Loading ...

Play interactive tourEdit tour

Analysis Report FACTURA Y ALBARANES (2).exe

Overview

General Information

Sample Name:FACTURA Y ALBARANES (2).exe
Analysis ID:430638
MD5:0a2ce5a915bf643953baf2fcf3b25a5e
SHA1:21a26264df4f615da898b38ef9332ff66d24b505
SHA256:5a5428877719d24368bc14761dee49adf676fd883abd3a8c30b84c0b0c7e13f5
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • FACTURA Y ALBARANES (2).exe (PID: 6124 cmdline: 'C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exe' MD5: 0A2CE5A915BF643953BAF2FCF3B25A5E)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=10cWvVkUqjSi-M-x6hHokSklVF3h_YX3c"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
FACTURA Y ALBARANES (2).exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: FACTURA Y ALBARANES (2).exeMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=10cWvVkUqjSi-M-x6hHokSklVF3h_YX3c"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: FACTURA Y ALBARANES (2).exeVirustotal: Detection: 27%Perma Link
    Source: FACTURA Y ALBARANES (2).exeReversingLabs: Detection: 19%
    Source: FACTURA Y ALBARANES (2).exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=10cWvVkUqjSi-M-x6hHokSklVF3h_YX3c

    System Summary:

    barindex
    Potential malicious icon foundShow sources
    Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeProcess Stats: CPU usage > 98%
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A440 NtAllocateVirtualMemory,1_2_02B6A440
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A496 NtAllocateVirtualMemory,1_2_02B6A496
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A6FC NtAllocateVirtualMemory,1_2_02B6A6FC
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A434 NtAllocateVirtualMemory,1_2_02B6A434
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A653 NtAllocateVirtualMemory,1_2_02B6A653
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A44E NtAllocateVirtualMemory,1_2_02B6A44E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A7C7 NtAllocateVirtualMemory,1_2_02B6A7C7
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A5C9 NtAllocateVirtualMemory,1_2_02B6A5C9
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A52C NtAllocateVirtualMemory,1_2_02B6A52C
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A75E NtAllocateVirtualMemory,1_2_02B6A75E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A4401_2_02B6A440
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67EB91_2_02B67EB9
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66EA01_2_02B66EA0
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B648A11_2_02B648A1
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B680961_2_02B68096
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A4961_2_02B6A496
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6529A1_2_02B6529A
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64A801_2_02B64A80
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6708A1_2_02B6708A
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B69EF11_2_02B69EF1
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B678E51_2_02B678E5
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B676EE1_2_02B676EE
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67AEA1_2_02B67AEA
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B650D51_2_02B650D5
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67CDB1_2_02B67CDB
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B716CD1_2_02B716CD
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A4341_2_02B6A434
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67C321_2_02B67C32
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67A311_2_02B67A31
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67E1C1_2_02B67E1C
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B648061_2_02B64806
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66E021_2_02B66E02
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B652081_2_02B65208
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6E07D1_2_02B6E07D
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6746D1_2_02B6746D
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B676561_2_02B67656
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B650461_2_02B65046
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B678401_2_02B67840
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A44E1_2_02B6A44E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64C4A1_2_02B64C4A
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B631BD1_2_02B631BD
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64BBD1_2_02B64BBD
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B675A81_2_02B675A8
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B677961_2_02B67796
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64F971_2_02B64F97
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67D921_2_02B67D92
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6439E1_2_02B6439E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67B9B1_2_02B67B9B
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6798C1_2_02B6798C
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B681F31_2_02B681F3
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64FF01_2_02B64FF0
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67FFD1_2_02B67FFD
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B649E41_2_02B649E4
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66FE81_2_02B66FE8
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B671DF1_2_02B671DF
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B673CC1_2_02B673CC
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B631C81_2_02B631C8
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B647321_2_02B64732
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6473E1_2_02B6473E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6813E1_2_02B6813E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B671391_2_02B67139
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64F271_2_02B64F27
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64F221_2_02B64F22
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B673231_2_02B67323
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64B1F1_2_02B64B1F
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6531F1_2_02B6531F
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6E51C1_2_02B6E51C
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B675041_2_02B67504
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B675621_2_02B67562
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6516A1_2_02B6516A
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67F6A1_2_02B67F6A
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66D571_2_02B66D57
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66D551_2_02B66D55
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B675551_2_02B67555
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B649401_2_02B64940
    Source: FACTURA Y ALBARANES (2).exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: FACTURA Y ALBARANES (2).exe, 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameabjections.exe vs FACTURA Y ALBARANES (2).exe
    Source: FACTURA Y ALBARANES (2).exe, 00000001.00000002.733780596.00000000020A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs FACTURA Y ALBARANES (2).exe
    Source: FACTURA Y ALBARANES (2).exeBinary or memory string: OriginalFilenameabjections.exe vs FACTURA Y ALBARANES (2).exe
    Source: FACTURA Y ALBARANES (2).exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: classification engineClassification label: mal92.rans.troj.evad.winEXE@1/0@0/0
    Source: FACTURA Y ALBARANES (2).exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: FACTURA Y ALBARANES (2).exeVirustotal: Detection: 27%
    Source: FACTURA Y ALBARANES (2).exeReversingLabs: Detection: 19%

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: FACTURA Y ALBARANES (2).exe, type: SAMPLE
    Source: Yara matchFile source: 1.2.FACTURA Y ALBARANES (2).exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.FACTURA Y ALBARANES (2).exe.400000.0.unpack, type: UNPACKEDPE
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_0040AC0D push ebx; iretd 1_2_0040AC0E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_0040AEB5 push ecx; iretd 1_2_0040AEBA
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_00407B26 push es; ret 1_2_00407B27
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion:

    barindex
    Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67EB9 1_2_02B67EB9
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66EA0 1_2_02B66EA0
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B68096 1_2_02B68096
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6828C 1_2_02B6828C
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6708A 1_2_02B6708A
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B65EF0 1_2_02B65EF0
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B678E5 1_2_02B678E5
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B676EE 1_2_02B676EE
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67AEA 1_2_02B67AEA
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B65CD6 1_2_02B65CD6
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67CDB 1_2_02B67CDB
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B65CD8 1_2_02B65CD8
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B716CD 1_2_02B716CD
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67C32 1_2_02B67C32
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67A31 1_2_02B67A31
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67E1C 1_2_02B67E1C
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6601B 1_2_02B6601B
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66E02 1_2_02B66E02
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6E07D 1_2_02B6E07D
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6746D 1_2_02B6746D
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67656 1_2_02B67656
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B65E5B 1_2_02B65E5B
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67840 1_2_02B67840
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B675A8 1_2_02B675A8
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67796 1_2_02B67796
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67D92 1_2_02B67D92
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6439E 1_2_02B6439E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B65F9A 1_2_02B65F9A
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B68D9A 1_2_02B68D9A
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67B9B 1_2_02B67B9B
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B68D81 1_2_02B68D81
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6798C 1_2_02B6798C
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B681F3 1_2_02B681F3
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67FFD 1_2_02B67FFD
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66FE8 1_2_02B66FE8
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B671DF 1_2_02B671DF
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B65DD9 1_2_02B65DD9
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B673CC 1_2_02B673CC
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B65D3E 1_2_02B65D3E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6813E 1_2_02B6813E
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67139 1_2_02B67139
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64F22 1_2_02B64F22
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67323 1_2_02B67323
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B63B2D 1_2_02B63B2D
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6E51C 1_2_02B6E51C
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67504 1_2_02B67504
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67562 1_2_02B67562
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67F6A 1_2_02B67F6A
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66D57 1_2_02B66D57
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B67555 1_2_02B67555
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B66145 1_2_02B66145
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B63B42 1_2_02B63B42
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B68343 1_2_02B68343
    Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeRDTSC instruction interceptor: First address: 0000000002B6F14D second address: 0000000002B6F14D instructions:
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeRDTSC instruction interceptor: First address: 0000000002B6F0DE second address: 0000000002B6F0DE instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b add esi, 02h 0x0000000e cmp word ptr [esi], 0000h 0x00000012 jne 00007F89544D0805h 0x00000014 mov ebx, edx 0x00000016 shl edx, 05h 0x00000019 add edx, ebx 0x0000001b movzx ebx, byte ptr [esi] 0x0000001e cmp cx, dx 0x00000021 add edx, ebx 0x00000023 xor edx, 370C63DEh 0x00000029 pushad 0x0000002a lfence 0x0000002d rdtsc
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeRDTSC instruction interceptor: First address: 0000000002B6F14D second address: 0000000002B6F14D instructions:
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A440 rdtsc 1_2_02B6A440
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

    Anti Debugging:

    barindex
    Found potential dummy code loops (likely to delay analysis)Show sources
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeProcess Stats: CPU usage > 90% for more than 60s
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6A440 rdtsc 1_2_02B6A440
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6E88D mov eax, dword ptr fs:[00000030h]1_2_02B6E88D
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B65CD6 mov eax, dword ptr fs:[00000030h]1_2_02B65CD6
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B65CD8 mov eax, dword ptr fs:[00000030h]1_2_02B65CD8
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B695A4 mov eax, dword ptr fs:[00000030h]1_2_02B695A4
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B695A2 mov eax, dword ptr fs:[00000030h]1_2_02B695A2
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B64F22 mov eax, dword ptr fs:[00000030h]1_2_02B64F22
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B6EF17 mov eax, dword ptr fs:[00000030h]1_2_02B6EF17
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: FACTURA Y ALBARANES (2).exe, 00000001.00000002.733408157.0000000000C60000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: FACTURA Y ALBARANES (2).exe, 00000001.00000002.733408157.0000000000C60000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: FACTURA Y ALBARANES (2).exe, 00000001.00000002.733408157.0000000000C60000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: FACTURA Y ALBARANES (2).exe, 00000001.00000002.733408157.0000000000C60000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exeCode function: 1_2_02B68869 cpuid 1_2_02B68869

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery41Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery311Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    FACTURA Y ALBARANES (2).exe28%VirustotalBrowse
    FACTURA Y ALBARANES (2).exe19%ReversingLabsWin32.Trojan.Mucc

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted IPs

    No contacted IP infos

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:430638
    Start date:07.06.2021
    Start time:17:55:34
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 7m 38s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:FACTURA Y ALBARANES (2).exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:29
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal92.rans.troj.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 3.9% (good quality ratio 0.4%)
    • Quality average: 4%
    • Quality standard deviation: 6.3%
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
    • Not all processes where analyzed, report is missing behavior information

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    No created / dropped files found

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):4.640178061841888
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.15%
    • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:FACTURA Y ALBARANES (2).exe
    File size:143360
    MD5:0a2ce5a915bf643953baf2fcf3b25a5e
    SHA1:21a26264df4f615da898b38ef9332ff66d24b505
    SHA256:5a5428877719d24368bc14761dee49adf676fd883abd3a8c30b84c0b0c7e13f5
    SHA512:9f79397ffdef767bd1d7ae12395be4b9172b556e6626b0811a22670acc645d7367f5dadeb5b1b4007e4c0f1829494cea55e2d3a28cddc16aa43f43bbab820574
    SSDEEP:3072:CBWkR/6N08mSDea0rRzkaNTBW1NieJHz:CBWkR/E3Tia0RzkaNTBW1NieJ
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......`.....................0....................@................

    File Icon

    Icon Hash:20047c7c70f0e004

    Static PE Info

    General

    Entrypoint:0x4014b8
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    DLL Characteristics:
    Time Stamp:0x60BE0213 [Mon Jun 7 11:25:07 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:b1d5215cf0ff1abab4dacdc311d642d4

    Entrypoint Preview

    Instruction
    push 0040174Ch
    call 00007F8954A9F945h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    xor byte ptr [eax], al
    add byte ptr [eax], al
    inc eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [edx+ecx], dl
    mov eax, A877D7F6h
    inc edx
    mov ebp, 67C8D32Ch
    jo 00007F8954A9F9B4h
    rol dword ptr [eax], 1
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [ecx], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [ebp+6Fh], ch
    outsd
    outsb
    bound esp, dword ptr [ebp+61h]
    insd
    jnc 00007F8954A9F952h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    dec esp
    xor dword ptr [eax], eax
    or bh, dl
    shl byte ptr [esp+ecx*4-10h], 1
    push edi
    mov ecx, BB1A9748h
    mov ecx, AD154E6Ch
    mul bh
    jnc 00007F8954A9F8E8h
    fimul dword ptr [eax-1365B9C2h]
    mov ch, A5h
    aad 8Ch
    adc dword ptr [ebx+33AD4F3Ah], ebp
    cdq
    iretw
    adc dword ptr [edi+00AA000Ch], esi
    pushad
    rcl dword ptr [ebx+00000000h], cl
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    mov eax, dword ptr [ecx]
    add byte ptr [eax], al
    dec esi
    add byte ptr [eax], al
    add byte ptr [eax], al
    adc byte ptr [eax], al
    jnc 00007F8954A9F9BBh
    insb
    outsb
    imul ebp, dword ptr [esi+67h], 656E7265h
    jnc 00007F8954A9F952h
    or eax, 00000801h

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x201940x28.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000xa04.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
    IMAGE_DIRECTORY_ENTRY_IAT0x10000x154.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1f70c0x20000False0.333885192871data4.89089028239IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .data0x210000x12340x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x230000xa040x1000False0.181396484375data2.20390073464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    RT_ICON0x238d40x130data
    RT_ICON0x235ec0x2e8data
    RT_ICON0x234c40x128GLS_BINARY_LSB_FIRST
    RT_GROUP_ICON0x234940x30data
    RT_VERSION0x231500x344dataSesotho (Sutu)South Africa

    Imports

    DLLImport
    MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaHresultCheck, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaR4Str, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaFileOpen, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

    Version Infos

    DescriptionData
    Translation0x0430 0x04b0
    LegalCopyrightYonyou Network
    InternalNameabjections
    FileVersion1.00
    CompanyNameYonyou Network
    LegalTrademarksYonyou Network
    CommentsYonyou Network
    ProductNameYonyou Network
    ProductVersion1.00
    FileDescriptionYonyou Network
    OriginalFilenameabjections.exe

    Possible Origin

    Language of compilation systemCountry where language is spokenMap
    Sesotho (Sutu)South Africa

    Network Behavior

    No network behavior found

    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    System Behavior

    General

    Start time:17:56:23
    Start date:07/06/2021
    Path:C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\FACTURA Y ALBARANES (2).exe'
    Imagebase:0x400000
    File size:143360 bytes
    MD5 hash:0A2CE5A915BF643953BAF2FCF3B25A5E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Reputation:low

    Disassembly

    Code Analysis

    Reset < >

      Execution Graph

      Execution Coverage:1.4%
      Dynamic/Decrypted Code Coverage:21.4%
      Signature Coverage:7%
      Total number of Nodes:271
      Total number of Limit Nodes:67

      Graph

      execution_graph 14711 2b6a7c7 14712 2b6a7d3 NtAllocateVirtualMemory 14711->14712 14716 2b6a858 14712->14716 14715 2b6bf89 14716->14715 14717 2b6ab97 14716->14717 14718 2b6ca0b 14717->14718 14725 2b693ca 14718->14725 14720 2b6cb48 14720->14716 14738 2b692eb 14720->14738 14722 2b6cb69 14722->14716 14723 2b6cada 14723->14720 14729 2b691e8 14723->14729 14726 2b69424 14725->14726 14747 2b6a434 14726->14747 14728 2b6947b 14728->14723 14730 2b6a434 2 API calls 14729->14730 14731 2b6920f 14730->14731 14732 2b693ca 2 API calls 14731->14732 14736 2b6cada 14732->14736 14733 2b692eb 2 API calls 14734 2b6cb69 14733->14734 14734->14720 14735 2b6cb48 14735->14720 14735->14733 14736->14735 14737 2b691e8 2 API calls 14736->14737 14737->14735 14739 2b6a434 2 API calls 14738->14739 14740 2b69327 14739->14740 14741 2b693ca 2 API calls 14740->14741 14745 2b6cada 14741->14745 14742 2b692eb 2 API calls 14743 2b6cb69 14742->14743 14743->14722 14744 2b6cb48 14744->14722 14744->14742 14745->14744 14746 2b691e8 2 API calls 14745->14746 14746->14744 14748 2b6a438 14747->14748 14755 2b6a858 14748->14755 14763 2b6e8bb 14748->14763 14750 2b6a5bf 14751 2b6a758 NtAllocateVirtualMemory 14750->14751 14753 2b6e8bb 14750->14753 14751->14755 14753->14728 14758 2b6960f 14753->14758 14771 2b6ef17 GetPEB 14753->14771 14757 2b6ab97 GetPEB 14755->14757 14762 2b6bf89 14755->14762 14756 2b6e9b3 14756->14758 14759 2b6ef17 GetPEB 14756->14759 14757->14755 14758->14728 14760 2b6e9c4 14759->14760 14760->14758 14761 2b6ef17 GetPEB 14760->14761 14761->14758 14763->14750 14764 2b6e909 14763->14764 14765 2b6ef17 GetPEB 14764->14765 14769 2b6960f 14764->14769 14766 2b6e9b3 14765->14766 14767 2b6ef17 GetPEB 14766->14767 14766->14769 14768 2b6e9c4 14767->14768 14768->14769 14770 2b6ef17 GetPEB 14768->14770 14769->14750 14770->14769 14772 2b61170 14771->14772 14772->14756 14773 41bfb0 14774 41bff3 __vbaVarDup #563 __vbaFreeVar 14773->14774 14775 41c128 #606 __vbaStrMove __vbaStrCmp __vbaFreeStr __vbaFreeVar 14774->14775 14776 41c11d #531 14774->14776 14777 41c1f9 14775->14777 14778 41c18c 14775->14778 14776->14775 14781 41c208 __vbaNew2 14777->14781 14782 41c21d __vbaObjSet 14777->14782 14779 41c1a5 __vbaObjSetAddref 14778->14779 14780 41c195 __vbaNew2 14778->14780 14783 41c1c0 14779->14783 14780->14779 14781->14782 14787 41c246 14782->14787 14784 41c1e5 __vbaFreeObj 14783->14784 14785 41c1c6 __vbaHresultCheckObj __vbaFreeObj 14783->14785 14784->14777 14785->14777 14788 41c25a __vbaFreeObj 14787->14788 14789 41c24c __vbaHresultCheckObj 14787->14789 14791 41c2d2 __vbaNew2 14788->14791 14792 41c2e7 __vbaObjSet 14788->14792 14789->14788 14791->14792 14794 41c310 14792->14794 14795 41c324 14794->14795 14796 41c316 __vbaHresultCheckObj 14794->14796 14797 41c342 __vbaObjSet 14795->14797 14798 41c32d __vbaNew2 14795->14798 14796->14795 14800 41c36b 14797->14800 14798->14797 14801 41c371 __vbaHresultCheckObj 14800->14801 14802 41c37f __vbaStrCopy 14800->14802 14801->14802 14803 41c3c9 14802->14803 14804 41c3db __vbaFreeStr __vbaFreeObjList 14803->14804 14805 41c3cd __vbaHresultCheckObj 14803->14805 14806 41c409 __vbaNew2 14804->14806 14807 41c41e __vbaObjSet 14804->14807 14805->14804 14806->14807 14809 41c447 14807->14809 14810 41c45b __vbaLateIdCallLd 14809->14810 14811 41c44d __vbaHresultCheckObj 14809->14811 14812 41c494 __vbaObjSet 14810->14812 14813 41c47f __vbaNew2 14810->14813 14811->14810 14815 41c4bd 14812->14815 14813->14812 14816 41c4d1 14815->14816 14817 41c4c3 __vbaHresultCheckObj 14815->14817 14818 41c4da __vbaNew2 14816->14818 14819 41c4ef __vbaObjSet 14816->14819 14817->14816 14818->14819 14821 41c515 14819->14821 14822 41c526 __vbaStrCopy __vbaStrVarMove __vbaStrMove 14821->14822 14823 41c51b __vbaHresultCheckObj 14821->14823 14824 41c58d __vbaFreeStrList __vbaFreeObjList __vbaFreeVar 14822->14824 14823->14822 14825 41c5e6 __vbaNew2 14824->14825 14826 41c5fb __vbaObjSet 14824->14826 14825->14826 14828 41c624 14826->14828 14829 41c638 14828->14829 14830 41c62a __vbaHresultCheckObj 14828->14830 14831 41c677 __vbaFreeObj 14829->14831 14832 41c669 __vbaHresultCheckObj 14829->14832 14830->14829 14833 41c6a1 __vbaObjSet 14831->14833 14834 41c68c __vbaNew2 14831->14834 14832->14831 14836 41c6c7 14833->14836 14834->14833 14837 41c6d8 14836->14837 14838 41c6cd __vbaHresultCheckObj 14836->14838 14839 41c6e1 __vbaNew2 14837->14839 14840 41c6f6 __vbaObjSet 14837->14840 14838->14837 14839->14840 14842 41c71f 14840->14842 14843 41c733 __vbaStrMove 14842->14843 14844 41c725 __vbaHresultCheckObj 14842->14844 14845 41c788 __vbaFreeStr __vbaFreeObjList 14843->14845 14844->14843 14846 41c7bd 14845->14846 14847 41c7c6 __vbaNew2 14846->14847 14848 41c7db __vbaObjSet 14846->14848 14847->14848 14850 41c804 14848->14850 14851 41c818 __vbaStrMove __vbaStrCopy 14850->14851 14852 41c80a __vbaHresultCheckObj 14850->14852 14853 41c883 14851->14853 14852->14851 14854 41c895 __vbaFreeStrList __vbaFreeObj 14853->14854 14855 41c887 __vbaHresultCheckObj 14853->14855 14856 41c8c3 __vbaNew2 14854->14856 14857 41c8d8 __vbaObjSet 14854->14857 14855->14854 14856->14857 14859 41c901 14857->14859 14860 41c915 14859->14860 14861 41c907 __vbaHresultCheckObj 14859->14861 14862 41c933 __vbaObjSet 14860->14862 14863 41c91e __vbaNew2 14860->14863 14861->14860 14865 41c959 14862->14865 14863->14862 14866 41c96a 14865->14866 14867 41c95f __vbaHresultCheckObj 14865->14867 14868 41c973 __vbaNew2 14866->14868 14869 41c988 __vbaObjSet 14866->14869 14867->14866 14868->14869 14871 41c9b1 14869->14871 14872 41c9c5 __vbaStrCopy 14871->14872 14873 41c9b7 __vbaHresultCheckObj 14871->14873 14874 41ca13 14872->14874 14873->14872 14875 41ca25 __vbaFreeStr __vbaFreeObjList 14874->14875 14876 41ca17 __vbaHresultCheckObj 14874->14876 14877 41ca5a __vbaNew2 14875->14877 14878 41ca6f __vbaObjSet 14875->14878 14876->14875 14877->14878 14880 41ca98 14878->14880 14881 41caac __vbaFreeObj 14880->14881 14882 41ca9e __vbaHresultCheckObj 14880->14882 14884 41caf3 __vbaNew2 14881->14884 14885 41cb08 __vbaObjSet 14881->14885 14882->14881 14884->14885 14887 41cb31 14885->14887 14888 41cb45 14887->14888 14889 41cb37 __vbaHresultCheckObj 14887->14889 14890 41cb63 __vbaObjSet 14888->14890 14891 41cb4e __vbaNew2 14888->14891 14889->14888 14893 41cb8c 14890->14893 14891->14890 14894 41cba0 14893->14894 14895 41cb92 __vbaHresultCheckObj 14893->14895 14896 41cbe4 __vbaFreeObjList 14894->14896 14897 41cbd6 __vbaHresultCheckObj 14894->14897 14895->14894 14898 41cc06 __vbaNew2 14896->14898 14899 41cc1b __vbaObjSet 14896->14899 14897->14896 14898->14899 14901 41cc44 14899->14901 14902 41cc58 14901->14902 14903 41cc4a __vbaHresultCheckObj 14901->14903 14904 41cc95 __vbaFreeObj 14902->14904 14905 41cc87 __vbaHresultCheckObj 14902->14905 14903->14902 14906 41ccaa __vbaNew2 14904->14906 14907 41ccbf __vbaObjSet 14904->14907 14905->14904 14906->14907 14909 41cce8 14907->14909 14910 41ccfc 14909->14910 14911 41ccee __vbaHresultCheckObj 14909->14911 14912 41cd05 __vbaNew2 14910->14912 14913 41cd1a __vbaObjSet 14910->14913 14911->14910 14912->14913 14915 41cd40 14913->14915 14916 41cd51 __vbaStrMove 14915->14916 14917 41cd46 __vbaHresultCheckObj 14915->14917 14918 41cdab __vbaFreeStrList __vbaFreeObjList 14916->14918 14917->14916 14919 41cde3 __vbaNew2 14918->14919 14920 41cdf8 __vbaObjSet 14918->14920 14919->14920 14922 41ce1e 14920->14922 14923 41ce24 __vbaHresultCheckObj 14922->14923 14924 41ce2f 14922->14924 14923->14924 14925 41ce38 __vbaNew2 14924->14925 14926 41ce4d __vbaObjSet 14924->14926 14925->14926 14928 41ce76 14926->14928 14929 41ce8a __vbaStrMove 14928->14929 14930 41ce7c __vbaHresultCheckObj 14928->14930 14931 41cec9 14929->14931 14930->14929 14932 41cedb __vbaFreeStr __vbaFreeObjList 14931->14932 14933 41cecd __vbaHresultCheckObj 14931->14933 14934 41cf09 __vbaNew2 14932->14934 14935 41cf1e __vbaObjSet 14932->14935 14933->14932 14934->14935 14937 41cf47 14935->14937 14938 41cf5b __vbaFreeObj __vbaStrCopy 14937->14938 14939 41cf4d __vbaHresultCheckObj 14937->14939 14941 41cfd0 __vbaFreeStr 14938->14941 14939->14938 14942 41cfe5 __vbaNew2 14941->14942 14943 41cffa __vbaObjSet 14941->14943 14942->14943 14945 41d023 14943->14945 14946 41d037 14945->14946 14947 41d029 __vbaHresultCheckObj 14945->14947 14948 41d040 __vbaNew2 14946->14948 14949 41d055 __vbaObjSet 14946->14949 14947->14946 14948->14949 14951 41d07e 14949->14951 14952 41d092 __vbaStrMove 14951->14952 14953 41d084 __vbaHresultCheckObj 14951->14953 14954 41d0fb 14952->14954 14953->14952 14955 41d10d __vbaFreeStrList __vbaFreeObjList 14954->14955 14956 41d0ff __vbaHresultCheckObj 14954->14956 14957 41d145 __vbaNew2 14955->14957 14958 41d15a __vbaObjSet 14955->14958 14956->14955 14957->14958 14960 41d183 14958->14960 14961 41d197 14960->14961 14962 41d189 __vbaHresultCheckObj 14960->14962 14963 41d1a0 __vbaNew2 14961->14963 14964 41d1b5 __vbaObjSet 14961->14964 14962->14961 14963->14964 14966 41d1de 14964->14966 14967 41d1f2 __vbaStrCopy __vbaLateIdCallLd __vbaI4Var 14966->14967 14968 41d1e4 __vbaHresultCheckObj 14966->14968 14969 41d253 14967->14969 14968->14967 14970 41d265 __vbaFreeStr __vbaFreeObjList __vbaFreeVar 14969->14970 14971 41d257 __vbaHresultCheckObj 14969->14971 14972 41d2a6 __vbaNew2 14970->14972 14973 41d2bb __vbaObjSet 14970->14973 14971->14970 14972->14973 14975 41d2e4 14973->14975 14976 41d2f8 14975->14976 14977 41d2ea __vbaHresultCheckObj 14975->14977 14978 41d301 __vbaNew2 14976->14978 14979 41d316 __vbaObjSet 14976->14979 14977->14976 14978->14979 14981 41d33f 14979->14981 14982 41d353 14981->14982 14983 41d345 __vbaHresultCheckObj 14981->14983 14984 41d371 __vbaObjSet 14982->14984 14985 41d35c __vbaNew2 14982->14985 14983->14982 14987 41d39a 14984->14987 14985->14984 14988 41d3a0 __vbaHresultCheckObj 14987->14988 14989 41d3ae __vbaStrCopy 14987->14989 14988->14989 14990 41d40b __vbaFreeStr __vbaFreeObjList 14989->14990 14991 41d440 __vbaNew2 14990->14991 14992 41d455 __vbaObjSet 14990->14992 14991->14992 14994 41d47e 14992->14994 14995 41d492 14994->14995 14996 41d484 __vbaHresultCheckObj 14994->14996 14997 41d4b0 __vbaObjSet 14995->14997 14998 41d49b __vbaNew2 14995->14998 14996->14995 15000 41d4d9 14997->15000 14998->14997 15001 41d4ed 15000->15001 15002 41d4df __vbaHresultCheckObj 15000->15002 15003 41d558 __vbaFreeObjList 15001->15003 15004 41d54a __vbaHresultCheckObj 15001->15004 15002->15001 15005 41d57a __vbaNew2 15003->15005 15006 41d58f __vbaObjSet 15003->15006 15004->15003 15005->15006 15008 41d5b8 15006->15008 15009 41d5cc 15008->15009 15010 41d5be __vbaHresultCheckObj 15008->15010 15011 41d5d5 __vbaNew2 15009->15011 15012 41d5ea __vbaObjSet 15009->15012 15010->15009 15011->15012 15014 41d613 15012->15014 15015 41d627 __vbaFreeObjList 15014->15015 15016 41d619 __vbaHresultCheckObj 15014->15016 15018 41d673 15015->15018 15016->15015 15019 41d687 15018->15019 15020 41d679 __vbaHresultCheckObj 15018->15020 15021 41d699 __vbaVarAdd __vbaVarMove __vbaVarTstLt 15019->15021 15020->15019 15021->15021 15022 41d6ee 15021->15022 15023 4014d4 15024 4014b7 15023->15024 15027 401545 15023->15027 15025 401521 15024->15025 15026 4014b8 #100 15024->15026 15026->15024 15026->15027

      Executed Functions

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 288 2b6a44e-2b6a455 289 2b6a456-2b6a458 288->289 290 2b6a45a-2b6a464 289->290 291 2b6a438-2b6a446 289->291 292 2b6a466-2b6a476 290->292 293 2b6a47b-2b6a482 290->293 294 2b6a44c 291->294 295 2b6a858-2b6a949 call 2b6e803 291->295 292->289 297 2b6a478-2b6a479 292->297 299 2b6a484-2b6a486 293->299 300 2b6a499-2b6a52a 293->300 296 2b6a48a-2b6a52a 294->296 313 2b6aa6a-2b6aa79 call 2b6a94e 295->313 304 2b6a57c-2b6a752 call 2b6e8bb 296->304 297->293 299->296 300->304 323 2b6e8bb-2b6e99e 304->323 324 2b6a758-2b6a852 NtAllocateVirtualMemory 304->324 321 2b6aaf2-2b6ab2f 313->321 322 2b6aa7b-2b6aa8f 313->322 336 2b6ab30-2b6ab42 321->336 325 2b6aa41-2b6aa49 322->325 326 2b6aa91-2b6aae2 322->326 339 2b6e9a4-2b6e9b8 call 2b6ef17 323->339 340 2b6ea4b-2b6ea58 call 2b6eab2 323->340 324->295 330 2b6aa50-2b6aa55 325->330 331 2b6aa4b-2b6aa4f 325->331 326->336 337 2b6aa57-2b6aa5b 330->337 338 2b6aa5c-2b6aa61 330->338 331->330 346 2b6bf46-2b6bf5b call 2b6ab97 336->346 337->338 344 2b6aa63-2b6aa67 338->344 345 2b6aa68 338->345 352 2b6ea2c-2b6ea37 339->352 353 2b6e9ba-2b6e9c7 call 2b6ef17 339->353 344->345 345->313 355 2b6bf47-2b6bf4e 346->355 356 2b6bf5d-2b6bf84 346->356 357 2b6960f-2b69613 352->357 358 2b6ea3d-2b6ea48 call 2b6eab2 352->358 353->352 368 2b6e9c9-2b6ea27 call 2b6ef17 353->368 361 2b6bf50-2b6bf5b 355->361 370 2b6bf06-2b6bf08 356->370 371 2b6bf86-2b6bf88 356->371 363 2b69614-2b6968c 357->363 358->340 361->355 361->356 372 2b6968e-2b69690 363->372 368->352 376 2b6bf26-2b6bf2a 370->376 377 2b6bf0a-2b6bf0b 370->377 374 2b6bf76-2b6bf84 371->374 375 2b6bf8a-2b6bf93 371->375 374->370 374->371 378 2b6bf2c-2b6bf33 376->378 379 2b6bf89-2b6bf93 376->379 377->361 380 2b6bf0d-2b6bf23 377->380 381 2b6bf35-2b6bf45 378->381 382 2b6bf6f 378->382 380->376 381->346 384 2b6bf03 382->384 385 2b6bf71-2b6bf75 382->385 384->370 385->374
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4db29861e42517c092aea39b55eb8d0e9cf1eb73c732df90308cc3a6252da2a7
      • Instruction ID: 1326e6d8cd995856d6c5276c1531e416fbce0834af2702e3f68cee6afdb6c35a
      • Opcode Fuzzy Hash: 4db29861e42517c092aea39b55eb8d0e9cf1eb73c732df90308cc3a6252da2a7
      • Instruction Fuzzy Hash: 43917B7A6042499FDF204E748C9D3FA3BB2DF16B10F5506A9DC87AB201D3399946CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 386 2b6a434-2b6a446 388 2b6a44c-2b6a752 call 2b6e8bb 386->388 389 2b6a858-2b6a949 call 2b6e803 386->389 408 2b6e8bb-2b6e99e 388->408 409 2b6a758-2b6a852 NtAllocateVirtualMemory 388->409 400 2b6aa6a-2b6aa79 call 2b6a94e 389->400 406 2b6aaf2-2b6ab2f 400->406 407 2b6aa7b-2b6aa8f 400->407 421 2b6ab30-2b6ab42 406->421 410 2b6aa41-2b6aa49 407->410 411 2b6aa91-2b6aae2 407->411 424 2b6e9a4-2b6e9b8 call 2b6ef17 408->424 425 2b6ea4b-2b6ea58 call 2b6eab2 408->425 409->389 415 2b6aa50-2b6aa55 410->415 416 2b6aa4b-2b6aa4f 410->416 411->421 422 2b6aa57-2b6aa5b 415->422 423 2b6aa5c-2b6aa61 415->423 416->415 431 2b6bf46-2b6bf5b call 2b6ab97 421->431 422->423 429 2b6aa63-2b6aa67 423->429 430 2b6aa68 423->430 437 2b6ea2c-2b6ea37 424->437 438 2b6e9ba-2b6e9c7 call 2b6ef17 424->438 429->430 430->400 440 2b6bf47-2b6bf4e 431->440 441 2b6bf5d-2b6bf84 431->441 442 2b6960f-2b69613 437->442 443 2b6ea3d-2b6ea48 call 2b6eab2 437->443 438->437 453 2b6e9c9-2b6ea27 call 2b6ef17 438->453 446 2b6bf50-2b6bf5b 440->446 455 2b6bf06-2b6bf08 441->455 456 2b6bf86-2b6bf88 441->456 448 2b69614-2b6968c 442->448 443->425 446->440 446->441 457 2b6968e-2b69690 448->457 453->437 461 2b6bf26-2b6bf2a 455->461 462 2b6bf0a-2b6bf0b 455->462 459 2b6bf76-2b6bf84 456->459 460 2b6bf8a-2b6bf93 456->460 459->455 459->456 463 2b6bf2c-2b6bf33 461->463 464 2b6bf89-2b6bf93 461->464 462->446 465 2b6bf0d-2b6bf23 462->465 466 2b6bf35-2b6bf45 463->466 467 2b6bf6f 463->467 465->461 466->431 469 2b6bf03 467->469 470 2b6bf71-2b6bf75 467->470 469->455 470->459
      APIs
      • NtAllocateVirtualMemory.NTDLL(0942C62A,0000014C,0000014C), ref: 02B6A836
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: AllocateMemoryVirtual
      • String ID:
      • API String ID: 2167126740-0
      • Opcode ID: 830e42a9698897f45abbde8ba59cf29d050a97917dab52bf94e2464cc8f64a2d
      • Instruction ID: e624220e26a1c7d56d166a3f3d331c6b5e9d1dc81dbaebeb365c63a16eb72c8f
      • Opcode Fuzzy Hash: 830e42a9698897f45abbde8ba59cf29d050a97917dab52bf94e2464cc8f64a2d
      • Instruction Fuzzy Hash: E291CE7A2043499FDF208E74CC9D7FA3BA2DF16744F5102ADDC86AB212D33A9845CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 471 2b6a440-2b6a752 call 2b6e8bb 480 2b6e8bb-2b6e99e 471->480 481 2b6a758-2b6a949 NtAllocateVirtualMemory call 2b6e803 471->481 486 2b6e9a4-2b6e9b8 call 2b6ef17 480->486 487 2b6ea4b-2b6ea58 call 2b6eab2 480->487 507 2b6aa6a-2b6aa79 call 2b6a94e 481->507 495 2b6ea2c-2b6ea37 486->495 496 2b6e9ba-2b6e9c7 call 2b6ef17 486->496 499 2b6960f-2b69613 495->499 500 2b6ea3d-2b6ea48 call 2b6eab2 495->500 496->495 510 2b6e9c9-2b6ea27 call 2b6ef17 496->510 505 2b69614-2b6968c 499->505 500->487 513 2b6968e-2b69690 505->513 516 2b6aaf2-2b6ab2f 507->516 517 2b6aa7b-2b6aa8f 507->517 510->495 525 2b6ab30-2b6ab42 516->525 518 2b6aa41-2b6aa49 517->518 519 2b6aa91-2b6aae2 517->519 521 2b6aa50-2b6aa55 518->521 522 2b6aa4b-2b6aa4f 518->522 519->525 526 2b6aa57-2b6aa5b 521->526 527 2b6aa5c-2b6aa61 521->527 522->521 532 2b6bf46-2b6bf5b call 2b6ab97 525->532 526->527 530 2b6aa63-2b6aa67 527->530 531 2b6aa68 527->531 530->531 531->507 536 2b6bf47-2b6bf4e 532->536 537 2b6bf5d-2b6bf84 532->537 538 2b6bf50-2b6bf5b 536->538 540 2b6bf06-2b6bf08 537->540 541 2b6bf86-2b6bf88 537->541 538->536 538->537 544 2b6bf26-2b6bf2a 540->544 545 2b6bf0a-2b6bf0b 540->545 542 2b6bf76-2b6bf84 541->542 543 2b6bf8a-2b6bf93 541->543 542->540 542->541 546 2b6bf2c-2b6bf33 544->546 547 2b6bf89-2b6bf93 544->547 545->538 548 2b6bf0d-2b6bf23 545->548 549 2b6bf35-2b6bf45 546->549 550 2b6bf6f 546->550 548->544 549->532 552 2b6bf03 550->552 553 2b6bf71-2b6bf75 550->553 552->540 553->542
      APIs
      • NtAllocateVirtualMemory.NTDLL(0942C62A,0000014C,0000014C), ref: 02B6A836
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: AllocateMemoryVirtual
      • String ID:
      • API String ID: 2167126740-0
      • Opcode ID: c25618921f430b92a7017390e2fbd63de483bf8ca370b72517b25478a5c1cb20
      • Instruction ID: a34117823ddc85c15c9ecd254c17cedaa22288b2cf1db114a6329dade3b8c335
      • Opcode Fuzzy Hash: c25618921f430b92a7017390e2fbd63de483bf8ca370b72517b25478a5c1cb20
      • Instruction Fuzzy Hash: 8081687A6043498FDF214E748CAD7FA3BA2EF16700F5506ADDC86AF241D33A9945CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 554 2b6a52c-2b6a535 555 2b6a537-2b6a53b 554->555 556 2b6a53c-2b6a541 554->556 555->556 557 2b6a543-2b6a547 556->557 558 2b6a548-2b6a54d 556->558 557->558 559 2b6a554-2b6a559 558->559 560 2b6a54f-2b6a553 558->560 561 2b6a560-2b6a565 559->561 562 2b6a55b-2b6a55f 559->562 560->559 563 2b6a567-2b6a56b 561->563 564 2b6a56c-2b6a571 561->564 562->561 563->564 565 2b6a573-2b6a577 564->565 566 2b6a578-2b6a752 call 2b6e8bb 564->566 565->566 573 2b6e8bb-2b6e99e 566->573 574 2b6a758-2b6a949 NtAllocateVirtualMemory call 2b6e803 566->574 579 2b6e9a4-2b6e9b8 call 2b6ef17 573->579 580 2b6ea4b-2b6ea58 call 2b6eab2 573->580 600 2b6aa6a-2b6aa79 call 2b6a94e 574->600 588 2b6ea2c-2b6ea37 579->588 589 2b6e9ba-2b6e9c7 call 2b6ef17 579->589 592 2b6960f-2b69613 588->592 593 2b6ea3d-2b6ea48 call 2b6eab2 588->593 589->588 603 2b6e9c9-2b6ea27 call 2b6ef17 589->603 598 2b69614-2b6968c 592->598 593->580 606 2b6968e-2b69690 598->606 609 2b6aaf2-2b6ab2f 600->609 610 2b6aa7b-2b6aa8f 600->610 603->588 618 2b6ab30-2b6ab42 609->618 611 2b6aa41-2b6aa49 610->611 612 2b6aa91-2b6aae2 610->612 614 2b6aa50-2b6aa55 611->614 615 2b6aa4b-2b6aa4f 611->615 612->618 619 2b6aa57-2b6aa5b 614->619 620 2b6aa5c-2b6aa61 614->620 615->614 625 2b6bf46-2b6bf5b call 2b6ab97 618->625 619->620 623 2b6aa63-2b6aa67 620->623 624 2b6aa68 620->624 623->624 624->600 629 2b6bf47-2b6bf4e 625->629 630 2b6bf5d-2b6bf84 625->630 631 2b6bf50-2b6bf5b 629->631 633 2b6bf06-2b6bf08 630->633 634 2b6bf86-2b6bf88 630->634 631->629 631->630 637 2b6bf26-2b6bf2a 633->637 638 2b6bf0a-2b6bf0b 633->638 635 2b6bf76-2b6bf84 634->635 636 2b6bf8a-2b6bf93 634->636 635->633 635->634 639 2b6bf2c-2b6bf33 637->639 640 2b6bf89-2b6bf93 637->640 638->631 641 2b6bf0d-2b6bf23 638->641 642 2b6bf35-2b6bf45 639->642 643 2b6bf6f 639->643 641->637 642->625 645 2b6bf03 643->645 646 2b6bf71-2b6bf75 643->646 645->633 646->635
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7d562a70d7e8b375c0c90b848df56d299bbe3b20e9326becd2bad35100824b81
      • Instruction ID: bb92b5c2bc6a822f90fb49d54ca048d67dd4522bf4c6878313fbb5c6e39469fc
      • Opcode Fuzzy Hash: 7d562a70d7e8b375c0c90b848df56d299bbe3b20e9326becd2bad35100824b81
      • Instruction Fuzzy Hash: BA71597A6042498FDF218E748C6C7FA3B72EF16B00F6106A9DC876F201D7399946CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 647 2b6a496-2b6a752 call 2b6e8bb 660 2b6e8bb-2b6e99e 647->660 661 2b6a758-2b6a949 NtAllocateVirtualMemory call 2b6e803 647->661 666 2b6e9a4-2b6e9b8 call 2b6ef17 660->666 667 2b6ea4b-2b6ea58 call 2b6eab2 660->667 687 2b6aa6a-2b6aa79 call 2b6a94e 661->687 675 2b6ea2c-2b6ea37 666->675 676 2b6e9ba-2b6e9c7 call 2b6ef17 666->676 679 2b6960f-2b69613 675->679 680 2b6ea3d-2b6ea48 call 2b6eab2 675->680 676->675 690 2b6e9c9-2b6ea27 call 2b6ef17 676->690 685 2b69614-2b6968c 679->685 680->667 693 2b6968e-2b69690 685->693 696 2b6aaf2-2b6ab2f 687->696 697 2b6aa7b-2b6aa8f 687->697 690->675 705 2b6ab30-2b6ab42 696->705 698 2b6aa41-2b6aa49 697->698 699 2b6aa91-2b6aae2 697->699 701 2b6aa50-2b6aa55 698->701 702 2b6aa4b-2b6aa4f 698->702 699->705 706 2b6aa57-2b6aa5b 701->706 707 2b6aa5c-2b6aa61 701->707 702->701 712 2b6bf46-2b6bf5b call 2b6ab97 705->712 706->707 710 2b6aa63-2b6aa67 707->710 711 2b6aa68 707->711 710->711 711->687 716 2b6bf47-2b6bf4e 712->716 717 2b6bf5d-2b6bf84 712->717 718 2b6bf50-2b6bf5b 716->718 720 2b6bf06-2b6bf08 717->720 721 2b6bf86-2b6bf88 717->721 718->716 718->717 724 2b6bf26-2b6bf2a 720->724 725 2b6bf0a-2b6bf0b 720->725 722 2b6bf76-2b6bf84 721->722 723 2b6bf8a-2b6bf93 721->723 722->720 722->721 726 2b6bf2c-2b6bf33 724->726 727 2b6bf89-2b6bf93 724->727 725->718 728 2b6bf0d-2b6bf23 725->728 729 2b6bf35-2b6bf45 726->729 730 2b6bf6f 726->730 728->724 729->712 732 2b6bf03 730->732 733 2b6bf71-2b6bf75 730->733 732->720 733->722
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a21bc889c7cf84f79224d2742447b48dcfe836cbca05654b19d5543d2d9bf418
      • Instruction ID: 4ee41271538632ba9bf2496f22f425d58e1659ddf15ebcde2b4c1415a3b8ce30
      • Opcode Fuzzy Hash: a21bc889c7cf84f79224d2742447b48dcfe836cbca05654b19d5543d2d9bf418
      • Instruction Fuzzy Hash: 01718A7A604249CFDF204E74CC9D3FA3BA2EF56750F5606A9DC86AF201D73A8945CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 734 2b6a5c9-2b6a5cd 735 2b6a5d4-2b6a5d9 734->735 736 2b6a5cf-2b6a5d3 734->736 737 2b6a5e0-2b6a5e5 735->737 738 2b6a5db-2b6a5df 735->738 736->735 739 2b6a5e7-2b6a5eb 737->739 740 2b6a5ec-2b6a5f1 737->740 738->737 739->740 741 2b6a5f3-2b6a5f7 740->741 742 2b6a5f8-2b6a5fd 740->742 741->742 743 2b6a604-2b6a609 742->743 744 2b6a5ff-2b6a603 742->744 745 2b6a610-2b6a752 743->745 746 2b6a60b-2b6a60f 743->746 744->743 750 2b6e8bb-2b6e99e 745->750 751 2b6a758-2b6a949 NtAllocateVirtualMemory call 2b6e803 745->751 746->745 756 2b6e9a4-2b6e9b8 call 2b6ef17 750->756 757 2b6ea4b-2b6ea58 call 2b6eab2 750->757 777 2b6aa6a-2b6aa79 call 2b6a94e 751->777 765 2b6ea2c-2b6ea37 756->765 766 2b6e9ba-2b6e9c7 call 2b6ef17 756->766 769 2b6960f-2b69613 765->769 770 2b6ea3d-2b6ea48 call 2b6eab2 765->770 766->765 780 2b6e9c9-2b6ea27 call 2b6ef17 766->780 775 2b69614-2b6968c 769->775 770->757 783 2b6968e-2b69690 775->783 786 2b6aaf2-2b6ab2f 777->786 787 2b6aa7b-2b6aa8f 777->787 780->765 795 2b6ab30-2b6ab42 786->795 788 2b6aa41-2b6aa49 787->788 789 2b6aa91-2b6aae2 787->789 791 2b6aa50-2b6aa55 788->791 792 2b6aa4b-2b6aa4f 788->792 789->795 796 2b6aa57-2b6aa5b 791->796 797 2b6aa5c-2b6aa61 791->797 792->791 802 2b6bf46-2b6bf5b call 2b6ab97 795->802 796->797 800 2b6aa63-2b6aa67 797->800 801 2b6aa68 797->801 800->801 801->777 806 2b6bf47-2b6bf4e 802->806 807 2b6bf5d-2b6bf84 802->807 808 2b6bf50-2b6bf5b 806->808 810 2b6bf06-2b6bf08 807->810 811 2b6bf86-2b6bf88 807->811 808->806 808->807 814 2b6bf26-2b6bf2a 810->814 815 2b6bf0a-2b6bf0b 810->815 812 2b6bf76-2b6bf84 811->812 813 2b6bf8a-2b6bf93 811->813 812->810 812->811 816 2b6bf2c-2b6bf33 814->816 817 2b6bf89-2b6bf93 814->817 815->808 818 2b6bf0d-2b6bf23 815->818 819 2b6bf35-2b6bf45 816->819 820 2b6bf6f 816->820 818->814 819->802 822 2b6bf03 820->822 823 2b6bf71-2b6bf75 820->823 822->810 823->812
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ac1e49f3fa6c5b6018e213c5bc0c5d6615f3744c1018b663692f07a02591ace2
      • Instruction ID: 9eb8ef9a17f1941178acfbd52ec105d78420eba69d9fb0bdad48f0e180709951
      • Opcode Fuzzy Hash: ac1e49f3fa6c5b6018e213c5bc0c5d6615f3744c1018b663692f07a02591ace2
      • Instruction Fuzzy Hash: 5561437A6042498BDF218E748CAC7FA3B71EF16B40F6106E9DC876F201D7399846CB41
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 824 2b6a653-2b6a659 825 2b6a660-2b6a665 824->825 826 2b6a65b-2b6a65f 824->826 827 2b6a667-2b6a66b 825->827 828 2b6a66c-2b6a671 825->828 826->825 827->828 829 2b6a673-2b6a677 828->829 830 2b6a678-2b6a67d 828->830 829->830 831 2b6a684-2b6a689 830->831 832 2b6a67f-2b6a683 830->832 833 2b6a690-2b6a695 831->833 834 2b6a68b-2b6a68f 831->834 832->831 835 2b6a697-2b6a69b 833->835 836 2b6a69c-2b6a752 833->836 834->833 835->836 839 2b6e8bb-2b6e99e 836->839 840 2b6a758-2b6a949 NtAllocateVirtualMemory call 2b6e803 836->840 845 2b6e9a4-2b6e9b8 call 2b6ef17 839->845 846 2b6ea4b-2b6ea58 call 2b6eab2 839->846 866 2b6aa6a-2b6aa79 call 2b6a94e 840->866 854 2b6ea2c-2b6ea37 845->854 855 2b6e9ba-2b6e9c7 call 2b6ef17 845->855 858 2b6960f-2b69613 854->858 859 2b6ea3d-2b6ea48 call 2b6eab2 854->859 855->854 869 2b6e9c9-2b6ea27 call 2b6ef17 855->869 864 2b69614-2b6968c 858->864 859->846 872 2b6968e-2b69690 864->872 875 2b6aaf2-2b6ab2f 866->875 876 2b6aa7b-2b6aa8f 866->876 869->854 884 2b6ab30-2b6ab42 875->884 877 2b6aa41-2b6aa49 876->877 878 2b6aa91-2b6aae2 876->878 880 2b6aa50-2b6aa55 877->880 881 2b6aa4b-2b6aa4f 877->881 878->884 885 2b6aa57-2b6aa5b 880->885 886 2b6aa5c-2b6aa61 880->886 881->880 891 2b6bf46-2b6bf5b call 2b6ab97 884->891 885->886 889 2b6aa63-2b6aa67 886->889 890 2b6aa68 886->890 889->890 890->866 895 2b6bf47-2b6bf4e 891->895 896 2b6bf5d-2b6bf84 891->896 897 2b6bf50-2b6bf5b 895->897 899 2b6bf06-2b6bf08 896->899 900 2b6bf86-2b6bf88 896->900 897->895 897->896 903 2b6bf26-2b6bf2a 899->903 904 2b6bf0a-2b6bf0b 899->904 901 2b6bf76-2b6bf84 900->901 902 2b6bf8a-2b6bf93 900->902 901->899 901->900 905 2b6bf2c-2b6bf33 903->905 906 2b6bf89-2b6bf93 903->906 904->897 907 2b6bf0d-2b6bf23 904->907 908 2b6bf35-2b6bf45 905->908 909 2b6bf6f 905->909 907->903 908->891 911 2b6bf03 909->911 912 2b6bf71-2b6bf75 909->912 911->899 912->901
      APIs
      • NtAllocateVirtualMemory.NTDLL(0942C62A,0000014C,0000014C), ref: 02B6A836
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: AllocateMemoryVirtual
      • String ID:
      • API String ID: 2167126740-0
      • Opcode ID: f484f0728982e59dd22280d0cbaa0f65c8b60d538fd3e554866edee6cb88d46a
      • Instruction ID: c3d57f1ce8c356dc4faf8b6d0a07860dd675845bb37af7092ad23857cc4fe2be
      • Opcode Fuzzy Hash: f484f0728982e59dd22280d0cbaa0f65c8b60d538fd3e554866edee6cb88d46a
      • Instruction Fuzzy Hash: D551327A604259CBDF218E709CAC7FA3B61EF16B50F6502E8DC876F201C73A9806C741
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 913 2b6a6fc-2b6a701 914 2b6a703-2b6a707 913->914 915 2b6a708-2b6a70d 913->915 914->915 916 2b6a714-2b6a719 915->916 917 2b6a70f-2b6a713 915->917 918 2b6a720-2b6a725 916->918 919 2b6a71b-2b6a71f 916->919 917->916 921 2b6a727-2b6a72b 918->921 922 2b6a72c-2b6a731 918->922 919->918 921->922 923 2b6a733-2b6a737 922->923 924 2b6a738-2b6a73d 922->924 923->924 925 2b6a744-2b6a752 924->925 926 2b6a73f-2b6a743 924->926 928 2b6e8bb-2b6e99e 925->928 929 2b6a758-2b6a949 NtAllocateVirtualMemory call 2b6e803 925->929 926->925 934 2b6e9a4-2b6e9b8 call 2b6ef17 928->934 935 2b6ea4b-2b6ea58 call 2b6eab2 928->935 955 2b6aa6a-2b6aa79 call 2b6a94e 929->955 943 2b6ea2c-2b6ea37 934->943 944 2b6e9ba-2b6e9c7 call 2b6ef17 934->944 947 2b6960f-2b69613 943->947 948 2b6ea3d-2b6ea48 call 2b6eab2 943->948 944->943 958 2b6e9c9-2b6ea27 call 2b6ef17 944->958 953 2b69614-2b6968c 947->953 948->935 961 2b6968e-2b69690 953->961 964 2b6aaf2-2b6ab2f 955->964 965 2b6aa7b-2b6aa8f 955->965 958->943 973 2b6ab30-2b6ab42 964->973 966 2b6aa41-2b6aa49 965->966 967 2b6aa91-2b6aae2 965->967 969 2b6aa50-2b6aa55 966->969 970 2b6aa4b-2b6aa4f 966->970 967->973 974 2b6aa57-2b6aa5b 969->974 975 2b6aa5c-2b6aa61 969->975 970->969 980 2b6bf46-2b6bf5b call 2b6ab97 973->980 974->975 978 2b6aa63-2b6aa67 975->978 979 2b6aa68 975->979 978->979 979->955 984 2b6bf47-2b6bf4e 980->984 985 2b6bf5d-2b6bf84 980->985 986 2b6bf50-2b6bf5b 984->986 988 2b6bf06-2b6bf08 985->988 989 2b6bf86-2b6bf88 985->989 986->984 986->985 992 2b6bf26-2b6bf2a 988->992 993 2b6bf0a-2b6bf0b 988->993 990 2b6bf76-2b6bf84 989->990 991 2b6bf8a-2b6bf93 989->991 990->988 990->989 994 2b6bf2c-2b6bf33 992->994 995 2b6bf89-2b6bf93 992->995 993->986 996 2b6bf0d-2b6bf23 993->996 997 2b6bf35-2b6bf45 994->997 998 2b6bf6f 994->998 996->992 997->980 1000 2b6bf03 998->1000 1001 2b6bf71-2b6bf75 998->1001 1000->988 1001->990
      APIs
      • NtAllocateVirtualMemory.NTDLL(0942C62A,0000014C,0000014C), ref: 02B6A836
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: AllocateMemoryVirtual
      • String ID:
      • API String ID: 2167126740-0
      • Opcode ID: ba2315d691344e65a472be6b3f09691184c122343d592b3b3845b9f2e541b59d
      • Instruction ID: 36513767bf3368b1da4a7c80a843e268215a164ae37e6186b484039bcb1eaef0
      • Opcode Fuzzy Hash: ba2315d691344e65a472be6b3f09691184c122343d592b3b3845b9f2e541b59d
      • Instruction Fuzzy Hash: 9451317A20024A9BDB219E708CAC7FA3B71EF16E54F6506E8DC976F201C73A9806D751
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1002 2b6a75e-2b6a773 1003 2b6a724-2b6a725 1002->1003 1004 2b6a775-2b6a784 1002->1004 1005 2b6a727-2b6a72b 1003->1005 1006 2b6a72c-2b6a731 1003->1006 1007 2b6a785-2b6a949 NtAllocateVirtualMemory call 2b6e803 1004->1007 1005->1006 1008 2b6a733-2b6a737 1006->1008 1009 2b6a738-2b6a73d 1006->1009 1026 2b6aa6a-2b6aa79 call 2b6a94e 1007->1026 1008->1009 1011 2b6a744-2b6a752 1009->1011 1012 2b6a73f-2b6a743 1009->1012 1016 2b6e8bb-2b6e99e 1011->1016 1017 2b6a758-2b6a75c 1011->1017 1012->1011 1024 2b6e9a4-2b6e9b8 call 2b6ef17 1016->1024 1025 2b6ea4b-2b6ea58 call 2b6eab2 1016->1025 1017->1007 1033 2b6ea2c-2b6ea37 1024->1033 1034 2b6e9ba-2b6e9c7 call 2b6ef17 1024->1034 1037 2b6aaf2-2b6ab2f 1026->1037 1038 2b6aa7b-2b6aa8f 1026->1038 1035 2b6960f-2b69613 1033->1035 1036 2b6ea3d-2b6ea48 call 2b6eab2 1033->1036 1034->1033 1053 2b6e9c9-2b6ea27 call 2b6ef17 1034->1053 1044 2b69614-2b6968c 1035->1044 1036->1025 1055 2b6ab30-2b6ab42 1037->1055 1042 2b6aa41-2b6aa49 1038->1042 1043 2b6aa91-2b6aae2 1038->1043 1048 2b6aa50-2b6aa55 1042->1048 1049 2b6aa4b-2b6aa4f 1042->1049 1043->1055 1059 2b6968e-2b69690 1044->1059 1056 2b6aa57-2b6aa5b 1048->1056 1057 2b6aa5c-2b6aa61 1048->1057 1049->1048 1053->1033 1064 2b6bf46-2b6bf5b call 2b6ab97 1055->1064 1056->1057 1062 2b6aa63-2b6aa67 1057->1062 1063 2b6aa68 1057->1063 1062->1063 1063->1026 1068 2b6bf47-2b6bf4e 1064->1068 1069 2b6bf5d-2b6bf84 1064->1069 1070 2b6bf50-2b6bf5b 1068->1070 1072 2b6bf06-2b6bf08 1069->1072 1073 2b6bf86-2b6bf88 1069->1073 1070->1068 1070->1069 1076 2b6bf26-2b6bf2a 1072->1076 1077 2b6bf0a-2b6bf0b 1072->1077 1074 2b6bf76-2b6bf84 1073->1074 1075 2b6bf8a-2b6bf93 1073->1075 1074->1072 1074->1073 1078 2b6bf2c-2b6bf33 1076->1078 1079 2b6bf89-2b6bf93 1076->1079 1077->1070 1080 2b6bf0d-2b6bf23 1077->1080 1081 2b6bf35-2b6bf45 1078->1081 1082 2b6bf6f 1078->1082 1080->1076 1081->1064 1084 2b6bf03 1082->1084 1085 2b6bf71-2b6bf75 1082->1085 1084->1072 1085->1074
      APIs
      • NtAllocateVirtualMemory.NTDLL(0942C62A,0000014C,0000014C), ref: 02B6A836
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: AllocateMemoryVirtual
      • String ID:
      • API String ID: 2167126740-0
      • Opcode ID: abc7c1f3466be7c5ff09abc3857c5b2e8d8c387769219660d7121231f24818d6
      • Instruction ID: b5b49e1f1279865d062a64baf9dc5675655c2aa91359e9e1d99f4ffc92d7ebf5
      • Opcode Fuzzy Hash: abc7c1f3466be7c5ff09abc3857c5b2e8d8c387769219660d7121231f24818d6
      • Instruction Fuzzy Hash: 3151257A50828ACFCF229E748CA87F93BA1EF17654F1901E9DC966F252C3399805CB41
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1086 2b6a7c7-2b6a7d1 1087 2b6a7d3-2b6a7d7 1086->1087 1088 2b6a7d8-2b6a7dd 1086->1088 1087->1088 1089 2b6a7e4-2b6a7e9 1088->1089 1090 2b6a7df-2b6a7e3 1088->1090 1091 2b6a7f0-2b6a7f5 1089->1091 1092 2b6a7eb-2b6a7ef 1089->1092 1090->1089 1093 2b6a7f7-2b6a7fb 1091->1093 1094 2b6a7fc-2b6a801 1091->1094 1092->1091 1093->1094 1095 2b6a803-2b6a807 1094->1095 1096 2b6a808-2b6a80d 1094->1096 1095->1096 1097 2b6a814-2b6a852 NtAllocateVirtualMemory 1096->1097 1098 2b6a80f-2b6a813 1096->1098 1100 2b6a858-2b6a949 call 2b6e803 1097->1100 1098->1097 1106 2b6aa6a-2b6aa79 call 2b6a94e 1100->1106 1109 2b6aaf2-2b6ab2f 1106->1109 1110 2b6aa7b-2b6aa8f 1106->1110 1118 2b6ab30-2b6ab42 1109->1118 1111 2b6aa41-2b6aa49 1110->1111 1112 2b6aa91-2b6aae2 1110->1112 1114 2b6aa50-2b6aa55 1111->1114 1115 2b6aa4b-2b6aa4f 1111->1115 1112->1118 1119 2b6aa57-2b6aa5b 1114->1119 1120 2b6aa5c-2b6aa61 1114->1120 1115->1114 1125 2b6bf46-2b6bf5b call 2b6ab97 1118->1125 1119->1120 1123 2b6aa63-2b6aa67 1120->1123 1124 2b6aa68 1120->1124 1123->1124 1124->1106 1129 2b6bf47-2b6bf4e 1125->1129 1130 2b6bf5d-2b6bf84 1125->1130 1131 2b6bf50-2b6bf5b 1129->1131 1133 2b6bf06-2b6bf08 1130->1133 1134 2b6bf86-2b6bf88 1130->1134 1131->1129 1131->1130 1137 2b6bf26-2b6bf2a 1133->1137 1138 2b6bf0a-2b6bf0b 1133->1138 1135 2b6bf76-2b6bf84 1134->1135 1136 2b6bf8a-2b6bf93 1134->1136 1135->1133 1135->1134 1139 2b6bf2c-2b6bf33 1137->1139 1140 2b6bf89-2b6bf93 1137->1140 1138->1131 1141 2b6bf0d-2b6bf23 1138->1141 1142 2b6bf35-2b6bf45 1139->1142 1143 2b6bf6f 1139->1143 1141->1137 1142->1125 1145 2b6bf03 1143->1145 1146 2b6bf71-2b6bf75 1143->1146 1145->1133 1146->1135
      APIs
      • NtAllocateVirtualMemory.NTDLL(0942C62A,0000014C,0000014C), ref: 02B6A836
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: AllocateMemoryVirtual
      • String ID:
      • API String ID: 2167126740-0
      • Opcode ID: e9bb4bd93aedcd69d38a3a062ab9e0d7a9cc9fbfb8c6fd8d04b2cafbc1966e75
      • Instruction ID: d48e56c7e153c47012fd452c28de2650ee805d76a7d804608714e5f04426bb44
      • Opcode Fuzzy Hash: e9bb4bd93aedcd69d38a3a062ab9e0d7a9cc9fbfb8c6fd8d04b2cafbc1966e75
      • Instruction Fuzzy Hash: 2141323E20420A8BDA215E708CAD7FA3B71EF2BE54F6517E8DD932F111C73A5806D651
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaVarDup.MSVBVM60 ref: 0041C0EC
      • #563.MSVBVM60(?), ref: 0041C0F9
      • __vbaFreeVar.MSVBVM60 ref: 0041C112
      • #531.MSVBVM60(Sammenskruendes), ref: 0041C122
      • #606.MSVBVM60(00000001,?), ref: 0041C145
      • __vbaStrMove.MSVBVM60 ref: 0041C153
      • __vbaStrCmp.MSVBVM60(00402BA0,00000000), ref: 0041C15F
      • __vbaFreeStr.MSVBVM60 ref: 0041C175
      • __vbaFreeVar.MSVBVM60 ref: 0041C181
      • __vbaNew2.MSVBVM60(00402BC4,004213C0), ref: 0041C19F
      • __vbaObjSetAddref.MSVBVM60(?,00401168), ref: 0041C1B5
      • __vbaHresultCheckObj.MSVBVM60(00000000,02A4EDD4,00402BB4,00000010), ref: 0041C1D5
      • __vbaFreeObj.MSVBVM60 ref: 0041C1DD
      • __vbaFreeObj.MSVBVM60 ref: 0041C1F1
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C212
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C22E
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,00000158), ref: 0041C258
      • __vbaFreeObj.MSVBVM60 ref: 0041C2C3
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C2DC
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C2F8
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000001E0), ref: 0041C322
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C337
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C353
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000001A0), ref: 0041C37D
      • __vbaStrCopy.MSVBVM60 ref: 0041C38A
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,000006F8), ref: 0041C3D9
      • __vbaFreeStr.MSVBVM60 ref: 0041C3E1
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041C3F7
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C413
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C42F
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BF8,00000130), ref: 0041C459
      • __vbaLateIdCallLd.MSVBVM60(00000002,?,00000000,00000000), ref: 0041C46D
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C489
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C4A5
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000001D8), ref: 0041C4CF
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C4E4
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C500
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000048), ref: 0041C524
      • __vbaStrCopy.MSVBVM60 ref: 0041C531
      • __vbaStrVarMove.MSVBVM60(00000002), ref: 0041C53E
      • __vbaStrMove.MSVBVM60 ref: 0041C54C
      • __vbaFreeStrList.MSVBVM60(00000003,?,?,?), ref: 0041C5A4
      • __vbaFreeObjList.MSVBVM60(00000004,?,?,?,?), ref: 0041C5C8
      • __vbaFreeVar.MSVBVM60 ref: 0041C5D7
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C5F0
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C60C
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,00000150), ref: 0041C636
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,000006FC), ref: 0041C675
      • __vbaFreeObj.MSVBVM60 ref: 0041C67D
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C696
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C6B2
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BF8,00000050), ref: 0041C6D6
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C6EB
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C707
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,000000E8), ref: 0041C731
      • __vbaStrMove.MSVBVM60 ref: 0041C753
      • __vbaFreeStr.MSVBVM60 ref: 0041C78E
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041C7A4
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C7D0
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C7EC
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,000001E0), ref: 0041C816
      • __vbaStrMove.MSVBVM60 ref: 0041C842
      • __vbaStrCopy.MSVBVM60 ref: 0041C853
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,00000700), ref: 0041C893
      • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041C8A5
      • __vbaFreeObj.MSVBVM60 ref: 0041C8B4
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C8CD
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C8E9
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BF8,00000190), ref: 0041C913
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C928
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C944
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000070), ref: 0041C968
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041C97D
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041C999
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,000001C8), ref: 0041C9C3
      • __vbaStrCopy.MSVBVM60 ref: 0041C9D0
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,00000704), ref: 0041CA23
      • __vbaFreeStr.MSVBVM60 ref: 0041CA2B
      • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 0041CA48
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CA64
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041CA80
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,000001F0), ref: 0041CAAA
      • __vbaFreeObj.MSVBVM60 ref: 0041CAE4
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CAFD
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041CB19
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,00000128), ref: 0041CB43
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CB58
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041CB74
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,00000088), ref: 0041CB9E
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,00000708), ref: 0041CBE2
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041CBF4
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CC10
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041CC2C
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000000E0), ref: 0041CC56
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,0000070C), ref: 0041CC93
      • __vbaFreeObj.MSVBVM60 ref: 0041CC9B
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CCB4
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041CCD0
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,00000148), ref: 0041CCFA
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CD0F
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041CD2B
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,00000048), ref: 0041CD4F
      • __vbaStrMove.MSVBVM60 ref: 0041CD7B
      • __vbaFreeStrList.MSVBVM60(00000002,00000000,?), ref: 0041CDBB
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041CDD1
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CDED
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041CE09
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000058), ref: 0041CE2D
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CE42
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041CE5E
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,00000148), ref: 0041CE88
      • __vbaStrMove.MSVBVM60 ref: 0041CEA0
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,00000710), ref: 0041CED9
      • __vbaFreeStr.MSVBVM60 ref: 0041CEE1
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041CEF7
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CF13
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041CF2F
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000178), ref: 0041CF59
      • __vbaFreeObj.MSVBVM60 ref: 0041CF93
      • __vbaStrCopy.MSVBVM60 ref: 0041CFA4
      • __vbaFreeStr.MSVBVM60 ref: 0041CFD6
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041CFEF
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D00B
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,000001E0), ref: 0041D035
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D04A
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D066
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,00000218), ref: 0041D090
      • __vbaStrMove.MSVBVM60 ref: 0041D0BC
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,00000714), ref: 0041D10B
      • __vbaFreeStrList.MSVBVM60(00000002,00000000,?), ref: 0041D11D
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041D133
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D14F
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D16B
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BF8,00000120), ref: 0041D195
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D1AA
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D1C6
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,00000110), ref: 0041D1F0
      • __vbaStrCopy.MSVBVM60 ref: 0041D209
      • __vbaLateIdCallLd.MSVBVM60(00000002,?,00000000,00000000), ref: 0041D223
      • __vbaI4Var.MSVBVM60(00000000), ref: 0041D22D
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,00000718), ref: 0041D263
      • __vbaFreeStr.MSVBVM60 ref: 0041D26B
      • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 0041D288
      • __vbaFreeVar.MSVBVM60 ref: 0041D297
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D2B0
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D2CC
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000000D8), ref: 0041D2F6
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D30B
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D327
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000170), ref: 0041D351
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D366
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D382
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000170), ref: 0041D3AC
      • __vbaStrCopy.MSVBVM60 ref: 0041D3D1
      • __vbaFreeStr.MSVBVM60 ref: 0041D411
      • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 0041D42E
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D44A
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D466
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000130), ref: 0041D490
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D4A5
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D4C1
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,00000130), ref: 0041D4EB
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,00402614,0000071C), ref: 0041D556
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041D568
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D584
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D5A0
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,000001C0), ref: 0041D5CA
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041D5DF
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041D5FB
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,00000110), ref: 0041D625
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041D661
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401168,004025E4,000002B4), ref: 0041D685
      • __vbaVarAdd.MSVBVM60(00000002,00000008,?), ref: 0041D6BF
      • __vbaVarMove.MSVBVM60 ref: 0041D6C6
      • __vbaVarTstLt.MSVBVM60(00000002,?), ref: 0041D6E7
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$CheckHresult$Free$New2$List$Move$Copy$CallLate$#531#563#606Addref
      • String ID: $BEGROANS$CARCINEMIA$Daftardar7$Estancieros$FORSRGELSES$Frihedsheltens$Logria1$Sammenskruendes$Whiney$rA9S$skattejagters$}D
      • API String ID: 450096576-830647692
      • Opcode ID: 689ffeecd3421ab935b3ec74c214559e1e8f2ddd81ed03173febcecdb8ecbb45
      • Instruction ID: bfc14d7794d28373379f34b5458f725c4825010bb9600be4966b89223d5b3af6
      • Opcode Fuzzy Hash: 689ffeecd3421ab935b3ec74c214559e1e8f2ddd81ed03173febcecdb8ecbb45
      • Instruction Fuzzy Hash: B0E27FB0600219AFDB25DF50CD88FDA77BCBF58704F0085AAF549F71A0DA745A858F68
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 255 4014b8-4014e1 #100 256 4014e3-40151f 255->256 257 401545-40156c 255->257 262 401521-401532 256->262 263 4014b7 256->263 258 4015d7-4015f3 257->258 259 40156e-401583 257->259 264 4015f5 258->264 265 40165a-401665 258->265 267 401589-401596 259->267 268 4015fc-4015ff 259->268 263->255 269 4015f7 264->269 270 40166b-401670 264->270 265->270 272 40159c-4015aa 267->272 273 40160f-401616 267->273 274 401600 268->274 275 401601-40160e 268->275 269->268 271 401672-401677 270->271 278 401679 271->278 279 4016de-4016df 271->279 272->258 276 401618-40163f 273->276 277 40164a-401658 273->277 274->275 275->273 276->271 283 401641-401648 276->283 277->265 281 4016e0-4016ef 278->281 282 40167b-4016bd 278->282 279->281 284 4016f1-40170b 281->284 282->284 285 4016bf-4016d9 282->285 283->277 286 40170c-401784 284->286 285->286 287 4016db-4016dd 285->287 287->279
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: #100
      • String ID: VB5!6&*
      • API String ID: 1341478452-3593831657
      • Opcode ID: e51ff022794fbb21be7ebfafff5774ad5c1216ed86007ff79d6925d712a6e1cc
      • Instruction ID: cb5ef688d5c21c52c4e7dfd95e69f7aca3f4692edc987fc66bf8a31ef4d5ce7e
      • Opcode Fuzzy Hash: e51ff022794fbb21be7ebfafff5774ad5c1216ed86007ff79d6925d712a6e1cc
      • Instruction Fuzzy Hash: 99A1ED6284E3D18FC7138B709DA91917FB0AE2322471E09DBC4C2DF1B3E26D595AD726
      Uniqueness

      Uniqueness Score: -1.00%

      Non-executed Functions

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: 1$N"bj
      • API String ID: 0-4027302028
      • Opcode ID: 6f1c3d63a9b941f5b8c682faeba214bbf0852c68cdf06627041c4889de563454
      • Instruction ID: fc3c5e468564a9780ab172837a7157e0e6f88c2304ab90bba397be2c15656796
      • Opcode Fuzzy Hash: 6f1c3d63a9b941f5b8c682faeba214bbf0852c68cdf06627041c4889de563454
      • Instruction Fuzzy Hash: 990286752043069FEB304E34CD993EA77B3EF12740F65426DDC8A9B284D779898ACB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: Vx#$Vx#
      • API String ID: 0-1775738196
      • Opcode ID: 524acd4cfe831f3795cd63e386a1f980993e0fdbd63390b44c05f755e7ba8c4e
      • Instruction ID: 5f310eefbd1efb0706687b8cfe4aa3fbb07586add6e70cec7585fbee7bc5d47e
      • Opcode Fuzzy Hash: 524acd4cfe831f3795cd63e386a1f980993e0fdbd63390b44c05f755e7ba8c4e
      • Instruction Fuzzy Hash: 35513A7160034B9FDF34AE688DA87EB37A7EF9A350F90816DEC89C7254D7358884CA05
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: lqF$lqF
      • API String ID: 0-1288853309
      • Opcode ID: 499d5765455b5b56ae7462125acba88cea16a76987eda6d48519e4c5e62782f1
      • Instruction ID: 15c2a3c1e76cd400ff59288f2922dce4e08468ee0db5c23cee10dd0199196313
      • Opcode Fuzzy Hash: 499d5765455b5b56ae7462125acba88cea16a76987eda6d48519e4c5e62782f1
      • Instruction Fuzzy Hash: 7611C1353042058FEB14DE29C5D8BBA37A2EF69390F4081ADE94ACB714D33ADC81C611
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: b979d18a9bbdca9dc89411603c0176f31b177e87dcb7e910e53d86968041df07
      • Instruction ID: 09412af5418cfdf9a1f4a484bc6abb2a8a6065db2b62d75dba2ec454424225a3
      • Opcode Fuzzy Hash: b979d18a9bbdca9dc89411603c0176f31b177e87dcb7e910e53d86968041df07
      • Instruction Fuzzy Hash: E49287716043069FEF349E38C9993EA77A3EF56390F95426EDC8A87254D33989C5CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: dc60090c850ac0beaf871fd56e08f8feee7c4efe0a885bb3922b49079ac55eb3
      • Instruction ID: d6b0ec733741ce3b866403aa8ba8f10469c665a5618148779c8da6c935c0579c
      • Opcode Fuzzy Hash: dc60090c850ac0beaf871fd56e08f8feee7c4efe0a885bb3922b49079ac55eb3
      • Instruction Fuzzy Hash: F99275716043069FEB349E34CD987EA7BA3FF56350F95822DDC8A87294D3798985CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 01f481f3be89f7c60b9300c211162d6f18ce82a4831553d2b08de1e84c7c6e67
      • Instruction ID: b957c9480fde9224bcdadde758208afbec1aad2abebfe9dd66600a3571981226
      • Opcode Fuzzy Hash: 01f481f3be89f7c60b9300c211162d6f18ce82a4831553d2b08de1e84c7c6e67
      • Instruction Fuzzy Hash: 1B8275756043069FEB349E38CD987EA77A3FF56350F95826EDC8A87244D3398985CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 01a14ea97a764b4ac7f3cffbcd2dcdefd9c11de16f52b2cd0c7efbe2b0b84e7c
      • Instruction ID: e48380218cff38589b67a678c929ce359a42e10ba50eea0106cdf72d2af1eaa2
      • Opcode Fuzzy Hash: 01a14ea97a764b4ac7f3cffbcd2dcdefd9c11de16f52b2cd0c7efbe2b0b84e7c
      • Instruction Fuzzy Hash: 977274752043069FEB348E34CD993EA7BB2FF52350F95826DDC8A87254D7798986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 817230b469f87656367d6f4d797e1faf800e5f5717a2d71c8e2558210800c818
      • Instruction ID: 74f72606ffc4c5e090060333139e285618811b009f42aae81ecbed8378df748d
      • Opcode Fuzzy Hash: 817230b469f87656367d6f4d797e1faf800e5f5717a2d71c8e2558210800c818
      • Instruction Fuzzy Hash: 507275752043069FEB348E34CD993EA7BB2FF52750F95826DDC8A87244D7398986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 7660afadbf332dfa6184e8fdbc66761bf442414df1e6a71515c0824b5915fcdb
      • Instruction ID: 27913bbf88875e8aba06b2356b9f0b62903e78d489e45eb33785cfc1a09594fc
      • Opcode Fuzzy Hash: 7660afadbf332dfa6184e8fdbc66761bf442414df1e6a71515c0824b5915fcdb
      • Instruction Fuzzy Hash: 0D7286752043069FEB348E34CD993EA7BB2FF52350F95826DDC8A87244D7798986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 4efa295eb6bdb5183c90bd4b33be13ee9798baffea9f1192941374639cf15a76
      • Instruction ID: a048769759d136c8dfcb068963ac1a1fe4b1c767fc5f0f1e95ba99f8ad98d4d4
      • Opcode Fuzzy Hash: 4efa295eb6bdb5183c90bd4b33be13ee9798baffea9f1192941374639cf15a76
      • Instruction Fuzzy Hash: 3B6297752043069FEB344E34CD993EA7BB2FF52350F95826DDC8A87284D7798986DB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: c84b954604ea45e075c4492afd6cfd9076c085fdc514a01ece0502920b1b79bd
      • Instruction ID: b9d03b45470e1e0a5730ce1a3caa77bf8b25f7c4dfb3a4335c63735520a5d511
      • Opcode Fuzzy Hash: c84b954604ea45e075c4492afd6cfd9076c085fdc514a01ece0502920b1b79bd
      • Instruction Fuzzy Hash: EF6297756043069FEB344E34CD993EA7BB2FF52350F95826DDC8A87294D7398986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 3b4da323cc2ad1db37e5506b6ac15605f09ad8eabb0d26c82bc433f01c5a1918
      • Instruction ID: 9b5a0dad83d72d6f826b5976898b6656a8ab62dbcac4fbcbb2603634b777520a
      • Opcode Fuzzy Hash: 3b4da323cc2ad1db37e5506b6ac15605f09ad8eabb0d26c82bc433f01c5a1918
      • Instruction Fuzzy Hash: 0262A8752043069FEB344E34CD993EA7BB2FF52750F55826DDC8A87284D7398986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 3949bd62b530aa99dcaf7c78dff3337a993564a35a65269fcdcc7c64d9158b66
      • Instruction ID: 31ed6981ce267c4202c0c977eb03c6ad9cb0780093dfdb8bdae13d9fbc62548f
      • Opcode Fuzzy Hash: 3949bd62b530aa99dcaf7c78dff3337a993564a35a65269fcdcc7c64d9158b66
      • Instruction Fuzzy Hash: 8E5296752043069FEB344E34CD993EA7BB2FF52750F95826DDC8A87284D7398986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 8f62f14c523f63046bf8ea31e2d11bf1b7e3728843d03559fc8705557479349b
      • Instruction ID: d25460f0186421b7d3312ce09785ccad223ccc572f899bd11c0010f8c907bb0a
      • Opcode Fuzzy Hash: 8f62f14c523f63046bf8ea31e2d11bf1b7e3728843d03559fc8705557479349b
      • Instruction Fuzzy Hash: 835286752003069FEF344E34CD993EA7BB2FF52750F658269DC8A87294D7798986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: e09783ab10a8ed95898fc2bc026481511515c7eaac07a06a79e3622e4f5deb7d
      • Instruction ID: b54567b7473406589169fa62e554cab0ef91f779c0e4bb10687b08ef51a871ed
      • Opcode Fuzzy Hash: e09783ab10a8ed95898fc2bc026481511515c7eaac07a06a79e3622e4f5deb7d
      • Instruction Fuzzy Hash: B74297752003069FEB344E34CD993EA7BB2FF52750F65826DDC8A87294D7798986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: a7fc45b1fd2afd8d04737660091b9d26777ffe3cd6a11674998f055bcea3e541
      • Instruction ID: 1da591289acecdc0e4a5c6bc00837cb59d50ac918f4adb97e95a2649538ff81b
      • Opcode Fuzzy Hash: a7fc45b1fd2afd8d04737660091b9d26777ffe3cd6a11674998f055bcea3e541
      • Instruction Fuzzy Hash: 4E4296752003069FEB344E34CD993EA7BB2FF52750F65826DDC8A87294D7798986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: b9277576b9b313c2886e0cdecf563ab27bb7d4d57d7fdc859c1444fb36bfcd06
      • Instruction ID: cdf17bcaed9f40ae2aa7f1991f61307aaf9d411a37fc4d746867163b681275ce
      • Opcode Fuzzy Hash: b9277576b9b313c2886e0cdecf563ab27bb7d4d57d7fdc859c1444fb36bfcd06
      • Instruction Fuzzy Hash: 564285752003069FEB344E34CD993EA7BB2FF52750F65826DDC8A87294D7798986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 9a557076e2d3e3ea84706d399adba3ac79ece5dbb00ce639dee3c6bf52c0bf60
      • Instruction ID: 4d8ba03a29792887ece492f13ee277faffd1df0b64cc9ade685c0ce19bdb3b5c
      • Opcode Fuzzy Hash: 9a557076e2d3e3ea84706d399adba3ac79ece5dbb00ce639dee3c6bf52c0bf60
      • Instruction Fuzzy Hash: D04285752003069FEB344E34CD993EA7BB2FF12750F65826DDC8A87294D7798986DB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 84cf8f7c41cdd0b0854920e912abd6eb98058da4231094d45c00ec57df9a6f31
      • Instruction ID: b535cf213cb361ffe82ea54b086598197d408737d3aeb5396fec5a1fb3064626
      • Opcode Fuzzy Hash: 84cf8f7c41cdd0b0854920e912abd6eb98058da4231094d45c00ec57df9a6f31
      • Instruction Fuzzy Hash: 3B3286752003069FEB344E34CD993EA7BB2FF12750F65826DDC8A97294D7798986CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 4b9971181cf0b3d6f540985d6d9007554dd38858a75a19d717c5b60b16c28600
      • Instruction ID: f65b8059059c8a29cea608417e7031652323cd9e0f2c118eba28926e7f2df6bb
      • Opcode Fuzzy Hash: 4b9971181cf0b3d6f540985d6d9007554dd38858a75a19d717c5b60b16c28600
      • Instruction Fuzzy Hash: 2D3275712043069FEB344E34CD993EA7BB2FF52350F55826EDC8A97290D3798989CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 053821e90506927a42d333cf459ddbca6311ce0f072d83f94ef1e4343b7df527
      • Instruction ID: b0a1508995fcca912bd9776564f66c40105f64ae905b8a8ec31202b029f64235
      • Opcode Fuzzy Hash: 053821e90506927a42d333cf459ddbca6311ce0f072d83f94ef1e4343b7df527
      • Instruction Fuzzy Hash: 583285752003069FEB344E74CD993EA7BB2FF12750F65826DDC8A87284D7798986CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: b20acf079a7070e08e3ee3225d4f1a08ec4ed3604f5114bde86975c7b64d9a2e
      • Instruction ID: 77f4d4ecfea718d059bcf43c387cf491b3a12e74673b80ee8600cce59bc7a48a
      • Opcode Fuzzy Hash: b20acf079a7070e08e3ee3225d4f1a08ec4ed3604f5114bde86975c7b64d9a2e
      • Instruction Fuzzy Hash: AF3263712043069FEB348E38C9993EA77B2FF52350F54826ADC8A97294D37989C5CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: 301c92fe53302db15b1e860e205d54e54a390da99edc2bb365321b02850250c8
      • Instruction ID: e661debdb9772963c39efab1a9198bfd4fdf51c47db4a6f225e2b29d7f85b6ed
      • Opcode Fuzzy Hash: 301c92fe53302db15b1e860e205d54e54a390da99edc2bb365321b02850250c8
      • Instruction Fuzzy Hash: 5A32E171B04746DFDB34CE28CCA8BEA73A6BF49350F85426DDC9987240D738A995CB80
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 06ace785a528eaec16b024a461e9c3f50c22bc487248271021471e5df7197c2d
      • Instruction ID: bb31e5564237b9110959112438eb428bf52a56f2b257e6916a1cfa74a19e8b97
      • Opcode Fuzzy Hash: 06ace785a528eaec16b024a461e9c3f50c22bc487248271021471e5df7197c2d
      • Instruction Fuzzy Hash: 292284752003069FEF344E34CD993EA77B2EF52750F65426DDC8A8B284D779898ACB42
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 30c77d6c27d9232b2e1821efa68e3aeaad292be04ed68c809abf489cb2fdd92f
      • Instruction ID: ba9efb392547eee2e0f7a03b8a5bc1db26c7794007f03bc63f04ba5085bec289
      • Opcode Fuzzy Hash: 30c77d6c27d9232b2e1821efa68e3aeaad292be04ed68c809abf489cb2fdd92f
      • Instruction Fuzzy Hash: F12284752003069FEF344E34CD993EA37B2EF52750F65426DDC8A9B284D779898ADB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 137e01f61cb8dc5a6114cc280ebe7b785ed9890f788aad83ba121b1260cb4fd7
      • Instruction ID: 7b44830652c1aabcf674c64b6149a11aeb6a2c168865a830fee50eb66070b967
      • Opcode Fuzzy Hash: 137e01f61cb8dc5a6114cc280ebe7b785ed9890f788aad83ba121b1260cb4fd7
      • Instruction Fuzzy Hash: 1B2296752003069FEF344E34CD997EA37B3EF42750F65426DDC8A9B284D779898A9B02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: c060dc5d00405d4b6bf54b8571e30fb04da38e57969f77baa960c51082fc0921
      • Instruction ID: 450b5bc60bd200c859b2ba0188f254cbbb7fe8bfe39f0965541096abe2fd1438
      • Opcode Fuzzy Hash: c060dc5d00405d4b6bf54b8571e30fb04da38e57969f77baa960c51082fc0921
      • Instruction Fuzzy Hash: BE1296752003069FEF304E34CD997EA37B3EF52750F65426DDC8A9B284D379898A9B02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 7483be6968bb6b1e1403a25df1eff46c151df5200dc51c320c5be7e3f193cba2
      • Instruction ID: bd09a01c4604432e3921a1ad86d812b38467d6a38d6062a661887adf9ad6966c
      • Opcode Fuzzy Hash: 7483be6968bb6b1e1403a25df1eff46c151df5200dc51c320c5be7e3f193cba2
      • Instruction Fuzzy Hash: 8E1298752003069FEB304E34CD993EA77B3EF12740F65426DDCCA9B244D779898A9B02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 72ed5e426153d63ea6ed50334d0730742a1cfa9fb4d88aeebcb078805b44d855
      • Instruction ID: 26c40bf38d11bacb0cde465af70787aeb94fa32da9a2ee81e5eeca900bc42b5f
      • Opcode Fuzzy Hash: 72ed5e426153d63ea6ed50334d0730742a1cfa9fb4d88aeebcb078805b44d855
      • Instruction Fuzzy Hash: 8C0287752003069FEB304E74CD997EA77B3EF12750F654269DCCA9B284D779898ACB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: d7b8aed365816a03bf36898a7dd6c98717b1bb383b9cfc8b31fc511dd762fe8b
      • Instruction ID: ce9dc6e764425740565066c49910ac9cac8d64c40b1fa937d14bba9f3d061a41
      • Opcode Fuzzy Hash: d7b8aed365816a03bf36898a7dd6c98717b1bb383b9cfc8b31fc511dd762fe8b
      • Instruction Fuzzy Hash: C302123570470A9FDB34CE28CCA8BEA77A2FF45750F95426DDC9987240D738A956CB80
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 9840ab98c9291cce3c6ee62c7eed8025e6502e50ece47b347a32ee08fc0c55aa
      • Instruction ID: 9a09307c730e8d18c3d99f8bb92eff05bd7a98a6b1a1af0f08c0af9f8d948160
      • Opcode Fuzzy Hash: 9840ab98c9291cce3c6ee62c7eed8025e6502e50ece47b347a32ee08fc0c55aa
      • Instruction Fuzzy Hash: B9F1867520030A9FEB304E74CD997EA77B3EF12740F654269DCCA9B244D77A8989CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: 8434c411b30cde51888ed1e56201128b0f59e05ba50ce07806cf7ee154d2cfca
      • Instruction ID: b43cc36055f571b6ebdc7dc0524e0be95c3ade36b12157fbcd55f3db5954161c
      • Opcode Fuzzy Hash: 8434c411b30cde51888ed1e56201128b0f59e05ba50ce07806cf7ee154d2cfca
      • Instruction Fuzzy Hash: 4302113570470A9FDB38CE28CCA8BEA77A2FF45750F95826DDC9987240D734A956CB80
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 25d9e99b463129fb91d81259db3536adb7318c9fec56c422c0bc8421fb048dec
      • Instruction ID: 3099136c88c6ae41dd7d1658008922292ad0c39bce7f2757a590aa2842a927ab
      • Opcode Fuzzy Hash: 25d9e99b463129fb91d81259db3536adb7318c9fec56c422c0bc8421fb048dec
      • Instruction Fuzzy Hash: 7EE17A792003069FEB304E74CD997EA7773FF12B40F6142A9DCC69B154D77A898A9B02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 2351dd6454ff3c08dfa6ced58687df109e37cbc10a1d286eee3375574919dd56
      • Instruction ID: 301b219e2c0f0971562b814f969e52a183c6f3637aad9e773105961c29db3012
      • Opcode Fuzzy Hash: 2351dd6454ff3c08dfa6ced58687df109e37cbc10a1d286eee3375574919dd56
      • Instruction Fuzzy Hash: CEF1667520030A9FEB304E74CD997EA77B3EF12740F654269DC8A9B254D77A89C9CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: 13d3351b08c796cfe7391189c85f3f9a90e4b96b9a330ad6d2c0ec24500eda4a
      • Instruction ID: ae41c073da4f2f4360736c671cea5651f9447386698cdbbb0157bd4444a95f89
      • Opcode Fuzzy Hash: 13d3351b08c796cfe7391189c85f3f9a90e4b96b9a330ad6d2c0ec24500eda4a
      • Instruction Fuzzy Hash: A4F1113570470ADBDB38CE28CDA8BEA77A2FF45750F95426DCC9987240D738A856CB80
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: 1ece347a8c486fd23e1ce0cc159dd6b871f028ddbdab4c0f3f7c0770227cffc5
      • Instruction ID: f779a093caa3ff19bef891a2ea98c702288f3fb827e1afbe15e171914d14ea54
      • Opcode Fuzzy Hash: 1ece347a8c486fd23e1ce0cc159dd6b871f028ddbdab4c0f3f7c0770227cffc5
      • Instruction Fuzzy Hash: ECF1F1357047069BDB348E38C8A8BEA77A2FF45750F95426DCC9987240DB34A956CB80
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: 21d155a1786f660be99f6d7178d0f9cc8dc9f7d099bb9fef6fe7ceeaa107c488
      • Instruction ID: e4a45bed8d7ee852a5b6a8651f7b890f50ecdc3a2f04fd3495434c2d0ce15d26
      • Opcode Fuzzy Hash: 21d155a1786f660be99f6d7178d0f9cc8dc9f7d099bb9fef6fe7ceeaa107c488
      • Instruction Fuzzy Hash: 83F1D27170474ADFDB28CF28CDA8BEA73A2BF45350F88822DDC9987640D734A955CB81
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: 2fc25037ed3283159e8e7e0af3706124ae00231d803654ed1bf4ea12c8e88585
      • Instruction ID: cbb41db237ca359b499aa2cb51e6cb70497e36fc9bf9a8dfdbc2d964fdd8f170
      • Opcode Fuzzy Hash: 2fc25037ed3283159e8e7e0af3706124ae00231d803654ed1bf4ea12c8e88585
      • Instruction Fuzzy Hash: 7CE10235704706DBDB34CE38CCA8BEA77A2FF55750F98826DCC9987240D734A9568B80
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 278e5fd9c05741ab8534a5ffa8fa9deb80005068ad3a74dc0e1ba36e7e04dd0d
      • Instruction ID: ff51fb9252b0625a2f7010e506ab83f74834d255998c340d7a57b849f102552c
      • Opcode Fuzzy Hash: 278e5fd9c05741ab8534a5ffa8fa9deb80005068ad3a74dc0e1ba36e7e04dd0d
      • Instruction Fuzzy Hash: 35D1AC7920030A9FDB314E74CD597EA3B73FF12B40F6142A9DC8A8B154C77A898AD702
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 75d99447da2e59e8ae5859db1ecaa7bca24356808f95711f09a61206a3bc40e7
      • Instruction ID: 824a4f9645ea44ad4be0c4959fa0ea5e08493c3152fca6f63d8253d910a0f9c7
      • Opcode Fuzzy Hash: 75d99447da2e59e8ae5859db1ecaa7bca24356808f95711f09a61206a3bc40e7
      • Instruction Fuzzy Hash: 3FD1897520030A9FDB304E74CD997EA77B3FF12740F654269DC8A9B154D77A8989CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: 2cdca2e5d92d958d02150e7821b2e71c9a5103f05c86810480418e1fc0339d3d
      • Instruction ID: acfd8cfcb433eeb47774f3f250e6d36bbf8f8fe08c4d9fa545243ab718bc5c18
      • Opcode Fuzzy Hash: 2cdca2e5d92d958d02150e7821b2e71c9a5103f05c86810480418e1fc0339d3d
      • Instruction Fuzzy Hash: 20E10335704706CBDB34CE38CCA8BEA77A2FF85750F99826DDC9987240DB3499568B81
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: b72cdaf0811c581279886bdc066c807fce70be7cd138c87e5e4a4df74414566c
      • Instruction ID: a81a6d300c897ac1cfc192bb791037aa7331d1cd07e7d8c5bdd2fb384e1f6d1b
      • Opcode Fuzzy Hash: b72cdaf0811c581279886bdc066c807fce70be7cd138c87e5e4a4df74414566c
      • Instruction Fuzzy Hash: C4D1997520030A9FEB304E74CD997EA3773FF12B40F618269DC8A9B154D77A8989CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: 7a6b3922359ef2a63ccf1a15f592fca10e68076ba5a7338ded136897fa658b04
      • Instruction ID: e9c6a684ffbabee0726ddf361ea33bf8e26db408ab257fc545073261ca0bf914
      • Opcode Fuzzy Hash: 7a6b3922359ef2a63ccf1a15f592fca10e68076ba5a7338ded136897fa658b04
      • Instruction Fuzzy Hash: F8D12335704706CBDB348E38CCA8BEA37A2FF95750F99826DDC898B244DB349956CB41
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 09086d92148b1bc44ab3ec5cf0ff1bd9381c7ddb68d47df5382c2bcf82a1cca5
      • Instruction ID: 00e315cb5a8b6f466dad265d078bd391fa971a79828e1844e38c5714c8c9f142
      • Opcode Fuzzy Hash: 09086d92148b1bc44ab3ec5cf0ff1bd9381c7ddb68d47df5382c2bcf82a1cca5
      • Instruction Fuzzy Hash: 16B1977920020A9FEF304E74CD997EA3773FF12740F558269DC8A9B254D73A8989CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: a8eeb47d68675b569865f898fcf2e9a67e594c64f8d0b76179e25b55d33fb754
      • Instruction ID: 84ac4b80c6e357e5687525fb31f7c36720c63f1d6a56f6e0abf00a34d83eeff5
      • Opcode Fuzzy Hash: a8eeb47d68675b569865f898fcf2e9a67e594c64f8d0b76179e25b55d33fb754
      • Instruction Fuzzy Hash: 3CB1867A20020A9FDF304E74CD597EA3773FF12B40F658269DC8A9B154D73A9989CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: *2q
      • API String ID: 0-4200797449
      • Opcode ID: 59a9d51ea56a0b7db739fe7f87b4039eacdaa8a89f34870c226782d5087def82
      • Instruction ID: 8b4d384b3ff915ed24195b871f85e1fc0154b700ecee1c8b242312d5be80a7ec
      • Opcode Fuzzy Hash: 59a9d51ea56a0b7db739fe7f87b4039eacdaa8a89f34870c226782d5087def82
      • Instruction Fuzzy Hash: B4C1DF71704746CFDB38CE28CDA8BEA73A2BF85390F88826DDC9987240D7349951CB80
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: ,I*
      • API String ID: 0-804518743
      • Opcode ID: 8276f06f86e179aa164934133d57c6a341a5c8a0d57a247827215a894594c282
      • Instruction ID: 7c41a55d32c4c56a7758a1aa3e31201d75be6aa61f8946e5199c30f98fdb12ed
      • Opcode Fuzzy Hash: 8276f06f86e179aa164934133d57c6a341a5c8a0d57a247827215a894594c282
      • Instruction Fuzzy Hash: 66A19C3A2047499FDB304E788D087EB3BB6EF56B60F95426DDC8ACB284D7358847C642
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: ,I*
      • API String ID: 0-804518743
      • Opcode ID: dc171ed7e30d8195e4c9d0dd2dfeb672ec03ca9e7965a322daf8b2917eec27ce
      • Instruction ID: 9533c3b2209c6ea976ab7222408aaf899962f5687e0815453ea62ddcb0a4af06
      • Opcode Fuzzy Hash: dc171ed7e30d8195e4c9d0dd2dfeb672ec03ca9e7965a322daf8b2917eec27ce
      • Instruction Fuzzy Hash: 2DA1693A2047459BDB304E788D087EB3BB2EF52F50FA647ADCC968B284D73598478642
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: a62cd37c254a2d670521c1b2a4e4108145a093f23e5fa6ccafabdbef89f20a54
      • Instruction ID: adafb1d7c768c85d539a21e83b4d1005d850a11edac691518551247e6c2df291
      • Opcode Fuzzy Hash: a62cd37c254a2d670521c1b2a4e4108145a093f23e5fa6ccafabdbef89f20a54
      • Instruction Fuzzy Hash: 1EA1657920020A9BDB304E74CD597EA3773EF16B50F65826CDC8A8B144D77A99C9CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: ,I*
      • API String ID: 0-804518743
      • Opcode ID: f9ccedaf1663a0f342265c0ba6383a9936cc175332bd07848b3c3360ea618d6e
      • Instruction ID: 902b07ea2f8f47e8b95a08cb3f54249e53f49cd1e5a5fc89e6a25119c91c2410
      • Opcode Fuzzy Hash: f9ccedaf1663a0f342265c0ba6383a9936cc175332bd07848b3c3360ea618d6e
      • Instruction Fuzzy Hash: E0A166756043459FDB308E7C8D483EB3BA7AF563A0F85422EDC89DB294D3358982CA42
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: N"bj
      • API String ID: 0-2615862271
      • Opcode ID: 7aae499f77e271109a434c2004180aec051ff44368d5abf89cc11d6a87c634ac
      • Instruction ID: cbbcbf6ef9fdcc073d47715fbccdb939fbb225eea9dad58f0c506429dfeb752c
      • Opcode Fuzzy Hash: 7aae499f77e271109a434c2004180aec051ff44368d5abf89cc11d6a87c634ac
      • Instruction Fuzzy Hash: 9D91767920020A9FDB304E74CD597EA3773FF12B40F61826CDD8A8B144D73A998ADB06
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: ,I*
      • API String ID: 0-804518743
      • Opcode ID: 11678f0abf0a9471161360d294e7f1f8f67c3a6f33283fc2b18657b28d0bdc26
      • Instruction ID: 6f8bb121c9a6676b53bc777afd22729210551285b04ccd52bcea2581e2c1d34d
      • Opcode Fuzzy Hash: 11678f0abf0a9471161360d294e7f1f8f67c3a6f33283fc2b18657b28d0bdc26
      • Instruction Fuzzy Hash: A4815B3A6047459FDB344E788D087EB7BB6EF56BA0F96425DDC898B284D7308943C742
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID: B@
      • API String ID: 0-3644578000
      • Opcode ID: a4d22a0bbdb8900a5bfb4c32d3011df70ef7d6c1b93e98ff1b6d547b3214be33
      • Instruction ID: 8cfb1ac3740ea4cfccd1205f88ee715a32d3b78ba4d4ad6d8415178fc9f2033f
      • Opcode Fuzzy Hash: a4d22a0bbdb8900a5bfb4c32d3011df70ef7d6c1b93e98ff1b6d547b3214be33
      • Instruction Fuzzy Hash: E24159315043148FEF30DD758A587DB3BA6DF56390F91811EDE859B208D3384AC2CA56
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d83af3508c8873ed0e6dabfc587beb31c9e1f0ca0769e6e1e81d800826393cb0
      • Instruction ID: 5ba11b1175f45f8b62daef625eee29ccf032faf04cd43ddcd13ed9be3adf564b
      • Opcode Fuzzy Hash: d83af3508c8873ed0e6dabfc587beb31c9e1f0ca0769e6e1e81d800826393cb0
      • Instruction Fuzzy Hash: 4791677520020A9FDF314E74CD597EA3773EF12B40F6042A9DD8A4B245D73A998ADB42
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 16e75627d6f574c18cdaae84a1ab2a820a630fd39ff321f1d032dfc77411949b
      • Instruction ID: da0a32f1f5320d8003c910a86af408b5c69473293855ac736edd2c19493d60f0
      • Opcode Fuzzy Hash: 16e75627d6f574c18cdaae84a1ab2a820a630fd39ff321f1d032dfc77411949b
      • Instruction Fuzzy Hash: 4481563A2047459FDB354E788C087EB7BB2EF56BA0F96466DDC968B284D73188438642
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ea11bcfd2269646776bb5027435984aef0f1c45a6be051d27354f2833e081100
      • Instruction ID: bc8cba6a3b319db7ba503f9063aed00861cf3d48f023729dd30d4ac62fb8c958
      • Opcode Fuzzy Hash: ea11bcfd2269646776bb5027435984aef0f1c45a6be051d27354f2833e081100
      • Instruction Fuzzy Hash: 9F7127357007468FDB308E68CCA8BE977B6FF45B50F914269DC9A8B240D7399D46CB10
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c2841f9a38e39b2026893524b43fd8f96d8e6803d5a70e06cca5d4aeb026a822
      • Instruction ID: 2ed51286f48d2d02da384ab477511b13aec27873a20f1a1ec97095c47dd0353f
      • Opcode Fuzzy Hash: c2841f9a38e39b2026893524b43fd8f96d8e6803d5a70e06cca5d4aeb026a822
      • Instruction Fuzzy Hash: 547145792002099BDF344E74CD597EA3773EF12B00F6542ACED8A5B144D73A998ADB12
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 868c2198a4f70e9ef5c80c5c970144c389d6d50ce79a7a8c402a947569771f46
      • Instruction ID: ecf1c918433114ce9e1e9f8be8fad853662bc67af2d2ee23f6d7e3d54d09cee2
      • Opcode Fuzzy Hash: 868c2198a4f70e9ef5c80c5c970144c389d6d50ce79a7a8c402a947569771f46
      • Instruction Fuzzy Hash: AE7137797007058FDB348E68CCA9BEA37A6FF45B40F91427DDC8A8B241DB359D468B00
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8122882d4eca4a6d5e0ad3de62b2e65694f6039c0067bf8ae2c3153b6af57129
      • Instruction ID: e6a9ddf83db3cdb1a129ae3cf2a8f110c27e6b4654c741482c4eba0f200d4a66
      • Opcode Fuzzy Hash: 8122882d4eca4a6d5e0ad3de62b2e65694f6039c0067bf8ae2c3153b6af57129
      • Instruction Fuzzy Hash: 3E713875700349CFDB304E7488987EA3BA2EF56F50F9902AECD8A4B255C77549868B12
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bffe7070703bf4ac66486f118d2f5bcde72c853ef0f467b98d297ac58aff6b5f
      • Instruction ID: 5bf2dbe5fe59fa7324edcc37bf73648c174449d8e2da30e55ad89564bdddc4cd
      • Opcode Fuzzy Hash: bffe7070703bf4ac66486f118d2f5bcde72c853ef0f467b98d297ac58aff6b5f
      • Instruction Fuzzy Hash: 1D6128397007468BDB308E68CCA8BEA37A6FF45B50FA1426DDD9A8B240D7399D479710
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a86eeb048e70db16513368cf3a26ffe7c9d391883df77b68ac680de52d1779df
      • Instruction ID: 58ca30757c1c8f2d7f59edd0bf71e6f5d72977571f90501b160b8af3a4fac811
      • Opcode Fuzzy Hash: a86eeb048e70db16513368cf3a26ffe7c9d391883df77b68ac680de52d1779df
      • Instruction Fuzzy Hash: C161573A2047459FDB304E788C087EB3BB2EF56F60F96436DDC9A8B284D73189438601
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 43a24d4b696019a820eae68a421c03819def439106ec11f6edecba478243dcf7
      • Instruction ID: b3dd0e43a836dbf39990a70ffcd266d815206351d6f80ff1d72027ec96f7c9d6
      • Opcode Fuzzy Hash: 43a24d4b696019a820eae68a421c03819def439106ec11f6edecba478243dcf7
      • Instruction Fuzzy Hash: 0F5126397003468BDB309E68CCA8BE977B6EF55B40FA1427DDC9A8B240DB399D479710
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ab0d70491cdd97e73228224fe3b7264f394808ff6f7acdfc02394023bd786c8b
      • Instruction ID: a098a9c38bf3f657a9d20abf6db226a4012f987d5485c2be8004a98863ded926
      • Opcode Fuzzy Hash: ab0d70491cdd97e73228224fe3b7264f394808ff6f7acdfc02394023bd786c8b
      • Instruction Fuzzy Hash: 7C51363A2047459BDB344E788C187EB3BB6EF56F60F96435DDC9A8B284C73189438716
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f7e9950f17fdb4b8a57e042cca361b171aedae4fdd677cf131616e25b6ae899f
      • Instruction ID: 12ebb7154f0165b823b054345178193bb93b4a159beb8edd5a7f4f4a8c3adbb3
      • Opcode Fuzzy Hash: f7e9950f17fdb4b8a57e042cca361b171aedae4fdd677cf131616e25b6ae899f
      • Instruction Fuzzy Hash: 7D51253A3003068BD7705E788CA8BE937B6EF56B50FE24269DC868B204DB399D479711
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 06705285923db2b8afa5e323381c0a1080e33e67455f1894c77b30b381f9dea1
      • Instruction ID: 241c450009713d789f9bc66c748ea36551e1d6c649ff876a5d3f4d2bc0c90b56
      • Opcode Fuzzy Hash: 06705285923db2b8afa5e323381c0a1080e33e67455f1894c77b30b381f9dea1
      • Instruction Fuzzy Hash: AA61D271B00746CFDB349E18CCA8BE973A6BF45350F95416DEC999B240D739AD86CB40
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0ea2e30e922e2cf67d099c8f5d56a35325af781b06bad872d80c471afe21b161
      • Instruction ID: 4bf6893ca9284540c10d12cb94abb747259d34b1e67e45653befe5b7aad5eb32
      • Opcode Fuzzy Hash: 0ea2e30e922e2cf67d099c8f5d56a35325af781b06bad872d80c471afe21b161
      • Instruction Fuzzy Hash: E4613671B04349CFDF348E68C8947EA37E6AF95B50F89016EDC899B295C7348E81CB12
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b0ddb94e968fafade8583274cbaf85835b9da837d6f06c341a9ecd6fb00dbd6c
      • Instruction ID: 84ff8d1f0c40de3ef2ccb6f123d4557a2f08eee1634be22c836097c67732570d
      • Opcode Fuzzy Hash: b0ddb94e968fafade8583274cbaf85835b9da837d6f06c341a9ecd6fb00dbd6c
      • Instruction Fuzzy Hash: E651363A2047459BDB348E788D1C7EB7BB3EF56F60F96475D8C968B284C73189438612
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a7c15422f8d5cf0c8cc99c9286674e460eb61256c85f16e399a306a86dea1284
      • Instruction ID: 9df3bde101bd7bd54ce34fc4ed6ba7ba4e3d008ed5676932895eb465517097a0
      • Opcode Fuzzy Hash: a7c15422f8d5cf0c8cc99c9286674e460eb61256c85f16e399a306a86dea1284
      • Instruction Fuzzy Hash: 1841D32F2112199BE6601EB49C1C9FA7F71EB62E10BB257D8D9934F104CB364C476326
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fe7f5befa7bf29b915ce79c3443a01a82d2965e675fec0ee119ca79d8740d724
      • Instruction ID: 03c7919bd29edb8a8c4ed81ebe44b6938b1110b1fb33a3d1f7f02acf82d6237a
      • Opcode Fuzzy Hash: fe7f5befa7bf29b915ce79c3443a01a82d2965e675fec0ee119ca79d8740d724
      • Instruction Fuzzy Hash: 9041452A2003458BD7305D748C98BE97766FB56F10FE203A8CDD68B244C73A5C879711
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fe062e85a05ccbb8c12409956794f6e174c2fd4f3ce7ac41e9cc2eff7ecb0a51
      • Instruction ID: dc9e546b600816c0b9464b8f66677f0535d02fe7dea9643b9e7a684b7e582e98
      • Opcode Fuzzy Hash: fe062e85a05ccbb8c12409956794f6e174c2fd4f3ce7ac41e9cc2eff7ecb0a51
      • Instruction Fuzzy Hash: 1241242A3402058BD7705EB48C987EA7B66FB56F10FE243B8DDC68B104C73A9C8B9715
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 48ebadb0bcb60da70f3e0d14bfd5f35e37c835039230129a73b8e5331c8ad662
      • Instruction ID: 5f3139a65c1cb0b92eebd73e5d058e491bca149814b3893c9615064f62fde6f6
      • Opcode Fuzzy Hash: 48ebadb0bcb60da70f3e0d14bfd5f35e37c835039230129a73b8e5331c8ad662
      • Instruction Fuzzy Hash: EE41483E2147059BDB344D788D187EB7FB3EF56E60FA6479D8C968B288C73188438612
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e435ce16eb016b96d93b86e1455d6a2944638cf4c7209ce83d778974ca353762
      • Instruction ID: 1c6cdb4ca77f5b85e62c9095cd20911d7e815000b0c7a5a0b3d3a2afa760e98a
      • Opcode Fuzzy Hash: e435ce16eb016b96d93b86e1455d6a2944638cf4c7209ce83d778974ca353762
      • Instruction Fuzzy Hash: D631377A7047059BDB344E788D087E73FB3EF56E50F96479E8C868B288DB7588438612
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e7ac23272848459133b2d0125bdc58dc8fb57656d5e6b996dfe5d08b85e1ceff
      • Instruction ID: 1457b004165583eaea689b8d4fcc9f6086d6447db155234aec96aa11e096858c
      • Opcode Fuzzy Hash: e7ac23272848459133b2d0125bdc58dc8fb57656d5e6b996dfe5d08b85e1ceff
      • Instruction Fuzzy Hash: 1621C12E20020557E66129749D1DBE97B31FB52E50FB217E8CDD34B149CB3E58876622
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6620271c83c3af26956161c390c00196c4c2a39d0c35edcf8884679e15d7b252
      • Instruction ID: 155cd203b044db4f7440ec096b449511930d3da808d7b8cbf1369cc02ea51778
      • Opcode Fuzzy Hash: 6620271c83c3af26956161c390c00196c4c2a39d0c35edcf8884679e15d7b252
      • Instruction Fuzzy Hash: E611E62E34110546A6700EB48D1C6EA7F72EB63E20EB287DCC9A34F206CB79890B1761
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c69fb94b1bf3075adb7994c5eca3e804ad7d0ad44206c0d1b85801531a571979
      • Instruction ID: 28a921002171a94842374679a80efc32656e9b4d9d3fee28eff063f533bcdb91
      • Opcode Fuzzy Hash: c69fb94b1bf3075adb7994c5eca3e804ad7d0ad44206c0d1b85801531a571979
      • Instruction Fuzzy Hash: 1921263A2083128FDB24AE3089A17EB7BF76FB47D0F87453D9C8697614C3698895C602
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ecea91578f9a2544f775d19aeb32f13d6a35c6d448c56a327aee055977c6b798
      • Instruction ID: 89fd839a096676c22eb1aa06f08321ed8d66f33516ca7027246bed252d336232
      • Opcode Fuzzy Hash: ecea91578f9a2544f775d19aeb32f13d6a35c6d448c56a327aee055977c6b798
      • Instruction Fuzzy Hash: 2C213275A093548FEB306F7988487EE3BB2AF05250FA5861DEC89D7104C3354D81CB56
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d8e999e6d28aed79e1eec5879337744cf354d4800818bafb4f7f71b7b9a11895
      • Instruction ID: d6cf6c71014bd2169cccee70322c51bc28db9e16b83e05027f874c62e05545dc
      • Opcode Fuzzy Hash: d8e999e6d28aed79e1eec5879337744cf354d4800818bafb4f7f71b7b9a11895
      • Instruction Fuzzy Hash: EE014F2F351A4547A9A11DB0992D9A27F30E727D107B35BD8C6934F10ACB399C0B6322
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8570a95ee61bc4094934489dcb01be9ed9eeca3c5c06a744fe9eccf026bacd7e
      • Instruction ID: 0f351b8dd3dbecea835303346d3036df2030eca3b607594761272b120ec20941
      • Opcode Fuzzy Hash: 8570a95ee61bc4094934489dcb01be9ed9eeca3c5c06a744fe9eccf026bacd7e
      • Instruction Fuzzy Hash: 17115736100349ABDF392E64CD583F93BA3BF01300F984068FDCA561A1DB2B8A948F52
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f5bbad0faebf7d940ce90532b74f6b99ea55c76544af7d9860ee715283e54f6f
      • Instruction ID: 60802d8070457c4bfeb95561b68c982199b8c638320e525340481195d00de7af
      • Opcode Fuzzy Hash: f5bbad0faebf7d940ce90532b74f6b99ea55c76544af7d9860ee715283e54f6f
      • Instruction Fuzzy Hash: 13F04C71A843418BE7305BB9891C7ED76E5EF46330FA580ADDCD057105D3B84E818FA2
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 06a53d7d1a06cf9230bb7546d8df446362275eaccb71a4a86b344212b17563fb
      • Instruction ID: a6c6952002dbe36ef9e1b89844edf44a3bdcd956948cffb9890faaacc2ea1036
      • Opcode Fuzzy Hash: 06a53d7d1a06cf9230bb7546d8df446362275eaccb71a4a86b344212b17563fb
      • Instruction Fuzzy Hash: 75C08C39A00101CBCF62EA44C298FA037A2BF18B20BD004E4B10AC7695C369E800CB00
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000001.00000002.738021580.0000000002B60000.00000040.00000001.sdmp, Offset: 02B60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2b60000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a8cf436a64781ee52d23abc6cff6e1e2b4e853e1048bc0dcc5c33c7b6f5396e9
      • Instruction ID: 8e47758ab5ef3be3cbd1671ea9c81323a5d2d9d8fcb0bbe724f5d3c8cb41574a
      • Opcode Fuzzy Hash: a8cf436a64781ee52d23abc6cff6e1e2b4e853e1048bc0dcc5c33c7b6f5396e9
      • Instruction Fuzzy Hash: 52C08CB3A019828BEF12CA28C588B407360EF28B24F8A00D0E803CF711E224EC00CF01
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1147 41f5f0-41f699 __vbaStrCopy * 2 #515 __vbaVarTstNe __vbaFreeVar 1148 41f722-41f729 1147->1148 1149 41f69f-41f6a5 1147->1149 1152 41f740-41f764 __vbaObjSet 1148->1152 1153 41f72b-41f73b __vbaNew2 1148->1153 1150 41f6b7-41f6cb 1149->1150 1151 41f6a7-41f6b1 __vbaNew2 1149->1151 1156 41f6cd-41f6d6 __vbaHresultCheckObj 1150->1156 1157 41f6dc-41f6f9 1150->1157 1151->1150 1159 41f775-41f7c6 __vbaFreeObj __vbaFreeStr * 3 1152->1159 1160 41f766-41f76f __vbaHresultCheckObj 1152->1160 1153->1152 1156->1157 1163 41f6fb-41f704 __vbaHresultCheckObj 1157->1163 1164 41f70a-41f71c __vbaStrMove __vbaFreeObj 1157->1164 1160->1159 1163->1164 1164->1148
      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041F645
      • __vbaStrCopy.MSVBVM60 ref: 0041F64F
      • #515.MSVBVM60(?,?,00000002), ref: 0041F668
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041F684
      • __vbaFreeVar.MSVBVM60 ref: 0041F690
      • __vbaNew2.MSVBVM60(00402BC4,004213C0), ref: 0041F6B1
      • __vbaHresultCheckObj.MSVBVM60(00000000,02A4EDD4,00402BB4,0000004C), ref: 0041F6D6
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402F2C,00000024), ref: 0041F704
      • __vbaStrMove.MSVBVM60 ref: 0041F713
      • __vbaFreeObj.MSVBVM60 ref: 0041F71C
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041F735
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F74E
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,00000068), ref: 0041F76F
      • __vbaFreeObj.MSVBVM60 ref: 0041F77E
      • __vbaFreeStr.MSVBVM60(0041F7C7), ref: 0041F7BA
      • __vbaFreeStr.MSVBVM60 ref: 0041F7BF
      • __vbaFreeStr.MSVBVM60 ref: 0041F7C4
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$Free$CheckHresult$CopyNew2$#515Move
      • String ID: CAREENING$Monascidian$var
      • API String ID: 860825397-1736873049
      • Opcode ID: 78ea30ab12c7f20767e5714ffd9ca992d0b1893639dda74fb39581b790f3edca
      • Instruction ID: ab013336a3f730676e49ee436d7681ce630f158b2661c41e02ea5700158ca2ed
      • Opcode Fuzzy Hash: 78ea30ab12c7f20767e5714ffd9ca992d0b1893639dda74fb39581b790f3edca
      • Instruction Fuzzy Hash: 90513B75D40249AFCB14DF94DD88EDEBBB8FF58700F20452AE501B72A0D7785986CBA8
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1165 41f990-41fa39 __vbaVarDup #522 __vbaVarTstNe __vbaFreeVarList 1166 41fb68-41fb6f 1165->1166 1167 41fa3f-41fa53 1165->1167 1168 41fb71-41fb81 __vbaNew2 1166->1168 1169 41fb86-41fbad __vbaObjSet 1166->1169 1171 41fa55-41fa61 __vbaHresultCheckObj 1167->1171 1172 41fa67-41fa6d 1167->1172 1168->1169 1179 41fbc1-41fc10 __vbaFreeObj 1169->1179 1180 41fbaf-41fbbb __vbaHresultCheckObj 1169->1180 1171->1172 1174 41fa7f-41fa8c 1172->1174 1175 41fa6f-41fa79 __vbaNew2 1172->1175 1176 41faa3-41faca __vbaObjSet 1174->1176 1177 41fa8e-41fa9e __vbaNew2 1174->1177 1175->1174 1184 41facc-41fad8 __vbaHresultCheckObj 1176->1184 1185 41fade-41fb2e __vbaLateIdCallLd __vbaStrVarMove __vbaStrMove __vbaObjSet 1176->1185 1177->1176 1180->1179 1184->1185 1187 41fb30-41fb39 __vbaHresultCheckObj 1185->1187 1188 41fb3f-41fb62 __vbaFreeStr __vbaFreeObjList __vbaFreeVar 1185->1188 1187->1188 1188->1166
      APIs
      • __vbaVarDup.MSVBVM60 ref: 0041F9F0
      • #522.MSVBVM60(?,?), ref: 0041F9FE
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041FA1A
      • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041FA2D
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,004025E4,00000160), ref: 0041FA61
      • __vbaNew2.MSVBVM60(00402BC4,004213C0), ref: 0041FA79
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041FA98
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041FAB1
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,00000120), ref: 0041FAD8
      • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 0041FAF6
      • __vbaStrVarMove.MSVBVM60(00000000), ref: 0041FB00
      • __vbaStrMove.MSVBVM60 ref: 0041FB0B
      • __vbaObjSet.MSVBVM60(?,?,00000000), ref: 0041FB17
      • __vbaHresultCheckObj.MSVBVM60(00000000,02A4EDD4,00402BB4,00000040), ref: 0041FB39
      • __vbaFreeStr.MSVBVM60 ref: 0041FB42
      • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 0041FB56
      • __vbaFreeVar.MSVBVM60 ref: 0041FB62
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041FB7B
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041FB94
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C2C,000000E8), ref: 0041FBBB
      • __vbaFreeObj.MSVBVM60 ref: 0041FBCA
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$Free$CheckHresult$New2$ListMove$#522CallLate
      • String ID:
      • API String ID: 3206667697-0
      • Opcode ID: fb49b3570186712d0c2942a5865ab00bfb1c4c4ff545ed7e8288df97fef1809a
      • Instruction ID: 0ef622d1a4087add27c18ae658be6b115eeec513ba9468ada49728a259804a29
      • Opcode Fuzzy Hash: fb49b3570186712d0c2942a5865ab00bfb1c4c4ff545ed7e8288df97fef1809a
      • Instruction Fuzzy Hash: 63612BB1900249AFDB14DF94DD88EDEBBB8FF48300F50452AF545B32A0D7785589CB68
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041EF12
      • __vbaI4Str.MSVBVM60(00402E7C), ref: 0041EF1D
      • #697.MSVBVM60(00000000), ref: 0041EF24
      • __vbaStrMove.MSVBVM60 ref: 0041EF2F
      • __vbaStrCmp.MSVBVM60(00402B74,00000000), ref: 0041EF3B
      • __vbaFreeStr.MSVBVM60 ref: 0041EF4E
      • __vbaNew2.MSVBVM60(00402BC4,004213C0), ref: 0041EF6F
      • __vbaHresultCheckObj.MSVBVM60(00000000,02A4EDD4,00402BB4,0000001C), ref: 0041EF94
      • __vbaCastObj.MSVBVM60(?,00402D58), ref: 0041EFC8
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041EFD3
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402E9C,00000058), ref: 0041EFED
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041EFFD
      • __vbaFreeObj.MSVBVM60(0041F044), ref: 0041F034
      • __vbaFreeStr.MSVBVM60 ref: 0041F03D
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$Free$CheckHresult$#697CastCopyListMoveNew2
      • String ID:
      • API String ID: 1550409211-0
      • Opcode ID: eb942d619078aeddeec77cbca8f8ac1bbe37223c7a681ce9cf62d6d8140f17ee
      • Instruction ID: 722be8caad980de399cdea0b4a29fa962d30c82995a96d39400d53a0891d9ad6
      • Opcode Fuzzy Hash: eb942d619078aeddeec77cbca8f8ac1bbe37223c7a681ce9cf62d6d8140f17ee
      • Instruction Fuzzy Hash: 6F416D70D40245AFCB04DF95DA49ADEBBB8FF58701F10812AF942F72A0D7785985CBA8
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1202 41ed80-41ee05 #591 __vbaStrMove __vbaStrCmp __vbaFreeStr __vbaFreeVar 1203 41ee07-41ee0e 1202->1203 1204 41ee6f-41ee93 1202->1204 1205 41ee10-41ee20 __vbaNew2 1203->1205 1206 41ee25-41ee4c __vbaObjSet 1203->1206 1205->1206 1210 41ee60-41ee69 __vbaFreeObj 1206->1210 1211 41ee4e-41ee5a __vbaHresultCheckObj 1206->1211 1210->1204 1211->1210
      APIs
      • #591.MSVBVM60(?), ref: 0041EDC9
      • __vbaStrMove.MSVBVM60 ref: 0041EDD4
      • __vbaStrCmp.MSVBVM60(Integer,00000000), ref: 0041EDE0
      • __vbaFreeStr.MSVBVM60 ref: 0041EDF3
      • __vbaFreeVar.MSVBVM60 ref: 0041EDFC
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041EE1A
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041EE33
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000080), ref: 0041EE5A
      • __vbaFreeObj.MSVBVM60 ref: 0041EE69
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$Free$#591CheckHresultMoveNew2
      • String ID: Integer$KK
      • API String ID: 609433361-2898439456
      • Opcode ID: 928d0957fc26e24ae36358753a1968918cd7998fb515b05cc8f1c54212181cc4
      • Instruction ID: 6133db0a354fa35f7d31807db24cba90a3e7d3ad9a0a26be86770ae79bfc40c6
      • Opcode Fuzzy Hash: 928d0957fc26e24ae36358753a1968918cd7998fb515b05cc8f1c54212181cc4
      • Instruction Fuzzy Hash: 2C218F759402159BCB10DF95DD49FEEBBB8FB58700F104026E942F32A0D7785945CBA9
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • #606.MSVBVM60(00000001,?), ref: 0041F514
      • __vbaStrMove.MSVBVM60 ref: 0041F51F
      • __vbaStrCmp.MSVBVM60(00402BA0,00000000), ref: 0041F52B
      • __vbaFreeStr.MSVBVM60 ref: 0041F53E
      • __vbaFreeVar.MSVBVM60 ref: 0041F547
      • __vbaNew2.MSVBVM60(00402BC4,004213C0), ref: 0041F564
      • __vbaObjSetAddref.MSVBVM60(?,00401218), ref: 0041F57A
      • __vbaHresultCheckObj.MSVBVM60(00000000,02A4EDD4,00402BB4,00000010), ref: 0041F597
      • __vbaFreeObj.MSVBVM60 ref: 0041F5A0
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$Free$#606AddrefCheckHresultMoveNew2
      • String ID:
      • API String ID: 2885364696-3916222277
      • Opcode ID: f3d2ae090de1fede9ce56962be37397b8fcfda2fa62de1a124af6d45ed8b3169
      • Instruction ID: 304de142ec2372348ca09147cb8754b516c76a1b047d4a0b207708428015a1a7
      • Opcode Fuzzy Hash: f3d2ae090de1fede9ce56962be37397b8fcfda2fa62de1a124af6d45ed8b3169
      • Instruction Fuzzy Hash: 9C216075900255AFCB00DFA4DE89AEEBBB8FF08705F50412AE942F36A1D7781945CF98
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • #538.MSVBVM60(?,000007DB,0000000B,0000000B), ref: 0041EC71
      • #557.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EC7B
      • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EC98
      • #570.MSVBVM60(0000004F,?,?,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041ECA1
      • __vbaNew2.MSVBVM60(00401C84,00421010,?,?,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041ECBA
      • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041ECD3
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BF8,00000158), ref: 0041ECFA
      • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 0041ED0A
      • __vbaI4Var.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041ED14
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041ED27
      • __vbaFreeVar.MSVBVM60 ref: 0041ED33
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$Free$#538#557#570CallCheckHresultLateListNew2
      • String ID:
      • API String ID: 729259385-0
      • Opcode ID: 02611bac101a4858a0bb6d2bdef537d6c9e7b82122826640fd25e670cd58bbf4
      • Instruction ID: 24abf2e7a8989ff15148d6cf4ef91e85c298b9e8f6062372e1376e18f3afecf8
      • Opcode Fuzzy Hash: 02611bac101a4858a0bb6d2bdef537d6c9e7b82122826640fd25e670cd58bbf4
      • Instruction Fuzzy Hash: 82319C74940245AFCB10DBA5DD89EEEB7B8FF98B00F14442AF542B72A0D7785485CB68
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041FC82
      • __vbaVarDup.MSVBVM60 ref: 0041FC9C
      • #528.MSVBVM60(?,?), ref: 0041FCAA
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041FCC6
      • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041FCD9
      • __vbaNew2.MSVBVM60(00402BC4,004213C0), ref: 0041FCF9
      • __vbaHresultCheckObj.MSVBVM60(00000000,02A4EDD4,00402BB4,0000001C), ref: 0041FD1E
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402E9C,00000050), ref: 0041FD3E
      • __vbaFreeObj.MSVBVM60 ref: 0041FD47
      • __vbaFreeStr.MSVBVM60(0041FD7F), ref: 0041FD78
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$Free$CheckHresult$#528CopyListNew2
      • String ID:
      • API String ID: 1123914322-0
      • Opcode ID: 26f2a962e7644463aba4889c028640b8a3266038c7f441d34674a6900d6bd686
      • Instruction ID: daa61bb5593ba9e6d786f72eca0b6145d07f1c006afdafe557e4bbafb1960a5f
      • Opcode Fuzzy Hash: 26f2a962e7644463aba4889c028640b8a3266038c7f441d34674a6900d6bd686
      • Instruction Fuzzy Hash: 9C314A74D00249ABCB04DF95D949AEEFBB8FF58704F10802AE512B72A0D7B8554ACF94
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041EA5D
      • __vbaI4Str.MSVBVM60(00402E7C), ref: 0041EA68
      • #698.MSVBVM60(?,00000000), ref: 0041EA73
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041EA8F
      • __vbaFreeVar.MSVBVM60 ref: 0041EA9A
      • #569.MSVBVM60(00000068), ref: 0041EAA7
      • __vbaFreeStr.MSVBVM60(0041EAD9), ref: 0041EAD2
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$Free$#569#698Copy
      • String ID: G*
      • API String ID: 3581547392-626655979
      • Opcode ID: 67d9f4a6444ba2c249f004cc89a7060a41d57fb845bf95828e3de9892a974614
      • Instruction ID: 89edc167916361620c3bc3e5e764da1cc7e7f352d06193df80b95097fccb978a
      • Opcode Fuzzy Hash: 67d9f4a6444ba2c249f004cc89a7060a41d57fb845bf95828e3de9892a974614
      • Instruction Fuzzy Hash: AD114CB5C002499BCB10DFA5DA49ADEFBB8FF48700F10C12AE512B36A0D7B85549CF65
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • #693.MSVBVM60(00402B74), ref: 0041E8C7
      • #685.MSVBVM60 ref: 0041E8D5
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041E8E6
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041E91F
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041E938
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000001A8), ref: 0041E95E
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402E68,00000044), ref: 0041E991
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041E9A1
      • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0041E9B9
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$CheckFreeHresultList$#685#693New2
      • String ID:
      • API String ID: 587155547-0
      • Opcode ID: 633335c55037173fdfa804b0530e133147a6988a2768c7ebec95ea0030eb2017
      • Instruction ID: f00e1fd5caf2b0181bcd04a8dce6936be41d92387c23762ebf0bb613b5a2ef68
      • Opcode Fuzzy Hash: 633335c55037173fdfa804b0530e133147a6988a2768c7ebec95ea0030eb2017
      • Instruction Fuzzy Hash: 1D4128B1D00208AFCB14DFD9C988AEEBBB8FB48700F50842AF655F7290D6785946CF65
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041F363
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F37C
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000224), ref: 0041F403
      • __vbaFreeObj.MSVBVM60 ref: 0041F412
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041F427
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F440
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000000D0), ref: 0041F467
      • __vbaFreeObj.MSVBVM60 ref: 0041F476
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$CheckFreeHresultNew2
      • String ID:
      • API String ID: 1645334062-0
      • Opcode ID: ecae6a0964fab977ee891d4616a99a1c1848f5bc2adebada6a247037e02e5d5b
      • Instruction ID: f518913095c4270323d944241a2a6a507406ab3ca89c3e53bf2ed0b5ccd302c9
      • Opcode Fuzzy Hash: ecae6a0964fab977ee891d4616a99a1c1848f5bc2adebada6a247037e02e5d5b
      • Instruction Fuzzy Hash: 75413C74A00215AFCB14DFA9C989E9ABBF8FF48700F10846AE445F7365D7789846CF94
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041FDF3
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041FE12
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041FE2E
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041FE47
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,000000E8), ref: 0041FE6A
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000001EC), ref: 0041FEAA
      • __vbaFreeStr.MSVBVM60 ref: 0041FEB3
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041FEC3
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$CheckFreeHresultNew2$List
      • String ID:
      • API String ID: 2509323985-0
      • Opcode ID: 82801fa06d98f8988d36847560587581e44ee3641b07330358fe5bd3b32fb3fa
      • Instruction ID: 265576681f73253530fb7b58b4160c65502e49ebb5ab9e41163a1b3c46cec712
      • Opcode Fuzzy Hash: 82801fa06d98f8988d36847560587581e44ee3641b07330358fe5bd3b32fb3fa
      • Instruction Fuzzy Hash: 04314FB0A00255AFC710DFA8CD49F9E7BF8FB08700F10856AF545F7661D77899468BA4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041F1D7
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F1F6
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041F212
      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F22B
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402C1C,00000198), ref: 0041F24E
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000001EC), ref: 0041F28E
      • __vbaFreeStr.MSVBVM60 ref: 0041F297
      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0041F2A7
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$CheckFreeHresultNew2$List
      • String ID:
      • API String ID: 2509323985-0
      • Opcode ID: 76338486432618879145626e36be3a5f32a91823a4f1c9a40455ccdfd6de1234
      • Instruction ID: 5e207c2f6b8576daa31851fab6e0fb0103df42e13183a89598496eaa42773502
      • Opcode Fuzzy Hash: 76338486432618879145626e36be3a5f32a91823a4f1c9a40455ccdfd6de1234
      • Instruction Fuzzy Hash: 5D319EB4A00244AFC700DFA4DD89FDE7BB8FB48700F20447AF505F72A1D67999468B68
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • #713.MSVBVM60(00402E88,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EB45
      • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EB50
      • __vbaStrCmp.MSVBVM60(00402E94,00000000,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EB5C
      • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EB6F
      • __vbaNew2.MSVBVM60(00402BC4,004213C0,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EB8C
      • __vbaHresultCheckObj.MSVBVM60(00000000,02A4EDD4,00402BB4,0000001C,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EBB1
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402E9C,00000050,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EBD1
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041EBDA
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$CheckFreeHresult$#713MoveNew2
      • String ID:
      • API String ID: 1476637831-0
      • Opcode ID: 4d667a37001f0543297e708ab74c34aee23688e8af34de10aed96200e9671c48
      • Instruction ID: 7675fae8713c1bfda72cddb46bf5bd1ab00edde875317590dd0da4c8a7fa4f3c
      • Opcode Fuzzy Hash: 4d667a37001f0543297e708ab74c34aee23688e8af34de10aed96200e9671c48
      • Instruction Fuzzy Hash: C2219F78940254ABCB14DFA5DD49EAEBBB8FF58B00F204027F942F72A0D7785941CB98
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • #592.MSVBVM60(?), ref: 0041F8C2
      • __vbaFreeVar.MSVBVM60 ref: 0041F8D9
      • __vbaNew2.MSVBVM60(00402BC4,004213C0), ref: 0041F8F7
      • __vbaHresultCheckObj.MSVBVM60(00000000,02A4EDD4,00402BB4,0000001C), ref: 0041F91C
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402E9C,00000050), ref: 0041F93C
      • __vbaFreeObj.MSVBVM60 ref: 0041F945
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$CheckFreeHresult$#592New2
      • String ID:
      • API String ID: 3172800638-0
      • Opcode ID: 68cf7300671ae7bb46869264f69b0088b4220fd4016c1b55e19b8e700e297f49
      • Instruction ID: 35cb48298b0ae76b1e98f088851a7fc6870521d39ecbd96e445180aafbea52e6
      • Opcode Fuzzy Hash: 68cf7300671ae7bb46869264f69b0088b4220fd4016c1b55e19b8e700e297f49
      • Instruction Fuzzy Hash: 8F21A774900255ABDB10EF94CE49FDE7BB8FF18B04F10002AF541F31A0D77858498BA8
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaVarDup.MSVBVM60 ref: 0042003A
      • #564.MSVBVM60(?,?), ref: 00420048
      • __vbaHresultCheck.MSVBVM60(00000000), ref: 00420053
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0042006F
      • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00420081
      • #568.MSVBVM60(00000093), ref: 00420094
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$#564#568CheckFreeHresultList
      • String ID:
      • API String ID: 1114338403-0
      • Opcode ID: 7dfba4ed05ac5f16e920f110de3f25a931f1c852470d521cdb49323efaf7def0
      • Instruction ID: 5ecfdba0441884d4dcd74d4b582ece85505d0c7e06da6db3a456bc2fab7b15fd
      • Opcode Fuzzy Hash: 7dfba4ed05ac5f16e920f110de3f25a931f1c852470d521cdb49323efaf7def0
      • Instruction Fuzzy Hash: B72113B5C00258EBDB00DFD4EA89ADDBFB8FB48B04F50411AF506BB290D7B45589CBA5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,004012C6), ref: 0041FF47
      • __vbaNew2.MSVBVM60(00401C84,00421010,?,?,?,?,?,?,?,004012C6), ref: 0041FF60
      • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,004012C6), ref: 0041FF79
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,00000208,?,?,?,?,?,?,?,004012C6), ref: 0041FF9C
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,004012C6), ref: 0041FFA5
      • __vbaFreeStr.MSVBVM60(0041FFC6,?,?,?,?,?,?,?,004012C6), ref: 0041FFBF
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$Free$CheckCopyHresultNew2
      • String ID:
      • API String ID: 4138333463-0
      • Opcode ID: 93773987456975d75316d28c2f282f5e0d1e684eab0bb57497dae8213c174309
      • Instruction ID: 71be9adc1c66374da049f240537449594785c1c803ced8c78d88efe321110156
      • Opcode Fuzzy Hash: 93773987456975d75316d28c2f282f5e0d1e684eab0bb57497dae8213c174309
      • Instruction Fuzzy Hash: FF118F74540244ABC710DF94DE89FEF7BB8AB58701F20442AF542F36A0D7785986CBA9
      Uniqueness

      Uniqueness Score: -1.00%

      C-Code - Quality: 17%
      			E0041F070(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
      				char _v8;
      				intOrPtr _v12;
      				intOrPtr _v16;
      				char _v28;
      				char _v32;
      				char _v36;
      				intOrPtr _v40;
      				intOrPtr _v48;
      				intOrPtr* _t21;
      				intOrPtr* _t23;
      				intOrPtr* _t25;
      				void* _t28;
      				intOrPtr* _t30;
      				intOrPtr* _t40;
      				void* _t41;
      				void* _t43;
      				intOrPtr _t44;
      				intOrPtr _t45;
      
      				_t44 = _t43 - 0xc;
      				 *[fs:0x0] = _t44;
      				_t45 = _t44 - 0x2c;
      				_v16 = _t45;
      				_v12 = 0x4011e8;
      				_v8 = 0;
      				_t21 = _a4;
      				 *((intOrPtr*)( *_t21 + 4))(_t21, __edi, __esi, __ebx,  *[fs:0x0], 0x4012c6, _t41);
      				_t23 =  *0x421010; // 0x5e2090
      				_v32 = 0;
      				_v28 = 0;
      				_v36 = 0;
      				if(_t23 == 0) {
      					__imp____vbaNew2(0x401c84, 0x421010);
      					_t23 =  *0x421010; // 0x5e2090
      				}
      				_t25 =  &_v36;
      				__imp____vbaObjSet(_t25,  *((intOrPtr*)( *_t23 + 0x318))(_t23));
      				_t30 = _t45 - 0x10;
      				 *_t30 = 0xa;
      				_t40 = _t25;
      				 *((intOrPtr*)(_t30 + 4)) = _v48;
      				 *((intOrPtr*)(_t30 + 8)) = 0x80020004;
      				 *((intOrPtr*)(_t30 + 0xc)) = _v40;
      				_t28 =  *((intOrPtr*)( *_t40 + 0x1ec))(_t40, L"Skottehistorien");
      				asm("fclex");
      				if(_t28 < 0) {
      					__imp____vbaHresultCheckObj(_t28, _t40, 0x402bd4, 0x1ec);
      				}
      				__imp____vbaFreeObj();
      				_v32 = 0x99500000;
      				_v28 = 0x4202a36b;
      				asm("wait");
      				_push(0x41f154);
      				return _t28;
      			}





















      0x0041f073
      0x0041f082
      0x0041f089
      0x0041f08f
      0x0041f092
      0x0041f09b
      0x0041f09e
      0x0041f0a4
      0x0041f0a7
      0x0041f0ae
      0x0041f0b1
      0x0041f0b4
      0x0041f0b7
      0x0041f0c3
      0x0041f0c9
      0x0041f0c9
      0x0041f0d8
      0x0041f0dc
      0x0041f0e5
      0x0041f0ec
      0x0041f0f1
      0x0041f0f5
      0x0041f0fd
      0x0041f109
      0x0041f10c
      0x0041f112
      0x0041f116
      0x0041f124
      0x0041f124
      0x0041f12d
      0x0041f133
      0x0041f13a
      0x0041f141
      0x0041f142
      0x00000000

      APIs
      • __vbaNew2.MSVBVM60(00401C84,00421010,?,?,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041F0C3
      • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041F0DC
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000001EC), ref: 0041F124
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004012C6), ref: 0041F12D
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$CheckFreeHresultNew2
      • String ID: Skottehistorien
      • API String ID: 1645334062-3067532313
      • Opcode ID: 01da7776b9487827f5003c777402ba1380033da356e87f28f0f9c95ad386f8b0
      • Instruction ID: aa24143507985dcb2a8eeb3f831779061b23ed3e318f68c1992da7b401c6ecbc
      • Opcode Fuzzy Hash: 01da7776b9487827f5003c777402ba1380033da356e87f28f0f9c95ad386f8b0
      • Instruction Fuzzy Hash: E2213E70A40244ABCB04DFA9C989ADABBF8FB59700F10846AE505F72A1D77899458F94
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00401C84,00421010), ref: 0041E7C3
      • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 0041E7DC
      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00402BD4,000001EC), ref: 0041E824
      • __vbaFreeObj.MSVBVM60 ref: 0041E82D
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$CheckFreeHresultNew2
      • String ID: weet
      • API String ID: 1645334062-3595723829
      • Opcode ID: 242114ef20f6e9b1156f601307df7a1a41395db0388f6c49c0bea7ee59078b4a
      • Instruction ID: 8b5f8d096aaec732dc64b07e4e46dccd5fec2a3f57bdf89ad79a7e1254b2ca22
      • Opcode Fuzzy Hash: 242114ef20f6e9b1156f601307df7a1a41395db0388f6c49c0bea7ee59078b4a
      • Instruction Fuzzy Hash: 0B117FB4A00245AFD704EFA9C949F9ABBF8FB08700F10842AF945F76A0D77859418BD5
      Uniqueness

      Uniqueness Score: -1.00%

      C-Code - Quality: 20%
      			E0041F7F0(intOrPtr* _a4) {
      				intOrPtr _v8;
      				intOrPtr _v12;
      				intOrPtr _v16;
      				intOrPtr _v24;
      				intOrPtr* _t13;
      				signed char _t14;
      				intOrPtr* _t15;
      				void* _t18;
      				void* _t23;
      				void* _t25;
      				intOrPtr _t27;
      
      				 *[fs:0x0] = _t27;
      				_v16 = _t27 - 0x18;
      				_v12 = 0x401240;
      				_v8 = 0;
      				_t13 = _a4;
      				_t14 =  *((intOrPtr*)( *_t13 + 4))(_t13, _t23, _t25, _t18,  *[fs:0x0], 0x4012c6);
      				__imp____vbaR4Str(0x402f40);
      				asm("fcomp dword [0x401238]");
      				asm("fnstsw ax");
      				if((_t14 & 0x00000040) == 0) {
      					__imp____vbaFileOpen(0x20, 0xffffffff, 0x30, L"imprejudice");
      				}
      				_t15 = _a4;
      				 *((intOrPtr*)( *_t15 + 8))(_t15);
      				 *[fs:0x0] = _v24;
      				return _v8;
      			}














      0x0041f802
      0x0041f80f
      0x0041f812
      0x0041f819
      0x0041f820
      0x0041f826
      0x0041f82e
      0x0041f834
      0x0041f83a
      0x0041f83f
      0x0041f84c
      0x0041f84c
      0x0041f852
      0x0041f858
      0x0041f863
      0x0041f86e

      APIs
      • __vbaR4Str.MSVBVM60(00402F40,?,?,?,?,?,?,?,?,004012C6), ref: 0041F82E
      • __vbaFileOpen.MSVBVM60(00000020,000000FF,00000030,imprejudice,?,?,?,?,?,?,?,?,004012C6), ref: 0041F84C
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: __vba$FileOpen
      • String ID: imprejudice
      • API String ID: 1444369698-3142114848
      • Opcode ID: dcfd7739af887f63779cc7f9cddc81069eaa02b89360733ddb1e2832f69ea373
      • Instruction ID: c3d2013679ca875341305e04cb1851d4a4eec9860b4b668a021dd8150d18ddfa
      • Opcode Fuzzy Hash: dcfd7739af887f63779cc7f9cddc81069eaa02b89360733ddb1e2832f69ea373
      • Instruction Fuzzy Hash: 66018F75A40204EFC700DF98DA49F4ABBB8FB48B51F1082AAF945B77E0C7B85940CB95
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 00420134
      • #532.MSVBVM60(Emotionen3), ref: 00420144
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.732106946.000000000041B000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.731931619.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000001.00000002.731949710.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000001.00000002.732154968.0000000000421000.00000004.00020000.sdmp Download File
      • Associated: 00000001.00000002.732171971.0000000000423000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_FACTURA Y ALBARANES (2).jbxd
      Similarity
      • API ID: #532__vba
      • String ID: Emotionen3
      • API String ID: 1414456671-3255538820
      • Opcode ID: acf762c993f483e184547f9bae952c285327626bd03eabf389bd01ff9536b5a9
      • Instruction ID: b15ad1656fa039549e3912ed06df6950b1a7d66bd520fb4e3012a07771b0ef1b
      • Opcode Fuzzy Hash: acf762c993f483e184547f9bae952c285327626bd03eabf389bd01ff9536b5a9
      • Instruction Fuzzy Hash: F8F012B4941248ABCB10DF94DA4DBDEBBF8FB18745F60405EF501722D1C7B91A098F69
      Uniqueness

      Uniqueness Score: -1.00%