d3bd4f76ef533208fce2823fb7b4fc2c2e7db5c02b46b4c06b99
                    • Opcode Fuzzy Hash: 2881c7efea1aaf2d279c4a1276af4b1fb08091b78ed404e60c1bea9ae2ed9977
                    • Instruction Fuzzy Hash: 3E514CB5A0020A9FCB14CF58D884EAAB7F9FF4C354B1585A9E959DB310D730E911CBA0
                    APIs
                    • _memset.LIBCMT ref: 00BD2747
                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BD2792
                    • IsMenu.USER32(00000000), ref: 00BD27B2
                    • CreatePopupMenu.USER32 ref: 00BD27E6
                    • GetMenuItemCount.USER32(000000FF), ref: 00BD2844
                    • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00BD2875
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                    • String ID:
                    • API String ID: 3311875123-0
                    • Opcode ID: 45b1a1cccc8010f2f89f8636a29648835e8e69fd755d0db46457e784ccf3ea45
                    • Instruction ID: 8c9582ece7dc30622b4149de55e57626f3cf044fa2a795202b86252a7a0cce7d
                    • Opcode Fuzzy Hash: 45b1a1cccc8010f2f89f8636a29648835e8e69fd755d0db46457e784ccf3ea45
                    • Instruction Fuzzy Hash: DA51A070A00286DBDF25CF68D988BADFBF5EF64314F1042AAE4119B390E7729D04DB51
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                    • BeginPaint.USER32(?,?,?,?,?,?), ref: 00B7179A
                    • GetWindowRect.USER32(?,?), ref: 00B717FE
                    • ScreenToClient.USER32(?,?), ref: 00B7181B
                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00B7182C
                    • EndPaint.USER32(?,?), ref: 00B71876
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: PaintWindow$BeginClientLongRectScreenViewport
                    • String ID:
                    • API String ID: 1827037458-0
                    • Opcode ID: 046ca07e9de1f25c87217fa4cd24025932c01a5cf87888e25476fd0b869f3261
                    • Instruction ID: 5a77b5850df52300d780f83c777a9b0c3994044d187658501f1d290d6fc0e7ba
                    • Opcode Fuzzy Hash: 046ca07e9de1f25c87217fa4cd24025932c01a5cf87888e25476fd0b869f3261
                    • Instruction Fuzzy Hash: 79417471104301AFD710DF29CC84F7A7BF8EB49724F148AA9F569872A2CB319945DB62
                    APIs
                    • ShowWindow.USER32(00C367B0,00000000,016954A0,?,?,00C367B0,?,00BFB862,?,?), ref: 00BFB9CC
                    • EnableWindow.USER32(00000000,00000000), ref: 00BFB9F0
                    • ShowWindow.USER32(00C367B0,00000000,016954A0,?,?,00C367B0,?,00BFB862,?,?), ref: 00BFBA50
                    • ShowWindow.USER32(00000000,00000004,?,00BFB862,?,?), ref: 00BFBA62
                    • EnableWindow.USER32(00000000,00000001), ref: 00BFBA86
                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00BFBAA9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$Show$Enable$MessageSend
                    • String ID:
                    • API String ID: 642888154-0
                    • Opcode ID: 5bdf20185a667d09f0d11274b9610f5d704c735c9d1919b6fb485c894c6b66fb
                    • Instruction ID: 0746d8ecb0abba1b90c998a3e5c44ac7fd6124f49c8c9ac24fd769758de8dc2d
                    • Opcode Fuzzy Hash: 5bdf20185a667d09f0d11274b9610f5d704c735c9d1919b6fb485c894c6b66fb
                    • Instruction Fuzzy Hash: 0C411C34600249AFDB25CF54C889FB57BE1EF05314F1881E9EB588F6A2CB71A849CB51
                    APIs
                    • GetForegroundWindow.USER32(?,?,?,?,?,?,00BE5134,?,?,00000000,00000001), ref: 00BE73BF
                      • Part of subcall function 00BE3C94: GetWindowRect.USER32(?,?), ref: 00BE3CA7
                    • GetDesktopWindow.USER32 ref: 00BE73E9
                    • GetWindowRect.USER32(00000000), ref: 00BE73F0
                    • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00BE7422
                      • Part of subcall function 00BD54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00BD555E
                    • GetCursorPos.USER32(?), ref: 00BE744E
                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00BE74AC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                    • String ID:
                    • API String ID: 4137160315-0
                    • Opcode ID: f651ab4d1d5cf8c844f9ca50b719c8ad078ed0693ed1157d70a0c7a3bad17388
                    • Instruction ID: 75d52e7d5fd7681e553ff12a624b2e32e46c03816a029c80ed5f75368f256041
                    • Opcode Fuzzy Hash: f651ab4d1d5cf8c844f9ca50b719c8ad078ed0693ed1157d70a0c7a3bad17388
                    • Instruction Fuzzy Hash: 8731D772508346AFD720DF55D849F6BBBE9FF88314F00091AF59997291DB30E948CB92
                    APIs
                      • Part of subcall function 00BC85F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00BC8608
                      • Part of subcall function 00BC85F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00BC8612
                      • Part of subcall function 00BC85F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00BC8621
                      • Part of subcall function 00BC85F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00BC8628
                      • Part of subcall function 00BC85F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00BC863E
                    • GetLengthSid.ADVAPI32(?,00000000,00BC8977), ref: 00BC8DAC
                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00BC8DB8
                    • HeapAlloc.KERNEL32(00000000), ref: 00BC8DBF
                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 00BC8DD8
                    • GetProcessHeap.KERNEL32(00000000,00000000,00BC8977), ref: 00BC8DEC
                    • HeapFree.KERNEL32(00000000), ref: 00BC8DF3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                    • String ID:
                    • API String ID: 3008561057-0
                    • Opcode ID: 9bec16dafbb20b0578ce82b76897cdfea7a2277faeca11e28524e0a309ce6892
                    • Instruction ID: 6e6c96ce907eb00a4794b862f55c581d2444430ef44fa7b6821dd649fcf33331
                    • Opcode Fuzzy Hash: 9bec16dafbb20b0578ce82b76897cdfea7a2277faeca11e28524e0a309ce6892
                    • Instruction Fuzzy Hash: 3D119A32600606FBDB109FA4CC49FBE7BA9EF55316F1040ADE946A7250CF32AA40CB60
                    APIs
                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00BC8B2A
                    • OpenProcessToken.ADVAPI32(00000000), ref: 00BC8B31
                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00BC8B40
                    • CloseHandle.KERNEL32(00000004), ref: 00BC8B4B
                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00BC8B7A
                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00BC8B8E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                    • String ID:
                    • API String ID: 1413079979-0
                    • Opcode ID: d81afb7967b8124ea76cf30f535edd883f54a93263f9169557b2ce30443229d5
                    • Instruction ID: 1d1f0b6b3084519fad93a0f37716851b4d91fda33ed1e99f367bb5162d7e6144
                    • Opcode Fuzzy Hash: d81afb7967b8124ea76cf30f535edd883f54a93263f9169557b2ce30443229d5
                    • Instruction Fuzzy Hash: 6D112CB250120AABDF018FA4ED49FEA7BE9EF08304F044069FE04A3160CB769D60DB60
                    APIs
                      • Part of subcall function 00B712F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00B7134D
                      • Part of subcall function 00B712F3: SelectObject.GDI32(?,00000000), ref: 00B7135C
                      • Part of subcall function 00B712F3: BeginPath.GDI32(?), ref: 00B71373
                      • Part of subcall function 00B712F3: SelectObject.GDI32(?,00000000), ref: 00B7139C
                    • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00BFC1C4
                    • LineTo.GDI32(00000000,00000003,?), ref: 00BFC1D8
                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00BFC1E6
                    • LineTo.GDI32(00000000,00000000,?), ref: 00BFC1F6
                    • EndPath.GDI32(00000000), ref: 00BFC206
                    • StrokePath.GDI32(00000000), ref: 00BFC216
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                    • String ID:
                    • API String ID: 43455801-0
                    • Opcode ID: 42439bec82b24b465c829c4da846cf07d1c0f8fda8d40f3ded3324539c64cdef
                    • Instruction ID: 348f9862706ddd6d69a0449a60a1850edb511e7bbea62d36c6ea0032967b1702
                    • Opcode Fuzzy Hash: 42439bec82b24b465c829c4da846cf07d1c0f8fda8d40f3ded3324539c64cdef
                    • Instruction Fuzzy Hash: 6C11C97640014DBFDB119F94DC88FBA7FADEF08354F048061BA189B1A1DB719E95DBA0
                    APIs
                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B903D3
                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00B903DB
                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B903E6
                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B903F1
                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00B903F9
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B90401
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Virtual
                    • String ID:
                    • API String ID: 4278518827-0
                    • Opcode ID: 7c46edf7243661953b90342dc5eeccad9f40c8a6bc0db8dbd18f3121bb3dc199
                    • Instruction ID: 22ce2fa8c4e4d7a5aa7ab4dd281efb5d4c5cff3e8abfd7d53de17b89e184a6ad
                    • Opcode Fuzzy Hash: 7c46edf7243661953b90342dc5eeccad9f40c8a6bc0db8dbd18f3121bb3dc199
                    • Instruction Fuzzy Hash: 86016CB090175A7DE3008F5A8C85B52FFA8FF19354F00411BA15C87941C7F5A864CBE5
                    APIs
                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00BD569B
                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00BD56B1
                    • GetWindowThreadProcessId.USER32(?,?), ref: 00BD56C0
                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BD56CF
                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BD56D9
                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BD56E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                    • String ID:
                    • API String ID: 839392675-0
                    • Opcode ID: eaba58ed5edbfb289826432515ac80810ee6a7017ebca1053408716acdddcad6
                    • Instruction ID: e7e8efe42b6e5b950dac87d779083e9e8a4d1ea90f81fef5639654039d6b9a0e
                    • Opcode Fuzzy Hash: eaba58ed5edbfb289826432515ac80810ee6a7017ebca1053408716acdddcad6
                    • Instruction Fuzzy Hash: 3BF01D3224115ABBE7215BA29C0DEFB7A7CEFC6B11F000169FA04D31509EA15A01C6B5
                    APIs
                    • InterlockedExchange.KERNEL32(?,?), ref: 00BD74E5
                    • EnterCriticalSection.KERNEL32(?,?,00B81044,?,?), ref: 00BD74F6
                    • TerminateThread.KERNEL32(00000000,000001F6,?,00B81044,?,?), ref: 00BD7503
                    • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00B81044,?,?), ref: 00BD7510
                      • Part of subcall function 00BD6ED7: CloseHandle.KERNEL32(00000000,?,00BD751D,?,00B81044,?,?), ref: 00BD6EE1
                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00BD7523
                    • LeaveCriticalSection.KERNEL32(?,?,00B81044,?,?), ref: 00BD752A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                    • String ID:
                    • API String ID: 3495660284-0
                    • Opcode ID: 1a52f263ec0b791247c26a82c88267aa57e682dc4a48286ecca59a2f798c877f
                    • Instruction ID: ae0b1c8ea2f81a1abd3f7ec3c23cb588bd958f787f0c4c06a3ddf6eca7a1888b
                    • Opcode Fuzzy Hash: 1a52f263ec0b791247c26a82c88267aa57e682dc4a48286ecca59a2f798c877f
                    • Instruction Fuzzy Hash: 4BF03A3A140613ABDB111B64FC889FA7B6AEF45302B000572F202A31A0EF755901CE50
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00BC8E7F
                    • UnloadUserProfile.USERENV(?,?), ref: 00BC8E8B
                    • CloseHandle.KERNEL32(?), ref: 00BC8E94
                    • CloseHandle.KERNEL32(?), ref: 00BC8E9C
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00BC8EA5
                    • HeapFree.KERNEL32(00000000), ref: 00BC8EAC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                    • String ID:
                    • API String ID: 146765662-0
                    • Opcode ID: 6b50cb356a0baec8a4f6a815c91eb7718f54cde3962db672ef13518c33ad367f
                    • Instruction ID: 2bacf9b76db9cf914a27720ed10fb426ae30060b65a0fe5ca657a6f241c561b7
                    • Opcode Fuzzy Hash: 6b50cb356a0baec8a4f6a815c91eb7718f54cde3962db672ef13518c33ad367f
                    • Instruction Fuzzy Hash: B5E0AE36004002EBDA012BE2EC0893ABB69EF89322B148220F22993070CF329420DB54
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 00BE8928
                    • CharUpperBuffW.USER32(?,?), ref: 00BE8A37
                    • VariantClear.OLEAUT32(?), ref: 00BE8BAF
                      • Part of subcall function 00BD7804: VariantInit.OLEAUT32(00000000), ref: 00BD7844
                      • Part of subcall function 00BD7804: VariantCopy.OLEAUT32(00000000,?), ref: 00BD784D
                      • Part of subcall function 00BD7804: VariantClear.OLEAUT32(00000000), ref: 00BD7859
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Variant$ClearInit$BuffCharCopyUpper
                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                    • API String ID: 4237274167-1221869570
                    • Opcode ID: 70034fda51ad36f807263c88c930f950cceeb54d170c168f7af5ed0652a775f4
                    • Instruction ID: a1fb98369a2653ec627a7de9769f426ca3a25efa702896d789358a9ad4b27fff
                    • Opcode Fuzzy Hash: 70034fda51ad36f807263c88c930f950cceeb54d170c168f7af5ed0652a775f4
                    • Instruction Fuzzy Hash: 78918C75608741DFCB10DF25C48496ABBF4EF89714F0489AEF89A8B362DB31E905CB52
                    APIs
                      • Part of subcall function 00B8FEC6: _wcscpy.LIBCMT ref: 00B8FEE9
                    • _memset.LIBCMT ref: 00BD3077
                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00BD30A6
                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00BD3159
                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00BD3187
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ItemMenu$Info$Default_memset_wcscpy
                    • String ID: 0
                    • API String ID: 4152858687-4108050209
                    • Opcode ID: 90a50e7305aa06ab9c61ebe8076e5a0bf57499704ac389f6e4468c8e6c535c06
                    • Instruction ID: a3fea57689394bdf6d58b9fc4535294148db71a4f32a902047cd6fcacbf9e6b8
                    • Opcode Fuzzy Hash: 90a50e7305aa06ab9c61ebe8076e5a0bf57499704ac389f6e4468c8e6c535c06
                    • Instruction Fuzzy Hash: A851D2716083029AD7259F28C845B6BF7E4EF55B50F044AAEF895E3292EB70CA44C753
                    APIs
                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00BCDAC5
                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00BCDAFB
                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00BCDB0C
                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00BCDB8E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorMode$AddressCreateInstanceProc
                    • String ID: DllGetClassObject
                    • API String ID: 753597075-1075368562
                    • Opcode ID: ffb844e94f0dfce85700c60b7bd510dd475deb54b5bff3777ec5c538d501b598
                    • Instruction ID: 79ae869d512d7cb0ea607e2ed48c18f244173fc49fa12b928476105015724fe7
                    • Opcode Fuzzy Hash: ffb844e94f0dfce85700c60b7bd510dd475deb54b5bff3777ec5c538d501b598
                    • Instruction Fuzzy Hash: D24148B5600209EFDB15CF54C884BAABBE9EF48351F1680BEA9059F205D7B1DE44DBA0
                    APIs
                    • _memset.LIBCMT ref: 00BD2CAF
                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00BD2CCB
                    • DeleteMenu.USER32(?,00000007,00000000), ref: 00BD2D11
                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00C36890,00000000), ref: 00BD2D5A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Menu$Delete$InfoItem_memset
                    • String ID: 0
                    • API String ID: 1173514356-4108050209
                    • Opcode ID: f217e8098ce7e3a38a8606befd132167533fc88c6460f1d0ae0aa37aa2318eb6
                    • Instruction ID: d6f933574ec0dd56d6dbccbdd33c60c6e6f745077b1d76e9e0dc88b4ddf34717
                    • Opcode Fuzzy Hash: f217e8098ce7e3a38a8606befd132167533fc88c6460f1d0ae0aa37aa2318eb6
                    • Instruction Fuzzy Hash: 7441B4301043829FD714DF24C884B2AFBE9EF95320F1446AEF96597391EB70E905CB92
                    APIs
                    • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00BEDAD9
                      • Part of subcall function 00B779AB: _memmove.LIBCMT ref: 00B779F9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BuffCharLower_memmove
                    • String ID: cdecl$none$stdcall$winapi
                    • API String ID: 3425801089-567219261
                    • Opcode ID: b1ae152451316dd8a1e95bb4408588d08a1c12c5d2658b5681afc324d4d82396
                    • Instruction ID: 10832a40d618d223e345afd6382dd8c60954129b5555e2bd5a365e5d422d91cb
                    • Opcode Fuzzy Hash: b1ae152451316dd8a1e95bb4408588d08a1c12c5d2658b5681afc324d4d82396
                    • Instruction Fuzzy Hash: B331847050461AAFCF10EF65CC819EEB7F4FF15310B1086A9E876A76D1DB71A905CB80
                    APIs
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                      • Part of subcall function 00BCB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00BCB0E7
                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00BC93F6
                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00BC9409
                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00BC9439
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$_memmove$ClassName
                    • String ID: ComboBox$ListBox
                    • API String ID: 365058703-1403004172
                    • Opcode ID: 1ba9b63034265205d7a12b8beca27746c2b0e16f7e978af72b3c5ee19f4e73c4
                    • Instruction ID: fd51d8c13127913345eafce6f7a88429b54c333b3c002c1df366ceb9d5194f3a
                    • Opcode Fuzzy Hash: 1ba9b63034265205d7a12b8beca27746c2b0e16f7e978af72b3c5ee19f4e73c4
                    • Instruction Fuzzy Hash: BD21B471940104BAEB28AB74DC8ADFFB7F8DF45350B1085ADF925972E1DF354A0AD620
                    APIs
                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00BE1B40
                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00BE1B66
                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00BE1B96
                    • InternetCloseHandle.WININET(00000000), ref: 00BE1BDD
                      • Part of subcall function 00BE2777: GetLastError.KERNEL32(?,?,00BE1B0B,00000000,00000000,00000001), ref: 00BE278C
                      • Part of subcall function 00BE2777: SetEvent.KERNEL32(?,?,00BE1B0B,00000000,00000000,00000001), ref: 00BE27A1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                    • String ID:
                    • API String ID: 3113390036-3916222277
                    • Opcode ID: fc3f98ab3be4ce68ce43ac003501db948c2f86c18f54f0569dc2d4820ef290bd
                    • Instruction ID: fde0e580c5e1925d36f6c945a03c6718aa78e0041de7542c057411259dc3872a
                    • Opcode Fuzzy Hash: fc3f98ab3be4ce68ce43ac003501db948c2f86c18f54f0569dc2d4820ef290bd
                    • Instruction Fuzzy Hash: 1D21CFB1500248BFEB119F6A9CC5EBFB7ECEB49744F2005AAF505A7240EB349D049771
                    APIs
                      • Part of subcall function 00B71D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B71D73
                      • Part of subcall function 00B71D35: GetStockObject.GDI32(00000011), ref: 00B71D87
                      • Part of subcall function 00B71D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B71D91
                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00BF66D0
                    • LoadLibraryW.KERNEL32(?), ref: 00BF66D7
                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00BF66EC
                    • DestroyWindow.USER32(?), ref: 00BF66F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                    • String ID: SysAnimate32
                    • API String ID: 4146253029-1011021900
                    • Opcode ID: 3ba02a5d1ecc505b7b3c924355a5d0903ea8479ba7d2bbdd4fd3b869b1c23ac8
                    • Instruction ID: 22abb00c1eae9966281cc4c1c3ebfc6240e558b4d144c024fb97f7db501dd528
                    • Opcode Fuzzy Hash: 3ba02a5d1ecc505b7b3c924355a5d0903ea8479ba7d2bbdd4fd3b869b1c23ac8
                    • Instruction Fuzzy Hash: 7821777120020ABBEF105E68EC80EBB77E9EF59368F104669FE10D71A0DB728C559760
                    APIs
                    • GetStdHandle.KERNEL32(0000000C), ref: 00BD705E
                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00BD7091
                    • GetStdHandle.KERNEL32(0000000C), ref: 00BD70A3
                    • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00BD70DD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CreateHandle$FilePipe
                    • String ID: nul
                    • API String ID: 4209266947-2873401336
                    • Opcode ID: 228a885762bc72205da3ac3a6d9ef1d5b485421bfb657ca88ff22c361d6ea4f8
                    • Instruction ID: 1f0bd5dac6123ce70a3522819980d6fae7536f3ad661347ffdb25d2edc961e59
                    • Opcode Fuzzy Hash: 228a885762bc72205da3ac3a6d9ef1d5b485421bfb657ca88ff22c361d6ea4f8
                    • Instruction Fuzzy Hash: F6215175544209ABDB209F68DC45AEAB7E8EF44720F204A6AFDA1D73D0FB709950CB50
                    APIs
                    • GetStdHandle.KERNEL32(000000F6), ref: 00BD712B
                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00BD715D
                    • GetStdHandle.KERNEL32(000000F6), ref: 00BD716E
                    • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00BD71A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CreateHandle$FilePipe
                    • String ID: nul
                    • API String ID: 4209266947-2873401336
                    • Opcode ID: 265c408e1abc5f7f4d64db957ba7a3f165073bcc83e866a1475d78533f424073
                    • Instruction ID: 64598fd26727d5ee9a01ed0e1590c1f53536d3ba3d4acf0c8d7c5ab77ce30ae4
                    • Opcode Fuzzy Hash: 265c408e1abc5f7f4d64db957ba7a3f165073bcc83e866a1475d78533f424073
                    • Instruction Fuzzy Hash: AF219075544206ABDB209F689C44AAAF7E8EF55720F200B9AF8A0E33D0FB709841CB50
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 00BDAEBF
                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00BDAF13
                    • __swprintf.LIBCMT ref: 00BDAF2C
                    • SetErrorMode.KERNEL32(00000000,00000001,00000000,00BFF910), ref: 00BDAF6A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorMode$InformationVolume__swprintf
                    • String ID: %lu
                    • API String ID: 3164766367-685833217
                    • Opcode ID: 1e207ad40cea0e7a584883b970a99634f99686d31e32c7f4038af1541de46871
                    • Instruction ID: c2b412e303bbd49a138cbf49197ec75c672221f6c8af42a4a00bb9809be2b6e1
                    • Opcode Fuzzy Hash: 1e207ad40cea0e7a584883b970a99634f99686d31e32c7f4038af1541de46871
                    • Instruction Fuzzy Hash: C1214134A00109AFCB10DF64C985DAEBBF8EF89714B1080A9F909EB351DB71EA45CB61
                    APIs
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                      • Part of subcall function 00BCA37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00BCA399
                      • Part of subcall function 00BCA37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BCA3AC
                      • Part of subcall function 00BCA37C: GetCurrentThreadId.KERNEL32 ref: 00BCA3B3
                      • Part of subcall function 00BCA37C: AttachThreadInput.USER32(00000000), ref: 00BCA3BA
                    • GetFocus.USER32 ref: 00BCA554
                      • Part of subcall function 00BCA3C5: GetParent.USER32(?), ref: 00BCA3D3
                    • GetClassNameW.USER32(?,?,00000100), ref: 00BCA59D
                    • EnumChildWindows.USER32(?,00BCA615), ref: 00BCA5C5
                    • __swprintf.LIBCMT ref: 00BCA5DF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                    • String ID: %s%d
                    • API String ID: 1941087503-1110647743
                    • Opcode ID: 9f8c3c2dd701a0ceab155e5891f9cf104e3e79316cf503e06dff912799c3cd07
                    • Instruction ID: 2a941f17592133f5ed7deca697f69b1ece2a1226dfdec05de4fdaecf4276eba9
                    • Opcode Fuzzy Hash: 9f8c3c2dd701a0ceab155e5891f9cf104e3e79316cf503e06dff912799c3cd07
                    • Instruction Fuzzy Hash: 47116D71640209BBDF11BF64DC85FBA77F8AF88704F0440B9BA18AB152CE705A45CB79
                    APIs
                    • CharUpperBuffW.USER32(?,?), ref: 00BD2048
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BuffCharUpper
                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                    • API String ID: 3964851224-769500911
                    • Opcode ID: 8f18aac1821e75e74b67b2ac58a55e6efd4e74e354784190432bc4f0295b57f5
                    • Instruction ID: 8df5e754053566c7cfd5c87ee4c639a854d815d79d436d0ba5d60200cf49a367
                    • Opcode Fuzzy Hash: 8f18aac1821e75e74b67b2ac58a55e6efd4e74e354784190432bc4f0295b57f5
                    • Instruction Fuzzy Hash: 71113970910119EFCF00EFA4D9814AEB7F4FF25304B1488A9D855A7352EB326916CB51
                    APIs
                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00BEEF1B
                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00BEEF4B
                    • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00BEF07E
                    • CloseHandle.KERNEL32(?), ref: 00BEF0FF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Process$CloseCountersHandleInfoMemoryOpen
                    • String ID:
                    • API String ID: 2364364464-0
                    • Opcode ID: ea7ca261d049d9e3aefa55323f1f44ae1cdf956ac05f8136e5e1e7f903aa7b18
                    • Instruction ID: a0324c8278547cc7085bbdabfacde06ee62349aef514142a2bcf77381ef6c8a5
                    • Opcode Fuzzy Hash: ea7ca261d049d9e3aefa55323f1f44ae1cdf956ac05f8136e5e1e7f903aa7b18
                    • Instruction Fuzzy Hash: B98132716043019FD720DF25C886F6AB7E5EF88720F14886DF5A9D7292DB70AD40CB95
                    APIs
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                      • Part of subcall function 00BF10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BF0038,?,?), ref: 00BF10BC
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BF0388
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00BF03C7
                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00BF040E
                    • RegCloseKey.ADVAPI32(?,?), ref: 00BF043A
                    • RegCloseKey.ADVAPI32(00000000), ref: 00BF0447
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                    • String ID:
                    • API String ID: 3440857362-0
                    • Opcode ID: e42c1057b4fd6e5be0061f47ca59f9dbcf40140a80d586cfd85fdcb4d6e669a5
                    • Instruction ID: 704eeb8889c9110a421c7e20d9be4cea42c47e401fc69e34be9f46f0195e6a48
                    • Opcode Fuzzy Hash: e42c1057b4fd6e5be0061f47ca59f9dbcf40140a80d586cfd85fdcb4d6e669a5
                    • Instruction Fuzzy Hash: 77513F31214205AFD714EF64C881E7EB7E8FF88314F4489ADF655972A2DB30E908DB52
                    APIs
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                    • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00BEDC3B
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00BEDCBE
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00BEDCDA
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00BEDD1B
                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00BEDD35
                      • Part of subcall function 00B75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00BD7B20,?,?,00000000), ref: 00B75B8C
                      • Part of subcall function 00B75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00BD7B20,?,?,00000000,?,?), ref: 00B75BB0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                    • String ID:
                    • API String ID: 327935632-0
                    • Opcode ID: f8056fd2b45d3c5d617ac8746d539125e90ebe7d227a87b96033318537aa25e3
                    • Instruction ID: 103e94375469b06c05f01f61d66b54893a728c76e8d94dde9f26e711ae6dbfd4
                    • Opcode Fuzzy Hash: f8056fd2b45d3c5d617ac8746d539125e90ebe7d227a87b96033318537aa25e3
                    • Instruction Fuzzy Hash: 8B511675A00245DFDB11EF69C8849ADB7F4EF48320B14C0A9E819AB351DBB0AD45CF91
                    APIs
                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00BDE88A
                    • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00BDE8B3
                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00BDE8F2
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00BDE917
                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00BDE91F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                    • String ID:
                    • API String ID: 1389676194-0
                    • Opcode ID: c06f6acc8ea1c0a5435f215cb8a175a50a3feaae1bd159376a8db2ff430d069f
                    • Instruction ID: 44db0dbe654457cf0710bda37c6421647f896148ae7151fb78dc2f4b2c1e2800
                    • Opcode Fuzzy Hash: c06f6acc8ea1c0a5435f215cb8a175a50a3feaae1bd159376a8db2ff430d069f
                    • Instruction Fuzzy Hash: 3E510935A00609DFDF11EF64C981AAEBBF5EF48310B1480A9E959AB362DB31ED11DB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 790596698a17a4dd3f8eb8de663ecdedb548fe3b2552421463634b616e79f769
                    • Instruction ID: 8e24c61d0787e1ba57b09accaec4e5655ae72ea1ef45ffafef8332d89ce8b7b5
                    • Opcode Fuzzy Hash: 790596698a17a4dd3f8eb8de663ecdedb548fe3b2552421463634b616e79f769
                    • Instruction Fuzzy Hash: 1241E6B590010CAFD718DF28CC84FB9BBF4EB09310F1441A5FA59A72E1DB70AD49DA55
                    APIs
                    • GetCursorPos.USER32(?), ref: 00B72357
                    • ScreenToClient.USER32(00C367B0,?), ref: 00B72374
                    • GetAsyncKeyState.USER32(00000001), ref: 00B72399
                    • GetAsyncKeyState.USER32(00000002), ref: 00B723A7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AsyncState$ClientCursorScreen
                    • String ID:
                    • API String ID: 4210589936-0
                    • Opcode ID: 5442dfe3a3a6b85ccb2e901bac42aa8d4e69f6d9ef4cf6671c822b9ff9e769f2
                    • Instruction ID: 6848fe7f0006171815b283dd7bfa9ee9abbe028679c1a5187cfb0bd52705a1d6
                    • Opcode Fuzzy Hash: 5442dfe3a3a6b85ccb2e901bac42aa8d4e69f6d9ef4cf6671c822b9ff9e769f2
                    • Instruction Fuzzy Hash: 8B416F35508219FFDF159F68C844AE9BBB4FB05320F10839AF83897290CB349D54DB95
                    APIs
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BC695D
                    • TranslateAcceleratorW.USER32(?,?,?), ref: 00BC69A9
                    • TranslateMessage.USER32(?), ref: 00BC69D2
                    • DispatchMessageW.USER32(?), ref: 00BC69DC
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BC69EB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Message$PeekTranslate$AcceleratorDispatch
                    • String ID:
                    • API String ID: 2108273632-0
                    • Opcode ID: bfb6d180ffedb79b5ae28eb0529165503faf5c1fd8e96b757f9e231845c5a167
                    • Instruction ID: 5f6b9bb3062f7c63dd76f016670416aa8d1c1f2ab2f0fd574f6f2dd01cc5821f
                    • Opcode Fuzzy Hash: bfb6d180ffedb79b5ae28eb0529165503faf5c1fd8e96b757f9e231845c5a167
                    • Instruction Fuzzy Hash: C831A371914246BBDB20CF74DC84FBA7BE8EB1A304F1481ADE421D31A1EBB5D885D7A1
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 00BC8F12
                    • PostMessageW.USER32(?,00000201,00000001), ref: 00BC8FBC
                    • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00BC8FC4
                    • PostMessageW.USER32(?,00000202,00000000), ref: 00BC8FD2
                    • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00BC8FDA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessagePostSleep$RectWindow
                    • String ID:
                    • API String ID: 3382505437-0
                    • Opcode ID: 7d5bbae20c2399fd20f224471bc78730855870bb0dde7cfc1f9a1c3aa3faf459
                    • Instruction ID: 557808bfa6f5fce2a61ef79d578696366770344b13e67442e78577376754c4fc
                    • Opcode Fuzzy Hash: 7d5bbae20c2399fd20f224471bc78730855870bb0dde7cfc1f9a1c3aa3faf459
                    • Instruction Fuzzy Hash: AE31BC7150021AEBDF14CF68D988BAE7BB6EF44315F10466DF925EB2D0CBB09914DB90
                    APIs
                    • IsWindowVisible.USER32(?), ref: 00BCB6C7
                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00BCB6E4
                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00BCB71C
                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00BCB742
                    • _wcsstr.LIBCMT ref: 00BCB74C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                    • String ID:
                    • API String ID: 3902887630-0
                    • Opcode ID: 7472cf540f86a3d4332c312cc2090a48125d58ffa81353030cf427fc16816e84
                    • Instruction ID: 65fb2c5bfab1d236b23ebbdb3ca4309bf544863db6309a49ee22baff48fa04e0
                    • Opcode Fuzzy Hash: 7472cf540f86a3d4332c312cc2090a48125d58ffa81353030cf427fc16816e84
                    • Instruction Fuzzy Hash: 8921A132604205BAEB255B799C4AF7F7BE8DF45750F1040BEFC05DA1A1EF619C40D660
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                    • GetWindowLongW.USER32(?,000000F0), ref: 00BFB44C
                    • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00BFB471
                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00BFB489
                    • GetSystemMetrics.USER32(00000004), ref: 00BFB4B2
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00BE1184,00000000), ref: 00BFB4D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$Long$MetricsSystem
                    • String ID:
                    • API String ID: 2294984445-0
                    • Opcode ID: 767765bcc3986ab075da278de1fecb4378ccea00280cb6dbe6246db66a1abd34
                    • Instruction ID: f3b12ac64244f5d79f6f40eb079fc649ffecae07f018a3d5937df7083b9088c7
                    • Opcode Fuzzy Hash: 767765bcc3986ab075da278de1fecb4378ccea00280cb6dbe6246db66a1abd34
                    • Instruction Fuzzy Hash: 19215C7191025AAFCB109F38CD44B7A3BA4EF09724F148668EA26D76E1EB309814DB90
                    APIs
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00BC9802
                      • Part of subcall function 00B77D2C: _memmove.LIBCMT ref: 00B77D66
                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00BC9834
                    • __itow.LIBCMT ref: 00BC984C
                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00BC9874
                    • __itow.LIBCMT ref: 00BC9885
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$__itow$_memmove
                    • String ID:
                    • API String ID: 2983881199-0
                    • Opcode ID: 691b0fcf41c150171a6fddef80838a2c6432de682eb76954765ebb297b40a8a2
                    • Instruction ID: 2cf8878bdfc19e7d2512d1d254bef25da8793952f5b40cf9aa7296743f1b3dd6
                    • Opcode Fuzzy Hash: 691b0fcf41c150171a6fddef80838a2c6432de682eb76954765ebb297b40a8a2
                    • Instruction Fuzzy Hash: EE219571B00208BBEF109A658C8AFBE7BE9EF4A750F0440B9F905DB291DA708D45D791
                    APIs
                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00B7134D
                    • SelectObject.GDI32(?,00000000), ref: 00B7135C
                    • BeginPath.GDI32(?), ref: 00B71373
                    • SelectObject.GDI32(?,00000000), ref: 00B7139C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ObjectSelect$BeginCreatePath
                    • String ID:
                    • API String ID: 3225163088-0
                    • Opcode ID: 0e7ff60a2ec7200c12ae99fcf70185d26c60c61c42c68c9088a9ca5cd9850b0f
                    • Instruction ID: 5f7d9b3e948a3169af3262164f295e75afb6b93a9a70462dfe0fa2a021eb864f
                    • Opcode Fuzzy Hash: 0e7ff60a2ec7200c12ae99fcf70185d26c60c61c42c68c9088a9ca5cd9850b0f
                    • Instruction Fuzzy Hash: 69215970810209FBDB108F2DDC04BAD7BF9EB04321F14C666F828A71E0DB719991DBA6
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memcmp
                    • String ID:
                    • API String ID: 2931989736-0
                    • Opcode ID: e8dae18eb1f54e1e7a2fdd61aa1d096db6c5487a88a0814e29f5fa09165fbe67
                    • Instruction ID: 80a9598d08d5142ac93504c2f86549645c8909a0919e3ce7b8c70d6ba05a9801
                    • Opcode Fuzzy Hash: e8dae18eb1f54e1e7a2fdd61aa1d096db6c5487a88a0814e29f5fa09165fbe67
                    • Instruction Fuzzy Hash: 8701B9B2A041067BE605A6265C86F6B7BDCDB31394F0840B9FE08A6283E760DE11D2F4
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 00BD4D5C
                    • __beginthreadex.LIBCMT ref: 00BD4D7A
                    • MessageBoxW.USER32(?,?,?,?), ref: 00BD4D8F
                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00BD4DA5
                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00BD4DAC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                    • String ID:
                    • API String ID: 3824534824-0
                    • Opcode ID: 6581e55dba02b585d2eb25acfaf6394dae8f1db8be7051442f628bb5f93c3422
                    • Instruction ID: 663e57c8d5618f92ca2534dbd663ea73362f701c9f042dcab2eb33b35a817bf1
                    • Opcode Fuzzy Hash: 6581e55dba02b585d2eb25acfaf6394dae8f1db8be7051442f628bb5f93c3422
                    • Instruction Fuzzy Hash: BB11A576904245BBC7119BB89C48BAFBBEDEB45320F1442A6F914D3351DB758D44C7A0
                    APIs
                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00BC8766
                    • GetLastError.KERNEL32(?,00BC822A,?,?,?), ref: 00BC8770
                    • GetProcessHeap.KERNEL32(00000008,?,?,00BC822A,?,?,?), ref: 00BC877F
                    • HeapAlloc.KERNEL32(00000000,?,00BC822A,?,?,?), ref: 00BC8786
                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00BC879D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 842720411-0
                    • Opcode ID: 36ee100ee2dddd06524ce7677b84fc971f1de8c8c0a92678f1f3e86f55720f1c
                    • Instruction ID: e6b985cf511c1bb2257addbd5c25d48e681e86dbb7ce483759b1e2106989dc37
                    • Opcode Fuzzy Hash: 36ee100ee2dddd06524ce7677b84fc971f1de8c8c0a92678f1f3e86f55720f1c
                    • Instruction Fuzzy Hash: 3301FB71601205FFDB204FA6DC88DBB7BADEF8A795720057AF949D3260EE319D10CA60
                    APIs
                    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00BD5502
                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00BD5510
                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00BD5518
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00BD5522
                    • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00BD555E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: PerformanceQuery$CounterSleep$Frequency
                    • String ID:
                    • API String ID: 2833360925-0
                    • Opcode ID: fc9ca234e3b20d7ae1564cf624409789d37cbaaa69654333aa3c024c95c2d3f4
                    • Instruction ID: 794a4f37c2c5b22ed6aba67c1938f65bad370383eab2f7be3a4eba59b735c269
                    • Opcode Fuzzy Hash: fc9ca234e3b20d7ae1564cf624409789d37cbaaa69654333aa3c024c95c2d3f4
                    • Instruction Fuzzy Hash: 8C01F736D05A1ADBCF109FA8E888AEDFBB9BF19715F004096E901B3240EB305654C7A1
                    APIs
                    • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BC758C,80070057,?,?,?,00BC799D), ref: 00BC766F
                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BC758C,80070057,?,?), ref: 00BC768A
                    • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BC758C,80070057,?,?), ref: 00BC7698
                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BC758C,80070057,?), ref: 00BC76A8
                    • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00BC758C,80070057,?,?), ref: 00BC76B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: From$Prog$FreeStringTasklstrcmpi
                    • String ID:
                    • API String ID: 3897988419-0
                    • Opcode ID: ca95d9eec84e51d711abfcc84b896715635ee96e61a98825c61efbe1f98e6922
                    • Instruction ID: 0b3a186410a90fbdfac18681063de416d6af386739da05014fc7e30a0ca87345
                    • Opcode Fuzzy Hash: ca95d9eec84e51d711abfcc84b896715635ee96e61a98825c61efbe1f98e6922
                    • Instruction Fuzzy Hash: 6C0148B2601605ABDB109F68DC48FBA7BE9EF497A1F144078B904D3221EB31DE509AA0
                    APIs
                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00BC8608
                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00BC8612
                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00BC8621
                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00BC8628
                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00BC863E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: HeapInformationToken$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 44706859-0
                    • Opcode ID: f1cc89399233b82eb2438e19e5d4ed07a18ed84a3f827b422af32ee3e5e4d410
                    • Instruction ID: 663d48ede22c38d201ecb1dde1d3ff62fda814f55c3bfca0f349edbd08a19030
                    • Opcode Fuzzy Hash: f1cc89399233b82eb2438e19e5d4ed07a18ed84a3f827b422af32ee3e5e4d410
                    • Instruction Fuzzy Hash: 73F03731201205BFEB104FA5DC89E7B3BACEF8A754B000479FA49D7250CE619C41DA60
                    APIs
                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00BC8669
                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00BC8673
                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BC8682
                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00BC8689
                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BC869F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: HeapInformationToken$AllocErrorLastProcess
                    • String ID:
                    • API String ID: 44706859-0
                    • Opcode ID: 0bd95de2b17f0d23fc735aa225373f505947ee5addd397b076d944c324fb4622
                    • Instruction ID: 02e720cc28cb55e52fdb250edd23cdf97e124542cac555eb480268813e1ae678
                    • Opcode Fuzzy Hash: 0bd95de2b17f0d23fc735aa225373f505947ee5addd397b076d944c324fb4622
                    • Instruction Fuzzy Hash: 72F04971300205AFEB211FA5EC88FBB3BACEF89B58B100079FA49D7250CF619941DA60
                    APIs
                    • GetDlgItem.USER32(?,000003E9), ref: 00BCC6BA
                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00BCC6D1
                    • MessageBeep.USER32(00000000), ref: 00BCC6E9
                    • KillTimer.USER32(?,0000040A), ref: 00BCC705
                    • EndDialog.USER32(?,00000001), ref: 00BCC71F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                    • String ID:
                    • API String ID: 3741023627-0
                    • Opcode ID: 9016f9724181f44fccc3568de7365bc720f202fb24b391a9eb718bbfc55e8b6d
                    • Instruction ID: 2f6c281f2ba336f5fd957c6a06abf3c434ecc1aaa4d01c0e2d5d0a180d2a07a8
                    • Opcode Fuzzy Hash: 9016f9724181f44fccc3568de7365bc720f202fb24b391a9eb718bbfc55e8b6d
                    • Instruction Fuzzy Hash: 0B012C30500705AAEB215B24DD8EFB67BA8FF10B05F0006AEE546E24E19FA0A954CA80
                    APIs
                    • EndPath.GDI32(?), ref: 00B713BF
                    • StrokeAndFillPath.GDI32(?,?,00BABAD8,00000000,?), ref: 00B713DB
                    • SelectObject.GDI32(?,00000000), ref: 00B713EE
                    • DeleteObject.GDI32 ref: 00B71401
                    • StrokePath.GDI32(?), ref: 00B7141C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Path$ObjectStroke$DeleteFillSelect
                    • String ID:
                    • API String ID: 2625713937-0
                    • Opcode ID: a2185c351786b1af272c27a30b7239a0061921d130965541f5c1feda245d7570
                    • Instruction ID: 26a1905661b452c3bf2c4d462b7f3fe596833a30f48287d2792923710d5d122a
                    • Opcode Fuzzy Hash: a2185c351786b1af272c27a30b7239a0061921d130965541f5c1feda245d7570
                    • Instruction Fuzzy Hash: DAF0C430014209FBDB119F2EEC4DB683BE5EB05326F04C665E569861F1CB318995DF66
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 00BDC69D
                    • CoCreateInstance.OLE32(00C02D6C,00000000,00000001,00C02BDC,?), ref: 00BDC6B5
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                    • CoUninitialize.OLE32 ref: 00BDC922
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CreateInitializeInstanceUninitialize_memmove
                    • String ID: .lnk
                    • API String ID: 2683427295-24824748
                    • Opcode ID: c97dab588314b46f287deec25102e3662bc9ca3dfd01b22943b778e0c9616523
                    • Instruction ID: 34059823aa98ad221813c0c28d58ee15a974c233ad586abcbe5d463cca93d2ad
                    • Opcode Fuzzy Hash: c97dab588314b46f287deec25102e3662bc9ca3dfd01b22943b778e0c9616523
                    • Instruction Fuzzy Hash: F5A11F71104205AFD700EF54C891EABB7F8FF95704F0089ADF16A971A1EB71EA49CB52
                    APIs
                      • Part of subcall function 00B90FF6: std::exception::exception.LIBCMT ref: 00B9102C
                      • Part of subcall function 00B90FF6: __CxxThrowException@8.LIBCMT ref: 00B91041
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                      • Part of subcall function 00B77BB1: _memmove.LIBCMT ref: 00B77C0B
                    • __swprintf.LIBCMT ref: 00B8302D
                    Strings
                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00B82EC6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                    • API String ID: 1943609520-557222456
                    • Opcode ID: 4d4588997a0f690641e1704f15257a1a661914dcca741236f1b714784732f479
                    • Instruction ID: 4c64f0559b98c7d7f389dafdcaf327e1d5623234070c24733ce88158c48ce2f5
                    • Opcode Fuzzy Hash: 4d4588997a0f690641e1704f15257a1a661914dcca741236f1b714784732f479
                    • Instruction Fuzzy Hash: D1917C711083019FCB28FF24D895D7EB7E4EF85B50F0049ADF4969B2A1DA60EE44CB52
                    APIs
                      • Part of subcall function 00B748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B748A1,?,?,00B737C0,?), ref: 00B748CE
                    • CoInitialize.OLE32(00000000), ref: 00BDBC26
                    • CoCreateInstance.OLE32(00C02D6C,00000000,00000001,00C02BDC,?), ref: 00BDBC3F
                    • CoUninitialize.OLE32 ref: 00BDBC5C
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                    • String ID: .lnk
                    • API String ID: 2126378814-24824748
                    • Opcode ID: e94f989921eb15167f7b0574b5586aef300041ed943e8cb862799c59efd446a9
                    • Instruction ID: 59b8640da312a8340b7bb0375fbc69de13698b0eb06389c71971f4799152914c
                    • Opcode Fuzzy Hash: e94f989921eb15167f7b0574b5586aef300041ed943e8cb862799c59efd446a9
                    • Instruction Fuzzy Hash: ECA133756043019FCB10DF14C884D6ABBE5FF88324F1589A9F8AA9B3A1DB31ED45CB91
                    APIs
                    • __startOneArgErrorHandling.LIBCMT ref: 00B952DD
                      • Part of subcall function 00BA0340: __87except.LIBCMT ref: 00BA037B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorHandling__87except__start
                    • String ID: pow
                    • API String ID: 2905807303-2276729525
                    • Opcode ID: 4ff1d03ad5b1f3987fd012a4e0ea20c2eebf77c8a1a66d731fb678830282c534
                    • Instruction ID: fa9e9a9a544eabf14ef1e67f85b3725fd0be73dbe7aa3eb3626a5a162f388b9e
                    • Opcode Fuzzy Hash: 4ff1d03ad5b1f3987fd012a4e0ea20c2eebf77c8a1a66d731fb678830282c534
                    • Instruction Fuzzy Hash: E8514A21E6D60287DF267724C95136E3BE4EB06750F2089F8E496823E5EF748CD4DB4A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID: #$+
                    • API String ID: 0-2552117581
                    • Opcode ID: 10fe420ead914d0d782b104a1af740775db6e5a7624bec6aa6f5209caefdcd94
                    • Instruction ID: 3fa8464542932dd5f5c787cffd5d3bb16d7a3420962c573d0ed51e5ea65771a4
                    • Opcode Fuzzy Hash: 10fe420ead914d0d782b104a1af740775db6e5a7624bec6aa6f5209caefdcd94
                    • Instruction Fuzzy Hash: C951E3755047469FDF25AF28C488FF97BE4EF19310F5440E9E8929B2A0DB34AD82C761
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memset$_memmove
                    • String ID: ERCP
                    • API String ID: 2532777613-1384759551
                    • Opcode ID: 557995f2d695a9c9cf003645d30bc01f585dd1a513ed8b435983a781843182b6
                    • Instruction ID: 0567d8e9f8da06b4ba937e4e7a9b046ddc07fce0ef448e8f7ac6b242bbad8be1
                    • Opcode Fuzzy Hash: 557995f2d695a9c9cf003645d30bc01f585dd1a513ed8b435983a781843182b6
                    • Instruction Fuzzy Hash: B651D371900309DFCB24DF64C881BAABBF4EF04710F2485AEE54ADB251E771E980CB40
                    APIs
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00BFF910,00000000,?,?,?,?), ref: 00BF7C4E
                    • GetWindowLongW.USER32 ref: 00BF7C6B
                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00BF7C7B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$Long
                    • String ID: SysTreeView32
                    • API String ID: 847901565-1698111956
                    • Opcode ID: 0126c02180d8b8bd2939ff1e8a08feffe80c87449692315f23eff308a2246582
                    • Instruction ID: dc590749399a12726b36a3fc6c5e6735953a9a799b6170d011ad927e6ed407aa
                    • Opcode Fuzzy Hash: 0126c02180d8b8bd2939ff1e8a08feffe80c87449692315f23eff308a2246582
                    • Instruction Fuzzy Hash: 8531B03124420AABDB118F38DC41BFA77E9EF45324F2487A5FA79932E0CB31E8549B50
                    APIs
                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00BF76D0
                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00BF76E4
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00BF7708
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$Window
                    • String ID: SysMonthCal32
                    • API String ID: 2326795674-1439706946
                    • Opcode ID: bec0a52fca8d551f216bd7c7f30e4b033271f540cc82a69da41894a904c87c8d
                    • Instruction ID: 701f3fc39088b69b4b01c7fb5d93633d0f96cb51d05a7afb0da0baf8fb130fcd
                    • Opcode Fuzzy Hash: bec0a52fca8d551f216bd7c7f30e4b033271f540cc82a69da41894a904c87c8d
                    • Instruction Fuzzy Hash: D321B132550219BBDF118E64CC46FFA3BA9EF48714F110294FE15AB1D0DAB1AC54DBA0
                    APIs
                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00BF6FAA
                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00BF6FBA
                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00BF6FDF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend$MoveWindow
                    • String ID: Listbox
                    • API String ID: 3315199576-2633736733
                    • Opcode ID: 0f28bbb10877532160435fef77cc4e255572f360a7b507218bcdfe4b35314b0b
                    • Instruction ID: 72748bf31ca786cf5d7cd7d522edfa9e9608702bca5a05c70f0cb9de5be60d8f
                    • Opcode Fuzzy Hash: 0f28bbb10877532160435fef77cc4e255572f360a7b507218bcdfe4b35314b0b
                    • Instruction Fuzzy Hash: 1921813261011CBFDF119F54EC85FBB3BAAEF89764F118164FA149B190CA71AC55CBA0
                    APIs
                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00BF79E1
                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00BF79F6
                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00BF7A03
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: msctls_trackbar32
                    • API String ID: 3850602802-1010561917
                    • Opcode ID: f9d41186a7404a4f72ba804862dd4813a207c344fbf1f41fc613fedc3f132cc8
                    • Instruction ID: 8183b1b8a3e52c03cd13117ccfb61202d26e7e28067bffcbb2aee3b71c0d9979
                    • Opcode Fuzzy Hash: f9d41186a7404a4f72ba804862dd4813a207c344fbf1f41fc613fedc3f132cc8
                    • Instruction Fuzzy Hash: 8E11E73229420CBADF109F74CC05FAB77A9EF89764F024569F741A7090D6719811CB60
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00B74C2E), ref: 00B74CA3
                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00B74CB5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetNativeSystemInfo$kernel32.dll
                    • API String ID: 2574300362-192647395
                    • Opcode ID: e6ac17f98f142b9916b2ba74bcce6320c1a18cebafdd5823766afa0610df995d
                    • Instruction ID: 333a2712618a39623751f705b5d94698f331568d3fa0e35e3994f05d60b5e5ea
                    • Opcode Fuzzy Hash: e6ac17f98f142b9916b2ba74bcce6320c1a18cebafdd5823766afa0610df995d
                    • Instruction Fuzzy Hash: B7D01730510727CFD7209F35DA58636B6E5EF05792B11C8BA989AE7260EBB0D8C0CA50
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00B74CE1,?), ref: 00B74DA2
                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00B74DB4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                    • API String ID: 2574300362-1355242751
                    • Opcode ID: 283c12e9d605e60d3b72fc9565ce8ed5483bb82a5164f5c15cef01bf26dc3230
                    • Instruction ID: ea49d1eb838e5d9d5b6862591b58b962f040a13f2daf004c40f50fdab32268c2
                    • Opcode Fuzzy Hash: 283c12e9d605e60d3b72fc9565ce8ed5483bb82a5164f5c15cef01bf26dc3230
                    • Instruction Fuzzy Hash: CAD01731550723CFD7309F31D858B66B6E4EF05356B11C87AD8EAE7660EBB0D880CA50
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00B74D2E,?,00B74F4F,?,00C362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00B74D6F
                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00B74D81
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                    • API String ID: 2574300362-3689287502
                    • Opcode ID: 9316f4dcfb17067e8a8b180207085a933b760ccd8f8653bcb7a4988fe279416f
                    • Instruction ID: 8633fa55409ffc9e48c818ff8ba3b12eba204f17fc479a9ee6779540080ab0cf
                    • Opcode Fuzzy Hash: 9316f4dcfb17067e8a8b180207085a933b760ccd8f8653bcb7a4988fe279416f
                    • Instruction Fuzzy Hash: 94D01730510723CFD7309F35D848736B6E8EF15352B11C97A94DAE7660EB70D880CA50
                    APIs
                    • LoadLibraryA.KERNEL32(advapi32.dll,?,00BF12C1), ref: 00BF1080
                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00BF1092
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: RegDeleteKeyExW$advapi32.dll
                    • API String ID: 2574300362-4033151799
                    • Opcode ID: 646512400e07549ead4f12a940b41cf63154b334c46194b15563c85b3542efdf
                    • Instruction ID: bac1618c31b010aa21944e8ecaa7cbcba5bd87305b4e818632e01c94a8f78f41
                    • Opcode Fuzzy Hash: 646512400e07549ead4f12a940b41cf63154b334c46194b15563c85b3542efdf
                    • Instruction Fuzzy Hash: CED01730510727CFD7309F39E818A3AB6E4EF05361B118C7AA48AEB650EB70D8C0CA50
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00BE9009,?,00BFF910), ref: 00BE9403
                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00BE9415
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetModuleHandleExW$kernel32.dll
                    • API String ID: 2574300362-199464113
                    • Opcode ID: baaa4e981e5a7de1c87c571a280039bbd1817b851bbdc18ff94345499e65e24b
                    • Instruction ID: d3535339ee367313c3a1675cd2a46965cda7954dc17b384cc9ef1640ba933cd2
                    • Opcode Fuzzy Hash: baaa4e981e5a7de1c87c571a280039bbd1817b851bbdc18ff94345499e65e24b
                    • Instruction Fuzzy Hash: B9D01734514727CFD7309F32D949626B6E5EF05351B11C87AA486E7AA0EB70C884CA50
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: LocalTime__swprintf
                    • String ID: %.3d$WIN_XPe
                    • API String ID: 2070861257-2409531811
                    • Opcode ID: 5e93ce20fe494210fa1230b4899d1fe882abc76ccd5f989ba565b94d6930e282
                    • Instruction ID: 5ac62b8de79c765617603d9a056eb37663570878c1a608b9e18b29652c84f86f
                    • Opcode Fuzzy Hash: 5e93ce20fe494210fa1230b4899d1fe882abc76ccd5f989ba565b94d6930e282
                    • Instruction Fuzzy Hash: 24D01271804118EBCB289A949CD4CFA77FCAB04301F9449E2B50692400F6B49B85DB25
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f69dc734a66c64001a12d3ef1eea0551d0f686788e360a7633697a1e4f5f0ffb
                    • Instruction ID: 2a20daf278d382588b4ebaaa9544c148e01391b7b94ecea893afa0479f8bf04b
                    • Opcode Fuzzy Hash: f69dc734a66c64001a12d3ef1eea0551d0f686788e360a7633697a1e4f5f0ffb
                    • Instruction Fuzzy Hash: E1C12875A4421AAFCB14CF95C884EAEBBF5FF48714B11859DE806EB251DB30ED81CB90
                    APIs
                    • CharLowerBuffW.USER32(?,?), ref: 00BEE3D2
                    • CharLowerBuffW.USER32(?,?), ref: 00BEE415
                      • Part of subcall function 00BEDAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00BEDAD9
                    • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00BEE615
                    • _memmove.LIBCMT ref: 00BEE628
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: BuffCharLower$AllocVirtual_memmove
                    • String ID:
                    • API String ID: 3659485706-0
                    • Opcode ID: 24c618b2f32ad6f59dcee20456adc312aec2f45da82a07da83d6b3c2fb347cfc
                    • Instruction ID: f5a70a3202c825c00372a1b1139c6f53b5f7e08b078f9b52af28e3c88e34f060
                    • Opcode Fuzzy Hash: 24c618b2f32ad6f59dcee20456adc312aec2f45da82a07da83d6b3c2fb347cfc
                    • Instruction Fuzzy Hash: 19C16A716083419FC714DF29C48096ABBF4FF88714F1489AEF8AA9B351D771EA45CB82
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 00BE83D8
                    • CoUninitialize.OLE32 ref: 00BE83E3
                      • Part of subcall function 00BCDA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00BCDAC5
                    • VariantInit.OLEAUT32(?), ref: 00BE83EE
                    • VariantClear.OLEAUT32(?), ref: 00BE86BF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                    • String ID:
                    • API String ID: 780911581-0
                    • Opcode ID: bf1211acb43b088af8a7fc9572c1fbb961dfca8e1513678f0cf8e21c5f6622a2
                    • Instruction ID: e577c646c188cf6c8885b9a2d3e15ac84b878700e67fb6bed7fd4ff9a50bd2c4
                    • Opcode Fuzzy Hash: bf1211acb43b088af8a7fc9572c1fbb961dfca8e1513678f0cf8e21c5f6622a2
                    • Instruction Fuzzy Hash: 4EA11975204B419FDB10DF25C485B2AB7E5FF88324F148599FAAA9B3A1CB30ED04CB56
                    APIs
                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00C02C7C,?), ref: 00BC7C32
                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00C02C7C,?), ref: 00BC7C4A
                    • CLSIDFromProgID.OLE32(?,?,00000000,00BFFB80,000000FF,?,00000000,00000800,00000000,?,00C02C7C,?), ref: 00BC7C6F
                    • _memcmp.LIBCMT ref: 00BC7C90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FromProg$FreeTask_memcmp
                    • String ID:
                    • API String ID: 314563124-0
                    • Opcode ID: 8953b4f8428d07a0213262377d69a91da4e33e9bd1c9cb9c4cf230003da215f6
                    • Instruction ID: 67d6df072477c1eedf7c8eb2a321aeb827c03b45ac71e45478af85117be0e2eb
                    • Opcode Fuzzy Hash: 8953b4f8428d07a0213262377d69a91da4e33e9bd1c9cb9c4cf230003da215f6
                    • Instruction Fuzzy Hash: 7481E975A0010AEFCB04DF94C994EEEB7F9FF89315F208598E515AB250DB71AE06CB60
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Variant$AllocClearCopyInitString
                    • String ID:
                    • API String ID: 2808897238-0
                    • Opcode ID: 4104b613bdc921907975acb9d428f8835a06054795c9645b5b4f75194465eea6
                    • Instruction ID: 6c1a85c35d1517d05ea3a5657a83aefa43e681cbffd962cb3b09f1cd8a8b1be9
                    • Opcode Fuzzy Hash: 4104b613bdc921907975acb9d428f8835a06054795c9645b5b4f75194465eea6
                    • Instruction Fuzzy Hash: 875193316583029BDF24AF65D895F3AB3E5EF48310F2088AFE55ACB291DE709840DF15
                    APIs
                      • Part of subcall function 00B75045: _fseek.LIBCMT ref: 00B7505D
                      • Part of subcall function 00BD99BE: _wcscmp.LIBCMT ref: 00BD9AAE
                      • Part of subcall function 00BD99BE: _wcscmp.LIBCMT ref: 00BD9AC1
                    • _free.LIBCMT ref: 00BD992C
                    • _free.LIBCMT ref: 00BD9933
                    • _free.LIBCMT ref: 00BD999E
                      • Part of subcall function 00B92F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00B99C64), ref: 00B92FA9
                      • Part of subcall function 00B92F95: GetLastError.KERNEL32(00000000,?,00B99C64), ref: 00B92FBB
                    • _free.LIBCMT ref: 00BD99A6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                    • String ID:
                    • API String ID: 1552873950-0
                    • Opcode ID: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                    • Instruction ID: 674cc27c5a535446661c2a649f571426967f6cd223623d968b7e1b4c869f9049
                    • Opcode Fuzzy Hash: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                    • Instruction Fuzzy Hash: C45129B1904218AFDF249F64DC81A9EBBB9EF48310F1044EEF619A7341EB755E808F59
                    APIs
                    • GetWindowRect.USER32(0169DA28,?), ref: 00BF9AD2
                    • ScreenToClient.USER32(00000002,00000002), ref: 00BF9B05
                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00BF9B72
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$ClientMoveRectScreen
                    • String ID:
                    • API String ID: 3880355969-0
                    • Opcode ID: 32e93c4afb59a5dd44e6de1407b7551209e400bd9284aafa17a00852f4591188
                    • Instruction ID: a6944037e83fb85309c88272aaced60f18c8b310e72988655cf8253b1dec1ae3
                    • Opcode Fuzzy Hash: 32e93c4afb59a5dd44e6de1407b7551209e400bd9284aafa17a00852f4591188
                    • Instruction Fuzzy Hash: D9511D34A00209AFCF24DF68D881ABE7BF5FF55320F148199FA159B2A1D730AD45CB90
                    APIs
                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00BE6CE4
                    • WSAGetLastError.WSOCK32(00000000), ref: 00BE6CF4
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00BE6D58
                    • WSAGetLastError.WSOCK32(00000000), ref: 00BE6D64
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ErrorLast$__itow__swprintfsocket
                    • String ID:
                    • API String ID: 2214342067-0
                    • Opcode ID: f5ef6f92b36fd3a66c18dc3926ebcb0632ad2a0c809a1ecc98fd3d7cd5732245
                    • Instruction ID: 04d5f20c0b3782da3b53246727b95bab79c9f73611db3aaea83989db3431f3ed
                    • Opcode Fuzzy Hash: f5ef6f92b36fd3a66c18dc3926ebcb0632ad2a0c809a1ecc98fd3d7cd5732245
                    • Instruction Fuzzy Hash: 56416F75740200AFEB20AF24DC86F3A77E5DF44B60F44C4A8FA699B2D2DB719D008B91
                    APIs
                    • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00BFF910), ref: 00BE67BA
                    • _strlen.LIBCMT ref: 00BE67EC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _strlen
                    • String ID:
                    • API String ID: 4218353326-0
                    • Opcode ID: c706c0c29ba9a8bd8d3c751914380428a265a7e9c8c24a340d69ef85ff52a2eb
                    • Instruction ID: 6fde94ac2e141d40d3580a7b7db44111acc64d9d4da04d5ce924b04f7e5c1bda
                    • Opcode Fuzzy Hash: c706c0c29ba9a8bd8d3c751914380428a265a7e9c8c24a340d69ef85ff52a2eb
                    • Instruction Fuzzy Hash: 7B419531A00105ABCB14EB65DCD5FBEB7E9EF64354F1481E9F92A97292DB70AD00CB90
                    APIs
                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00BDBB09
                    • GetLastError.KERNEL32(?,00000000), ref: 00BDBB2F
                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00BDBB54
                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00BDBB80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CreateHardLink$DeleteErrorFileLast
                    • String ID:
                    • API String ID: 3321077145-0
                    • Opcode ID: 39a87ead0495cbbe7c36d0acc20566ad9a87c9906eeec4f631f53fdabcc0448e
                    • Instruction ID: 12ced856896ac604215825c4eab75b592c467f80eb12971cf683c141249e7970
                    • Opcode Fuzzy Hash: 39a87ead0495cbbe7c36d0acc20566ad9a87c9906eeec4f631f53fdabcc0448e
                    • Instruction Fuzzy Hash: D4410239200611DFCB11EF15C584A6DBBE1EF89320B09C4D9E95A9B362CB34FD01CB91
                    APIs
                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00BF8B4D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: InvalidateRect
                    • String ID:
                    • API String ID: 634782764-0
                    • Opcode ID: 2725776cb9f98d4582c315f787a711c5e4a8f991d2438d986af28074e19be519
                    • Instruction ID: 7873ddb543f941e96d414d7fc8d3e851897ece64b8c9d5b46861375fc47c7b3b
                    • Opcode Fuzzy Hash: 2725776cb9f98d4582c315f787a711c5e4a8f991d2438d986af28074e19be519
                    • Instruction Fuzzy Hash: 4031A1B460420CBEEF209B18CC99FB937E5EB05310F248592FB51D72A2CE32A948D751
                    APIs
                    • ClientToScreen.USER32(?,?), ref: 00BFAE1A
                    • GetWindowRect.USER32(?,?), ref: 00BFAE90
                    • PtInRect.USER32(?,?,00BFC304), ref: 00BFAEA0
                    • MessageBeep.USER32(00000000), ref: 00BFAF11
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Rect$BeepClientMessageScreenWindow
                    • String ID:
                    • API String ID: 1352109105-0
                    • Opcode ID: 26ac42a7229a25e796345a7fefcfeea14ff2380e9c5e97a3a6d7e3a1a6951524
                    • Instruction ID: 4ca23b1dabe35b50b37f430a8865c2929261765ae3954d29eccb54c4c1321e0a
                    • Opcode Fuzzy Hash: 26ac42a7229a25e796345a7fefcfeea14ff2380e9c5e97a3a6d7e3a1a6951524
                    • Instruction Fuzzy Hash: 10418DB4600119EFCB19CF58C884B79BBF5FF48350F2481A9E61CDB251D730A906CB92
                    APIs
                    • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00BD1037
                    • SetKeyboardState.USER32(00000080,?,00000001), ref: 00BD1053
                    • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00BD10B9
                    • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00BD110B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: KeyboardState$InputMessagePostSend
                    • String ID:
                    • API String ID: 432972143-0
                    • Opcode ID: ca11974c79c2c1dce9e13dc4a9df4be46da62b534cf6204d2f8f07d0b94e5535
                    • Instruction ID: 5d6ad16fed52ccd7e463f90032a401d903ffda02f126d62a62f9e0f351ba976d
                    • Opcode Fuzzy Hash: ca11974c79c2c1dce9e13dc4a9df4be46da62b534cf6204d2f8f07d0b94e5535
                    • Instruction Fuzzy Hash: 2A312870A40688BEFB30AA6D8C05BFAFBEAEB44310F04469BE580523D1E77489C19755
                    APIs
                    • GetKeyboardState.USER32(?,76C1C0D0,?,00008000), ref: 00BD1176
                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 00BD1192
                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 00BD11F1
                    • SendInput.USER32(00000001,?,0000001C,76C1C0D0,?,00008000), ref: 00BD1243
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: KeyboardState$InputMessagePostSend
                    • String ID:
                    • API String ID: 432972143-0
                    • Opcode ID: 63ca6f35d33fe132502c8b46971ce3a33cf3b4b10709a7489fd829060e488f69
                    • Instruction ID: e68bd47dd519a8d338090d6ab2b23ec3528371bb335226b405512636e046d9b1
                    • Opcode Fuzzy Hash: 63ca6f35d33fe132502c8b46971ce3a33cf3b4b10709a7489fd829060e488f69
                    • Instruction Fuzzy Hash: 05310730A406187AEF209A6D8804BFAFBFAEB59310F044B9BE590A23D1E3358D95D751
                    APIs
                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00BA644B
                    • __isleadbyte_l.LIBCMT ref: 00BA6479
                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00BA64A7
                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00BA64DD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                    • String ID:
                    • API String ID: 3058430110-0
                    • Opcode ID: 60b0ceef9aeddfb8cca7d1cbe2f326cc12b9f85f7ec23a69b366cab11bc6e21d
                    • Instruction ID: 439bc008027ecf380fb3023ecadccf1eef4d6a85ffde43fbde8496ce30a19277
                    • Opcode Fuzzy Hash: 60b0ceef9aeddfb8cca7d1cbe2f326cc12b9f85f7ec23a69b366cab11bc6e21d
                    • Instruction Fuzzy Hash: 9931EFB1608246AFDF218F74C884BBA7BE5FF4A710F1940A9E854872A0EF31D950DB90
                    APIs
                    • GetForegroundWindow.USER32 ref: 00BF5189
                      • Part of subcall function 00BD387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00BD3897
                      • Part of subcall function 00BD387D: GetCurrentThreadId.KERNEL32 ref: 00BD389E
                      • Part of subcall function 00BD387D: AttachThreadInput.USER32(00000000,?,00BD52A7), ref: 00BD38A5
                    • GetCaretPos.USER32(?), ref: 00BF519A
                    • ClientToScreen.USER32(00000000,?), ref: 00BF51D5
                    • GetForegroundWindow.USER32 ref: 00BF51DB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                    • String ID:
                    • API String ID: 2759813231-0
                    • Opcode ID: 345bba403a942ac5bb9ffd440d8f9c976e54e8cda718c54621a1ae44ee68effd
                    • Instruction ID: e6a52b97b7e66077c1a25ca87668887b6f0181fae2d4ca93749787ade9b9b315
                    • Opcode Fuzzy Hash: 345bba403a942ac5bb9ffd440d8f9c976e54e8cda718c54621a1ae44ee68effd
                    • Instruction Fuzzy Hash: 3931FE71900109AFDB10EFA5C885DEFB7F9EF98300F1080AAE515E7251EA759E45CBA1
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                    • GetCursorPos.USER32(?), ref: 00BFC7C2
                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00BABBFB,?,?,?,?,?), ref: 00BFC7D7
                    • GetCursorPos.USER32(?), ref: 00BFC824
                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00BABBFB,?,?,?), ref: 00BFC85E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                    • String ID:
                    • API String ID: 2864067406-0
                    • Opcode ID: 9beed83f9fd8aeb0822d2c2bdd5c1f46c7cc4c50cb35be8b5ed85bc890805e44
                    • Instruction ID: 357f39915c938e33fe907588845eca58adc806fb5f130e227e34b27bd4beadfb
                    • Opcode Fuzzy Hash: 9beed83f9fd8aeb0822d2c2bdd5c1f46c7cc4c50cb35be8b5ed85bc890805e44
                    • Instruction Fuzzy Hash: E7315C3560001CAFCB158F58C898EBA7FE6EB49350F0440A9FA058B2A1C7329D94DBA0
                    APIs
                      • Part of subcall function 00BC8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00BC8669
                      • Part of subcall function 00BC8652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00BC8673
                      • Part of subcall function 00BC8652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BC8682
                      • Part of subcall function 00BC8652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00BC8689
                      • Part of subcall function 00BC8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00BC869F
                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00BC8BEB
                    • _memcmp.LIBCMT ref: 00BC8C0E
                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00BC8C44
                    • HeapFree.KERNEL32(00000000), ref: 00BC8C4B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                    • String ID:
                    • API String ID: 1592001646-0
                    • Opcode ID: d447ee0ade4bf565a1d52a17edb219af14daaf0456cfb7f4bc7b9295aa31c017
                    • Instruction ID: 4c58d3d631e5d0ffe792e1f3b02834a72b29c27409f75514b6ebcf82f2682973
                    • Opcode Fuzzy Hash: d447ee0ade4bf565a1d52a17edb219af14daaf0456cfb7f4bc7b9295aa31c017
                    • Instruction Fuzzy Hash: 3F216972E01209ABDB10DFA4C945FEEB7F8EF44355F1540A9E554A7240DB31AA06DB60
                    APIs
                    • __setmode.LIBCMT ref: 00B90BF2
                      • Part of subcall function 00B75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00BD7B20,?,?,00000000), ref: 00B75B8C
                      • Part of subcall function 00B75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00BD7B20,?,?,00000000,?,?), ref: 00B75BB0
                    • _fprintf.LIBCMT ref: 00B90C29
                    • OutputDebugStringW.KERNEL32(?), ref: 00BC6331
                      • Part of subcall function 00B94CDA: _flsall.LIBCMT ref: 00B94CF3
                    • __setmode.LIBCMT ref: 00B90C5E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                    • String ID:
                    • API String ID: 521402451-0
                    • Opcode ID: 81764ab19d33b6c08eb1fa4af28826d939265d2d2c94884e368e07f48299168f
                    • Instruction ID: 8945eeadf42e9674e1a830753449f260cead3c3b731940d0b0fb7f8ad84f2a37
                    • Opcode Fuzzy Hash: 81764ab19d33b6c08eb1fa4af28826d939265d2d2c94884e368e07f48299168f
                    • Instruction Fuzzy Hash: A81124329042087EDF15B7B49C82EBEBBE9DF45320F1481FAF20857282EF615D4283A5
                    APIs
                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00BE1A97
                      • Part of subcall function 00BE1B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00BE1B40
                      • Part of subcall function 00BE1B21: InternetCloseHandle.WININET(00000000), ref: 00BE1BDD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Internet$CloseConnectHandleOpen
                    • String ID:
                    • API String ID: 1463438336-0
                    • Opcode ID: b860f6404e7e4f6e96e17a1290c157754738e2eb14f4bcd9e84b3229bd57f487
                    • Instruction ID: 57c20695a03ed245cd3eda38057da8817411d2d5c6ad9fb7476f288d261297fb
                    • Opcode Fuzzy Hash: b860f6404e7e4f6e96e17a1290c157754738e2eb14f4bcd9e84b3229bd57f487
                    • Instruction Fuzzy Hash: F6218035200641BFDB119F768C41FBAB7EDFF44701F20455AFA1297650EB71A811D7A0
                    APIs
                      • Part of subcall function 00BCF5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00BCE1C4,?,?,?,00BCEFB7,00000000,000000EF,00000119,?,?), ref: 00BCF5BC
                      • Part of subcall function 00BCF5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00BCF5E2
                      • Part of subcall function 00BCF5AD: lstrcmpiW.KERNEL32(00000000,?,00BCE1C4,?,?,?,00BCEFB7,00000000,000000EF,00000119,?,?), ref: 00BCF613
                    • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00BCEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00BCE1DD
                    • lstrcpyW.KERNEL32(00000000,?), ref: 00BCE203
                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,00BCEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00BCE237
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: lstrcmpilstrcpylstrlen
                    • String ID: cdecl
                    • API String ID: 4031866154-3896280584
                    • Opcode ID: c811d8603566f559eb455455a14f715156d68cf4fb3c34e76b6c5348c1d573b3
                    • Instruction ID: 7d9dcf9e96773de9dcec51bfdb7b9499e36899b372a82823ba96657f3a714110
                    • Opcode Fuzzy Hash: c811d8603566f559eb455455a14f715156d68cf4fb3c34e76b6c5348c1d573b3
                    • Instruction Fuzzy Hash: CA11BE36200302EFCB25AF64D845F7A77E9FF84350B4040AAF916CB260EB71D950D7A0
                    APIs
                    • _free.LIBCMT ref: 00BA5351
                      • Part of subcall function 00B9594C: __FF_MSGBANNER.LIBCMT ref: 00B95963
                      • Part of subcall function 00B9594C: __NMSG_WRITE.LIBCMT ref: 00B9596A
                      • Part of subcall function 00B9594C: RtlAllocateHeap.NTDLL(01680000,00000000,00000001,00000000,?,?,?,00B91013,?), ref: 00B9598F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: AllocateHeap_free
                    • String ID:
                    • API String ID: 614378929-0
                    • Opcode ID: 2ec29b692438f425415ccb7d4ff6f92820c4f0436116145b77a8307b54f41d35
                    • Instruction ID: 0510ff8a3e69e2c94091d77e20d15d75b35aa2b5d5f0ae604724be9a10c857ba
                    • Opcode Fuzzy Hash: 2ec29b692438f425415ccb7d4ff6f92820c4f0436116145b77a8307b54f41d35
                    • Instruction Fuzzy Hash: 4B11E772508A15AFCF312F70AC4576E37D8AF563A0B1004F9F90697191DE758B408758
                    APIs
                    • _memset.LIBCMT ref: 00B74560
                      • Part of subcall function 00B7410D: _memset.LIBCMT ref: 00B7418D
                      • Part of subcall function 00B7410D: _wcscpy.LIBCMT ref: 00B741E1
                      • Part of subcall function 00B7410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00B741F1
                    • KillTimer.USER32(?,00000001,?,?), ref: 00B745B5
                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B745C4
                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00BAD6CE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                    • String ID:
                    • API String ID: 1378193009-0
                    • Opcode ID: f4e384579ce949936aebf173340de01de9624c0187d8a8fdb7916b432d507f0e
                    • Instruction ID: 0a34782ada22df802bc9037af4cc2fe5f6f455e9b769cef9e858a0ff771d1d65
                    • Opcode Fuzzy Hash: f4e384579ce949936aebf173340de01de9624c0187d8a8fdb7916b432d507f0e
                    • Instruction Fuzzy Hash: D121C570908784AFEB328B249885BFBBBECDF12305F0440DDE69E57281C7B45A84DB51
                    APIs
                      • Part of subcall function 00B75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00BD7B20,?,?,00000000), ref: 00B75B8C
                      • Part of subcall function 00B75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00BD7B20,?,?,00000000,?,?), ref: 00B75BB0
                    • gethostbyname.WSOCK32(?,?,?), ref: 00BE66AC
                    • WSAGetLastError.WSOCK32(00000000), ref: 00BE66B7
                    • _memmove.LIBCMT ref: 00BE66E4
                    • inet_ntoa.WSOCK32(?), ref: 00BE66EF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                    • String ID:
                    • API String ID: 1504782959-0
                    • Opcode ID: 26c29cf3eb9fa81e6fcf0c58363138adf9da3a0f67e34276a0c8995be5e1f01c
                    • Instruction ID: ad493ec5db93bfdb597cf63e48abb940e728bc14fea8eaff16d1f3f1d371413a
                    • Opcode Fuzzy Hash: 26c29cf3eb9fa81e6fcf0c58363138adf9da3a0f67e34276a0c8995be5e1f01c
                    • Instruction Fuzzy Hash: 27115B35900509AFCB00EBA4DD86DFEB7F8EF14310B1480A5F51AA7261DF70AE04DB61
                    APIs
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00BC9043
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BC9055
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BC906B
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00BC9086
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 9d9afc8160df003b9f83f55d21bf439077725f3c2199c2c0084096531869799d
                    • Instruction ID: f267e1d25a92f1cfbbebbf1de74bdfe5075c98b2b83c77e0d44a44c326e5a612
                    • Opcode Fuzzy Hash: 9d9afc8160df003b9f83f55d21bf439077725f3c2199c2c0084096531869799d
                    • Instruction Fuzzy Hash: CE111C79901218FFEB11DFA5C985FADBBB4FB48710F204095E904B7250DA716E50DB94
                    APIs
                      • Part of subcall function 00B72612: GetWindowLongW.USER32(?,000000EB), ref: 00B72623
                    • DefDlgProcW.USER32(?,00000020,?), ref: 00B712D8
                    • GetClientRect.USER32(?,?), ref: 00BAB84B
                    • GetCursorPos.USER32(?), ref: 00BAB855
                    • ScreenToClient.USER32(?,?), ref: 00BAB860
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Client$CursorLongProcRectScreenWindow
                    • String ID:
                    • API String ID: 4127811313-0
                    • Opcode ID: 0296ff1efe5ca210a44dfc8feaccfbbca2c7d79ed0020276ff35eb4881ae7c15
                    • Instruction ID: 7945470e3fc994101f0ee4c75d86cbfb2b88569d7a1364bdcfb85e8e7e178995
                    • Opcode Fuzzy Hash: 0296ff1efe5ca210a44dfc8feaccfbbca2c7d79ed0020276ff35eb4881ae7c15
                    • Instruction Fuzzy Hash: 9511193550001ABFCB04DF98D8859BE77F8EB05300F008895E925E7251CB30AA55CBB5
                    APIs
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00BD01FD,?,00BD1250,?,00008000), ref: 00BD166F
                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00BD01FD,?,00BD1250,?,00008000), ref: 00BD1694
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00BD01FD,?,00BD1250,?,00008000), ref: 00BD169E
                    • Sleep.KERNEL32(?,?,?,?,?,?,?,00BD01FD,?,00BD1250,?,00008000), ref: 00BD16D1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CounterPerformanceQuerySleep
                    • String ID:
                    • API String ID: 2875609808-0
                    • Opcode ID: f0804125687887d7d6a9dd1dca051fce669f27ca3a93c6b5ab3cb49dd0c4985e
                    • Instruction ID: 54a227a01a88acdfd743fa73f8c474cf754a1f7654c942abd0b79439fcd08cba
                    • Opcode Fuzzy Hash: f0804125687887d7d6a9dd1dca051fce669f27ca3a93c6b5ab3cb49dd0c4985e
                    • Instruction Fuzzy Hash: DA111831C00519EBCF009FA9D988AFEFBB8FF09751F054496EA44B7240DB309660DB96
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction ID: e23893bf0b8a5a57cadab058f5ff61ac5728399edc72ac6c059db295a29bd20f
                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                    • Instruction Fuzzy Hash: C7017E3208C24ABBCF125E84CC419EE3FA6BF1A340F088595FA1858031DA36C9B1AB81
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 00BFB59E
                    • ScreenToClient.USER32(?,?), ref: 00BFB5B6
                    • ScreenToClient.USER32(?,?), ref: 00BFB5DA
                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00BFB5F5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ClientRectScreen$InvalidateWindow
                    • String ID:
                    • API String ID: 357397906-0
                    • Opcode ID: 87c081919d5bfdb5cec7a1937e22fd9c833ea2fa3e75808d15a7198b3634e117
                    • Instruction ID: 6387ad5965fee5509a59aeb8e843b40c5c85fb4f6d3b2aec3a41ec4e4b39c510
                    • Opcode Fuzzy Hash: 87c081919d5bfdb5cec7a1937e22fd9c833ea2fa3e75808d15a7198b3634e117
                    • Instruction Fuzzy Hash: 441123B9D0020AAFDB41CF99C4849AEBBB5FF18310F104166E914E3220DB35AA55CB50
                    APIs
                    • _memset.LIBCMT ref: 00BFB8FE
                    • _memset.LIBCMT ref: 00BFB90D
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00C37F20,00C37F64), ref: 00BFB93C
                    • CloseHandle.KERNEL32 ref: 00BFB94E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _memset$CloseCreateHandleProcess
                    • String ID:
                    • API String ID: 3277943733-0
                    • Opcode ID: 7b52e7adfe8d449c7e8551583f5a35245a19ae6437cf7adcfdb2712a53240e55
                    • Instruction ID: 31f09d71e010c0d05926ec63aeae6bd63ae589f8a4f2d9847df894c40c63238a
                    • Opcode Fuzzy Hash: 7b52e7adfe8d449c7e8551583f5a35245a19ae6437cf7adcfdb2712a53240e55
                    • Instruction Fuzzy Hash: 93F05EF25543057BE62027A1AC45FBB3ADCFB0C754F004170FB08D6192D7714910C7A8
                    APIs
                    • EnterCriticalSection.KERNEL32(?), ref: 00BD6E88
                      • Part of subcall function 00BD794E: _memset.LIBCMT ref: 00BD7983
                    • _memmove.LIBCMT ref: 00BD6EAB
                    • _memset.LIBCMT ref: 00BD6EB8
                    • LeaveCriticalSection.KERNEL32(?), ref: 00BD6EC8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CriticalSection_memset$EnterLeave_memmove
                    • String ID:
                    • API String ID: 48991266-0
                    • Opcode ID: 8bf89cf949866b0814749401d25b6d3a4224f93dce6b3d08826ac862be22b007
                    • Instruction ID: aa5a3727cd923f46bd4772cabcb6f389d084d0cd2f61a85c1c2b5d170484bcf5
                    • Opcode Fuzzy Hash: 8bf89cf949866b0814749401d25b6d3a4224f93dce6b3d08826ac862be22b007
                    • Instruction Fuzzy Hash: 67F0543A100200BBCF016F55DC85A99FB69EF45320B0480A5FE085F21ADB35A911DBB4
                    APIs
                      • Part of subcall function 00B712F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00B7134D
                      • Part of subcall function 00B712F3: SelectObject.GDI32(?,00000000), ref: 00B7135C
                      • Part of subcall function 00B712F3: BeginPath.GDI32(?), ref: 00B71373
                      • Part of subcall function 00B712F3: SelectObject.GDI32(?,00000000), ref: 00B7139C
                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00BFC030
                    • LineTo.GDI32(00000000,?,?), ref: 00BFC03D
                    • EndPath.GDI32(00000000), ref: 00BFC04D
                    • StrokePath.GDI32(00000000), ref: 00BFC05B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                    • String ID:
                    • API String ID: 1539411459-0
                    • Opcode ID: 2d66b27d321f7eb9e05b2e017b9d0bfc2205dea4daef5225145b49e1ca7628aa
                    • Instruction ID: afaeb5318441517abf3ac6ec539f55e7e7af85d2e2049e4964cb63105c347033
                    • Opcode Fuzzy Hash: 2d66b27d321f7eb9e05b2e017b9d0bfc2205dea4daef5225145b49e1ca7628aa
                    • Instruction Fuzzy Hash: 77F05E3100525EBBDB126F64AC0AFEE3F99AF0A311F048050FB11631E28F755655DBA9
                    APIs
                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00BCA399
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00BCA3AC
                    • GetCurrentThreadId.KERNEL32 ref: 00BCA3B3
                    • AttachThreadInput.USER32(00000000), ref: 00BCA3BA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                    • String ID:
                    • API String ID: 2710830443-0
                    • Opcode ID: f65d221468558044968a90c8ef1c61abe7dc4ef46802345fc05e48c493965348
                    • Instruction ID: 4c62a9b2c4642b56e8ead556c231bd9be9e4470cf3e07230261b86f5f8eb1a2e
                    • Opcode Fuzzy Hash: f65d221468558044968a90c8ef1c61abe7dc4ef46802345fc05e48c493965348
                    • Instruction Fuzzy Hash: 5CE03931241268BADB201BA2DC0CFF73F5CEF167A1F008028F908DA0A0CE718940CBA0
                    APIs
                    • GetSysColor.USER32(00000008), ref: 00B72231
                    • SetTextColor.GDI32(?,000000FF), ref: 00B7223B
                    • SetBkMode.GDI32(?,00000001), ref: 00B72250
                    • GetStockObject.GDI32(00000005), ref: 00B72258
                    • GetWindowDC.USER32(?,00000000), ref: 00BAC0D3
                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00BAC0E0
                    • GetPixel.GDI32(00000000,?,00000000), ref: 00BAC0F9
                    • GetPixel.GDI32(00000000,00000000,?), ref: 00BAC112
                    • GetPixel.GDI32(00000000,?,?), ref: 00BAC132
                    • ReleaseDC.USER32(?,00000000), ref: 00BAC13D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                    • String ID:
                    • API String ID: 1946975507-0
                    • Opcode ID: f54625be5528c6096f6bef377b093112c496a9e7de8311e0395f3fc49694907a
                    • Instruction ID: 1c111361492aa2a303dff7d08b598b3c8cbedb499999774a8aa78b4706b3916b
                    • Opcode Fuzzy Hash: f54625be5528c6096f6bef377b093112c496a9e7de8311e0395f3fc49694907a
                    • Instruction Fuzzy Hash: D1E03932204245EADB215F64EC097F83B54EB16336F0083A6FA696A0E18B728A90DB11
                    APIs
                    • GetCurrentThread.KERNEL32 ref: 00BC8C63
                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,00BC882E), ref: 00BC8C6A
                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00BC882E), ref: 00BC8C77
                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,00BC882E), ref: 00BC8C7E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CurrentOpenProcessThreadToken
                    • String ID:
                    • API String ID: 3974789173-0
                    • Opcode ID: 6841495c7e33ddea4dc94bd794a95c1539977080bf3c39057e51f22e8f7093d2
                    • Instruction ID: 5ab4054aee8ec16379dfb17c4fe7cb1175a645c8de1f496f610171954e06a0da
                    • Opcode Fuzzy Hash: 6841495c7e33ddea4dc94bd794a95c1539977080bf3c39057e51f22e8f7093d2
                    • Instruction Fuzzy Hash: E5E04636642312ABD7205FB0AD0CFB73BA8EF50792F084878B286CB080EE348441CB65
                    APIs
                    • GetDesktopWindow.USER32 ref: 00BB2187
                    • GetDC.USER32(00000000), ref: 00BB2191
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00BB21B1
                    • ReleaseDC.USER32(?), ref: 00BB21D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: b59d866f5f21dc9e4adf03a6ad17dbc930592fd8332a6113240bcec7bb853801
                    • Instruction ID: 4b184dcdb600bf35d6b7eb3e9a2ebb0c08ca71c1d692eb4263ed16f278fc27bc
                    • Opcode Fuzzy Hash: b59d866f5f21dc9e4adf03a6ad17dbc930592fd8332a6113240bcec7bb853801
                    • Instruction Fuzzy Hash: 68E0CAB5800206AFDB019FA0C888ABD7BF1AF48350F208429E96AE7220CF788542DF40
                    APIs
                    • GetDesktopWindow.USER32 ref: 00BB219B
                    • GetDC.USER32(00000000), ref: 00BB21A5
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00BB21B1
                    • ReleaseDC.USER32(?), ref: 00BB21D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: af8b964cad7c29e723d04413a73121da277b14c1e14ea7f2948362e5f29c9580
                    • Instruction ID: 5e96f2b3d1ccf1c2e18c5eb064d45ee4fb0b6a22c907266bb87d9e16f4701bd2
                    • Opcode Fuzzy Hash: af8b964cad7c29e723d04413a73121da277b14c1e14ea7f2948362e5f29c9580
                    • Instruction Fuzzy Hash: FEE05AB5800206AFCB119FA098886AD7AE5AF58351B118429E96AE7260DF789541DF40
                    APIs
                    • OleSetContainedObject.OLE32(?,00000001), ref: 00BCB981
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ContainedObject
                    • String ID: AutoIt3GUI$Container
                    • API String ID: 3565006973-3941886329
                    • Opcode ID: 6d97c4166c4c6711a9a677994d31c8059f09c22a8ac3d010facf8979137d3993
                    • Instruction ID: a46ec14e59f2b9c365cb583a45721d01b8fd1df19635206550457537a9b19f8c
                    • Opcode Fuzzy Hash: 6d97c4166c4c6711a9a677994d31c8059f09c22a8ac3d010facf8979137d3993
                    • Instruction Fuzzy Hash: C0913A706006019FDB64DF64C885F6AB7E9FF48710F2485AEF94ACB691DB70E841CB50
                    APIs
                      • Part of subcall function 00B8FEC6: _wcscpy.LIBCMT ref: 00B8FEE9
                      • Part of subcall function 00B79997: __itow.LIBCMT ref: 00B799C2
                      • Part of subcall function 00B79997: __swprintf.LIBCMT ref: 00B79A0C
                    • __wcsnicmp.LIBCMT ref: 00BDB298
                    • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00BDB361
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                    • String ID: LPT
                    • API String ID: 3222508074-1350329615
                    • Opcode ID: f24ea44f8a1e86fc69c0c4c7c6f06400651550e6b6ebeb6c7ef662108f8a65ca
                    • Instruction ID: ed5ee6ecb0e27aaa793db47b210989093701fbd26dd49744229af07aa0399b10
                    • Opcode Fuzzy Hash: f24ea44f8a1e86fc69c0c4c7c6f06400651550e6b6ebeb6c7ef662108f8a65ca
                    • Instruction Fuzzy Hash: EC616075A00215EFCB14DF94C881EAEB7F4EF48310F1581AAF55AAB391EB70AE40DB54
                    APIs
                    • Sleep.KERNEL32(00000000), ref: 00B82AC8
                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00B82AE1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: GlobalMemorySleepStatus
                    • String ID: @
                    • API String ID: 2783356886-2766056989
                    • Opcode ID: f4e101edc9063bbd17d2e3a07c7c981cecba429207bea141f48e937afbed8f1f
                    • Instruction ID: d0082614fa3496d689fc28612d594a8dd84805bd9b2ec94b043df5e02a054679
                    • Opcode Fuzzy Hash: f4e101edc9063bbd17d2e3a07c7c981cecba429207bea141f48e937afbed8f1f
                    • Instruction Fuzzy Hash: 215159724187449BD320AF10DC86BAFBBF8FF85314F4288ADF1E9511A5DB309529CB66
                    APIs
                      • Part of subcall function 00B7506B: __fread_nolock.LIBCMT ref: 00B75089
                    • _wcscmp.LIBCMT ref: 00BD9AAE
                    • _wcscmp.LIBCMT ref: 00BD9AC1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: _wcscmp$__fread_nolock
                    • String ID: FILE
                    • API String ID: 4029003684-3121273764
                    • Opcode ID: fe3ee1eee253f4aa7ba8c7ccab53b7c256f003eab3683df85d0fd684919b420d
                    • Instruction ID: f20fa86a524dc356962abb10ac6921840372f29fa1398dae7537f4a3bd7bb639
                    • Opcode Fuzzy Hash: fe3ee1eee253f4aa7ba8c7ccab53b7c256f003eab3683df85d0fd684919b420d
                    • Instruction Fuzzy Hash: 1C41F871A00619BADF209AA0DC85FEFBBFDDF45710F0140BAF905B7281DA75AE0487A1
                    APIs
                    • _memset.LIBCMT ref: 00BE2892
                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00BE28C8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CrackInternet_memset
                    • String ID: |
                    • API String ID: 1413715105-2343686810
                    • Opcode ID: 54c4f1fb7bbe6d02e180063cce460d87ad02a4ff3485090cb38c17c63758fd2d
                    • Instruction ID: baa6b069c6e8678ddebed9c05b5fbf82efadf9f989ce684670da6a2d7b3eb156
                    • Opcode Fuzzy Hash: 54c4f1fb7bbe6d02e180063cce460d87ad02a4ff3485090cb38c17c63758fd2d
                    • Instruction Fuzzy Hash: 0A311971804119AFCF01EFA1CC85EEEBFB9FF08300F1041A9F819A6166DB315A56DBA0
                    APIs
                    • DestroyWindow.USER32(?,?,?,?), ref: 00BF6D86
                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00BF6DC2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$DestroyMove
                    • String ID: static
                    • API String ID: 2139405536-2160076837
                    • Opcode ID: 3bf5f040e96b87d88c3093dc26060ab8071181fc38bef1e261ebcd513906be2c
                    • Instruction ID: f5f8f8a6706f8e839dec41317394af35bb018b62b9cffe953e07f86ff673db12
                    • Opcode Fuzzy Hash: 3bf5f040e96b87d88c3093dc26060ab8071181fc38bef1e261ebcd513906be2c
                    • Instruction Fuzzy Hash: 42317075210608AADB109F78CC80BFB77F9FF48760F108669F9A997190DA31AC55DB60
                    APIs
                    • _memset.LIBCMT ref: 00BD2E00
                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00BD2E3B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: InfoItemMenu_memset
                    • String ID: 0
                    • API String ID: 2223754486-4108050209
                    • Opcode ID: 60f2e086212e355fa5eae373383df50835e6a6d5fa3bdd8d4622df9369b0204c
                    • Instruction ID: 0b4c2dfd0d974e611cb43db576afda443183ace2f15523c37081c6b868ebe669
                    • Opcode Fuzzy Hash: 60f2e086212e355fa5eae373383df50835e6a6d5fa3bdd8d4622df9369b0204c
                    • Instruction Fuzzy Hash: BC31F531A00345ABEB248F48C885BAEFBF9EF15340F1444ABE985972A1F7709941CB50
                    APIs
                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00BF69D0
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00BF69DB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Combobox
                    • API String ID: 3850602802-2096851135
                    • Opcode ID: 23ab32e48bbfe84a6af1203f8770fcc9a6c1413d7c023ca074266ffcc7ccf5bf
                    • Instruction ID: ad6ea18662aecb9a8fa7360267c76d0960e7c16418709cab8e2ae80d3bfb76bc
                    • Opcode Fuzzy Hash: 23ab32e48bbfe84a6af1203f8770fcc9a6c1413d7c023ca074266ffcc7ccf5bf
                    • Instruction Fuzzy Hash: 0A11B67160020D7FEF159F64CC80EBB37AAEB893A4F118164FE5897290D6B19C5587A0
                    APIs
                      • Part of subcall function 00B71D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B71D73
                      • Part of subcall function 00B71D35: GetStockObject.GDI32(00000011), ref: 00B71D87
                      • Part of subcall function 00B71D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B71D91
                    • GetWindowRect.USER32(00000000,?), ref: 00BF6EE0
                    • GetSysColor.USER32(00000012), ref: 00BF6EFA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                    • String ID: static
                    • API String ID: 1983116058-2160076837
                    • Opcode ID: 6925101338c3d4b626d6890c5505530401a3b9ed0f50c926cfa07c2671955c8c
                    • Instruction ID: 7c11b37c1eac481f16c681e104591459ec30a338eab17e120c8f0acf74692e2b
                    • Opcode Fuzzy Hash: 6925101338c3d4b626d6890c5505530401a3b9ed0f50c926cfa07c2671955c8c
                    • Instruction Fuzzy Hash: DF21177261020AAFDB04DFA8DD45AFA7BF8EB08314F004669FE55D3250D634E865DB60
                    APIs
                    • GetWindowTextLengthW.USER32(00000000), ref: 00BF6C11
                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00BF6C20
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: LengthMessageSendTextWindow
                    • String ID: edit
                    • API String ID: 2978978980-2167791130
                    • Opcode ID: 074b53e0eef4e73f636cd92fe49827ad3ed120a3933b834c3877e4767df2e970
                    • Instruction ID: 2e7209924613ba88e62ac57611554047b2614ced64ec6ae935d129b59fb5b123
                    • Opcode Fuzzy Hash: 074b53e0eef4e73f636cd92fe49827ad3ed120a3933b834c3877e4767df2e970
                    • Instruction Fuzzy Hash: 67116D7150010CABEB104F64DC42ABA3BA9EF15368F504764FEA5D71E0C675DC999B60
                    APIs
                    • _memset.LIBCMT ref: 00BD2F11
                    • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00BD2F30
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: InfoItemMenu_memset
                    • String ID: 0
                    • API String ID: 2223754486-4108050209
                    • Opcode ID: 98f25072aebbf129a22c38c73a2c9a39245a7af6bdb8e85625875e643acbcb49
                    • Instruction ID: 3ab1f81ab2f136acb23e3eb501e975ca18afaf06723f7e69fdd39cdcd707bd7b
                    • Opcode Fuzzy Hash: 98f25072aebbf129a22c38c73a2c9a39245a7af6bdb8e85625875e643acbcb49
                    • Instruction Fuzzy Hash: A211D031901155ABCF21DB98DC84BADF3F9EB25310F0440E2E844A73A0E7B0AD05C791
                    APIs
                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00BE2520
                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00BE2549
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Internet$OpenOption
                    • String ID: <local>
                    • API String ID: 942729171-4266983199
                    • Opcode ID: 52c7e16ec20a9d84f48176cd2828bc1c63a0326f1315bf10c8cd73dbb5981883
                    • Instruction ID: 2359f0bdbe6d888f1e258d1a5814ea2669c9a64d7ce127c1958a637886eb8433
                    • Opcode Fuzzy Hash: 52c7e16ec20a9d84f48176cd2828bc1c63a0326f1315bf10c8cd73dbb5981883
                    • Instruction Fuzzy Hash: AB11E0701002A5BADB248F528C99EBBFFECFF26351F10816AFA0547140D3706940DAE0
                    APIs
                      • Part of subcall function 00BE830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00BE80C8,?,00000000,?,?), ref: 00BE8322
                    • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00BE80CB
                    • htons.WSOCK32(00000000,?,00000000), ref: 00BE8108
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ByteCharMultiWidehtonsinet_addr
                    • String ID: 255.255.255.255
                    • API String ID: 2496851823-2422070025
                    • Opcode ID: bf282e16bb0712d05ac63cb06d0a107b2bbe7afb6b347ef4e0832748bd45249d
                    • Instruction ID: 93585f86e103e6bfe462622f72c976ccab83a813495cf18812de3c5eb9925b2e
                    • Opcode Fuzzy Hash: bf282e16bb0712d05ac63cb06d0a107b2bbe7afb6b347ef4e0832748bd45249d
                    • Instruction Fuzzy Hash: A9110874600645ABDB20AF65CC86FBDB3B4FF04310F1085AAF915A7292DF71A801C756
                    APIs
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                      • Part of subcall function 00BCB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00BCB0E7
                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00BC9355
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 372448540-1403004172
                    • Opcode ID: b2e454cb5d84d98a2cfc852bc8a0bc1f34e4072d1e994702f5506d0db335fd3d
                    • Instruction ID: 478890cc8bf05ec2af4b98158230fc34244403f54a30b7d78a7c5aa8ff0d074e
                    • Opcode Fuzzy Hash: b2e454cb5d84d98a2cfc852bc8a0bc1f34e4072d1e994702f5506d0db335fd3d
                    • Instruction Fuzzy Hash: 0001F171A41214ABCB04EBA0CC96DFE77E9FF46320B200AADF872572D1DF315808C650
                    APIs
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                      • Part of subcall function 00BCB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00BCB0E7
                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00BC924D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 372448540-1403004172
                    • Opcode ID: 78204892dd62fdb40a9b7bb1e676bcada31976b882336b0e75c17e477db82a0c
                    • Instruction ID: b1fa7883919dac0916daa936bd377caae7f92f885f8e3313c895ad104119e46c
                    • Opcode Fuzzy Hash: 78204892dd62fdb40a9b7bb1e676bcada31976b882336b0e75c17e477db82a0c
                    • Instruction Fuzzy Hash: 6C018471A411047BDB14EBA0C996EFF73E8DF05300F2401A9B9566B681EE255E089661
                    APIs
                      • Part of subcall function 00B77F41: _memmove.LIBCMT ref: 00B77F82
                      • Part of subcall function 00BCB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00BCB0E7
                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 00BC92D0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ClassMessageNameSend_memmove
                    • String ID: ComboBox$ListBox
                    • API String ID: 372448540-1403004172
                    • Opcode ID: 4f5b470e943904d008a7e4650439b45f3a6a2474d23d190f1648f37188e5ee9a
                    • Instruction ID: bead0e03fdc7c14210a169cd0827aa0e4d3aeb5c22439fa0851a8b7f8256a2df
                    • Opcode Fuzzy Hash: 4f5b470e943904d008a7e4650439b45f3a6a2474d23d190f1648f37188e5ee9a
                    • Instruction Fuzzy Hash: 8301A271A8110877DB14EBA0C986EFF77ECDF11300F2441A9B86667282DE215E0CD272
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: ClassName_wcscmp
                    • String ID: #32770
                    • API String ID: 2292705959-463685578
                    • Opcode ID: 60110c0be015b46a35b652bfdaa01b14f884b5411908bb9ce3d21fb62ed8e2b0
                    • Instruction ID: 01e1649ce5b39b058cc46174fa6f8906c31b9fdb2c9c009c24f6026af91f873e
                    • Opcode Fuzzy Hash: 60110c0be015b46a35b652bfdaa01b14f884b5411908bb9ce3d21fb62ed8e2b0
                    • Instruction Fuzzy Hash: 1AE09272A042296BE720AA99AC49FA7F7ECEB45B61F0001ABF914D3150E5609A458BE1
                    APIs
                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00BC81CA
                      • Part of subcall function 00B93598: _doexit.LIBCMT ref: 00B935A2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: Message_doexit
                    • String ID: AutoIt$Error allocating memory.
                    • API String ID: 1993061046-4017498283
                    • Opcode ID: 7d16741a22e414ee7f04cf48f01a4c09f349ae62ecb8f1def05d99fb01e0f4c3
                    • Instruction ID: ee268c5e77f21baf113d20fd1d2525574423b5eb9ed521a4e8d9701d8275c559
                    • Opcode Fuzzy Hash: 7d16741a22e414ee7f04cf48f01a4c09f349ae62ecb8f1def05d99fb01e0f4c3
                    • Instruction Fuzzy Hash: F0D012322C532936D61532A86C06FD565C88B19B52F544475BB08965D38ED29981829D
                    APIs
                      • Part of subcall function 00BAB564: _memset.LIBCMT ref: 00BAB571
                      • Part of subcall function 00B90B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00BAB540,?,?,?,00B7100A), ref: 00B90B89
                    • IsDebuggerPresent.KERNEL32(?,?,?,00B7100A), ref: 00BAB544
                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00B7100A), ref: 00BAB553
                    Strings
                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00BAB54E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                    • API String ID: 3158253471-631824599
                    • Opcode ID: 5d69a2d3f07c8f33ca69687ecd0c1f65a7797f805eff2f441b64d18db3cd5bc2
                    • Instruction ID: 18ae0fea70bd4d46d1c06b61b18e381d5622e0b8fcd52dc035d532270de14bc2
                    • Opcode Fuzzy Hash: 5d69a2d3f07c8f33ca69687ecd0c1f65a7797f805eff2f441b64d18db3cd5bc2
                    • Instruction Fuzzy Hash: 33E06DB4A143118FD720EF28E414B567BE0AF15715F0489ADE456C3252EBB4D444CB61
                    APIs
                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00BF5BF5
                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00BF5C08
                      • Part of subcall function 00BD54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00BD555E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1358203580.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                    • Associated: 00000000.00000002.1358147019.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000BFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1359231910.0000000000C25000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360269939.0000000000C2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1360289604.0000000000C38000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_b70000_documentos.jbxd
                    Similarity
                    • API ID: FindMessagePostSleepWindow
                    • String ID: Shell_TrayWnd
                    • API String ID: 529655941-2988720461
                    • Opcode ID: ccd208557159b51a9bbeb492e0a1ad0f1de6dad25fcb651ec578134f7b22e839
                    • Instruction ID: be49d06d5765e4297142c136c4fddf90577876a7609b0e56925433831910a898
                    • Opcode Fuzzy Hash: ccd208557159b51a9bbeb492e0a1ad0f1de6dad25fcb651ec578134f7b22e839
                    • Instruction Fuzzy Hash: 30D0C931388312B7E774AB70AC0BFB76A54AF10B61F000835B655AB2D0DDE49840C654