Loading ...

Play interactive tourEdit tour

Analysis Report Facturas Pagadas al Vencimiento 6.exe

Overview

General Information

Sample Name:Facturas Pagadas al Vencimiento 6.exe
Analysis ID:433003
MD5:78c3e32a156e44865fcdf53b4783265b
SHA1:02f175cb27dcf85b810f40d3c0adc66de1467ca0
SHA256:4d1b07efb6e87b7c1379fc8f9eacef7443c54a57ab8e9d50c98053193316fd91
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Detected potential crypto function
Found large amount of non-executed APIs
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=1ZXsoOW_y-1MUyiIhdhOWNmzZqI-by8yY"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
Facturas Pagadas al Vencimiento 6.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: Facturas Pagadas al Vencimiento 6.exeMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1ZXsoOW_y-1MUyiIhdhOWNmzZqI-by8yY"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: Facturas Pagadas al Vencimiento 6.exeVirustotal: Detection: 51%Perma Link
    Source: Facturas Pagadas al Vencimiento 6.exeMetadefender: Detection: 40%Perma Link
    Source: Facturas Pagadas al Vencimiento 6.exeReversingLabs: Detection: 79%
    Source: Facturas Pagadas al Vencimiento 6.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1ZXsoOW_y-1MUyiIhdhOWNmzZqI-by8yY

    System Summary:

    barindex
    Potential malicious icon foundShow sources
    Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeProcess Stats: CPU usage > 98%
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0219BE780_2_0219BE78
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0219A4800_2_0219A480
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_021946D00_2_021946D0
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_021A0B0B0_2_021A0B0B
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0219350B0_2_0219350B
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0219355C0_2_0219355C
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_021935A90_2_021935A9
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_021973A20_2_021973A2
    Source: Facturas Pagadas al Vencimiento 6.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: Facturas Pagadas al Vencimiento 6.exe, 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAerogun6.exe vs Facturas Pagadas al Vencimiento 6.exe
    Source: Facturas Pagadas al Vencimiento 6.exeBinary or memory string: OriginalFilenameAerogun6.exe vs Facturas Pagadas al Vencimiento 6.exe
    Source: Facturas Pagadas al Vencimiento 6.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: classification engineClassification label: mal92.rans.troj.evad.winEXE@1/0@0/0
    Source: Facturas Pagadas al Vencimiento 6.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Facturas Pagadas al Vencimiento 6.exeVirustotal: Detection: 51%
    Source: Facturas Pagadas al Vencimiento 6.exeMetadefender: Detection: 40%
    Source: Facturas Pagadas al Vencimiento 6.exeReversingLabs: Detection: 79%

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: Facturas Pagadas al Vencimiento 6.exe, type: SAMPLE
    Source: Yara matchFile source: 0.2.Facturas Pagadas al Vencimiento 6.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.0.Facturas Pagadas al Vencimiento 6.exe.400000.0.unpack, type: UNPACKEDPE
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0040CA38 push ecx; ret 0_2_0040CAE8
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_00406AE6 push ecx; ret 0_2_00406AE7
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_004064F2 push esp; retf 0_2_004064F3
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_00409F62 push esp; iretd 0_2_00409F63
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0040A938 push edi; ret 0_2_0040A940
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0219404C push FFFFFFC2h; retn 0004h0_2_021940B4
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion:

    barindex
    Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_02199C17 0_2_02199C17
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0219BE78 0_2_0219BE78
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_021A0B0B 0_2_021A0B0B
    Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeRDTSC instruction interceptor: First address: 000000000219ACD5 second address: 000000000219ACD5 instructions:
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeRDTSC instruction interceptor: First address: 000000000219AEBC second address: 000000000219AEBC instructions:
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeRDTSC instruction interceptor: First address: 000000000219A977 second address: 000000000219AA85 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 cmp edx, ebx 0x00000005 pushad 0x00000006 cmp dword ptr [ebp+0000014Ch], 00000000h 0x0000000d jne 00007F7CCC4CF4FAh 0x00000013 test ch, ch 0x00000015 mov eax, 2FD9C07Bh 0x0000001a nop 0x0000001b xor eax, 7E315320h 0x00000020 jmp 00007F7CCC4CF19Eh 0x00000022 test cx, cx 0x00000025 test dx, ax 0x00000028 xor eax, 1C1E277Ah 0x0000002d sub eax, 4DF6AEE8h 0x00000032 mov dword ptr [ebp+00000280h], esi 0x00000038 cmp edx, edx 0x0000003a mov esi, DA7E1005h 0x0000003f cmp ah, ch 0x00000041 xor esi, 59F02A12h 0x00000047 test dl, al 0x00000049 cmp bl, al 0x0000004b sub esi, D3DBBFD6h 0x00000051 sub esi, AFB279D5h 0x00000057 jmp 00007F7CCC4CF1A2h 0x00000059 test cl, bl 0x0000005b push esi 0x0000005c test bx, ax 0x0000005f mov esi, dword ptr [ebp+00000280h] 0x00000065 push 85A6F362h 0x0000006a cmp al, bl 0x0000006c pushad 0x0000006d mov eax, 000000B6h 0x00000072 rdtsc
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeRDTSC instruction interceptor: First address: 000000000219ACD5 second address: 000000000219ACD5 instructions:
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeRDTSC instruction interceptor: First address: 000000000219AEBC second address: 000000000219AEBC instructions:
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeRDTSC instruction interceptor: First address: 000000000219F9E7 second address: 000000000219FA7C instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b cmp ecx, ecx 0x0000000d cmp ebx, eax 0x0000000f test ecx, ebx 0x00000011 test al, 39h 0x00000013 mov esi, 33B6F880h 0x00000018 cmp edi, 44CF2B59h 0x0000001e xor esi, 8B0C370Ch 0x00000024 cmp dh, ah 0x00000026 xor esi, 7DFB8F97h 0x0000002c cmp ch, dh 0x0000002e cmp bx, cx 0x00000031 xor esi, C541B01Bh 0x00000037 test esi, 0E27938Eh 0x0000003d jmp 00007F7CCC39BE0Eh 0x0000003f cmp dh, ch 0x00000041 cmp eax, ebx 0x00000043 cmp cl, dl 0x00000045 pushad 0x00000046 lfence 0x00000049 rdtsc
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeRDTSC instruction interceptor: First address: 000000000219FBC7 second address: 000000000219FCD9 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov eax, dword ptr [ebp+0000019Eh] 0x00000011 cmp ecx, ecx 0x00000013 push AE5BC5C3h 0x00000018 jmp 00007F7CCC4CF19Eh 0x0000001a cmp di, 6510h 0x0000001f add dword ptr [esp], FF06270Bh 0x00000026 xor dword ptr [esp], BF9532A6h 0x0000002d test bx, bx 0x00000030 test ebx, ecx 0x00000032 add dword ptr [esp], ED0B2198h 0x00000039 cmp bh, ch 0x0000003b mov dword ptr [ebp+000001A2h], ecx 0x00000041 mov ecx, esi 0x00000043 push ecx 0x00000044 cmp dh, ah 0x00000046 mov ecx, dword ptr [ebp+000001A2h] 0x0000004c cmp ch, dh 0x0000004e cmp bx, cx 0x00000051 test esi, 54BF3FE2h 0x00000057 mov dword ptr [ebp+000001F2h], edi 0x0000005d mov edi, 6ABD3267h 0x00000062 jmp 00007F7CCC4CF19Eh 0x00000064 cmp dh, ch 0x00000066 cmp eax, ebx 0x00000068 xor edi, 005A9092h 0x0000006e cmp cl, dl 0x00000070 xor edi, 0D36FEAFh 0x00000076 pushad 0x00000077 lfence 0x0000007a rdtsc
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeRDTSC instruction interceptor: First address: 000000000219FF21 second address: 000000000219FF5C instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 mov dword ptr [ebp+00000172h], edx 0x00000009 mov edx, ecx 0x0000000b push edx 0x0000000c test bl, bl 0x0000000e mov edx, dword ptr [ebp+00000172h] 0x00000014 cmp ch, 00000072h 0x00000017 cmp ax, cx 0x0000001a mov dword ptr [ebp+000001E9h], ecx 0x00000020 mov ecx, esi 0x00000022 push ecx 0x00000023 test ecx, 875BEF8Bh 0x00000029 mov ecx, dword ptr [ebp+000001E9h] 0x0000002f cmp edi, 715ED056h 0x00000035 pushad 0x00000036 mov edx, 0000005Ch 0x0000003b rdtsc
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_02199C17 rdtsc 0_2_02199C17
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeAPI coverage: 5.1 %
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

    Anti Debugging:

    barindex
    Found potential dummy code loops (likely to delay analysis)Show sources
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeProcess Stats: CPU usage > 90% for more than 60s
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_02199C17 rdtsc 0_2_02199C17
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0219F023 mov eax, dword ptr fs:[00000030h]0_2_0219F023
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_0219F6FE mov eax, dword ptr fs:[00000030h]0_2_0219F6FE
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_021A0B0B mov eax, dword ptr fs:[00000030h]0_2_021A0B0B
    Source: C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exeCode function: 0_2_02199B01 mov eax, dword ptr fs:[00000030h]0_2_02199B01
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: Facturas Pagadas al Vencimiento 6.exe, 00000000.00000002.721351172.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: Facturas Pagadas al Vencimiento 6.exe, 00000000.00000002.721351172.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: Facturas Pagadas al Vencimiento 6.exe, 00000000.00000002.721351172.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: Facturas Pagadas al Vencimiento 6.exe, 00000000.00000002.721351172.0000000000CD0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery41Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery31Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Facturas Pagadas al Vencimiento 6.exe51%VirustotalBrowse
    Facturas Pagadas al Vencimiento 6.exe43%MetadefenderBrowse
    Facturas Pagadas al Vencimiento 6.exe79%ReversingLabsWin32.Trojan.Graftor

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted IPs

    No contacted IP infos

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:433003
    Start date:11.06.2021
    Start time:04:49:17
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 7m 6s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:Facturas Pagadas al Vencimiento 6.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:31
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal92.rans.troj.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 6% (good quality ratio 0%)
    • Quality average: 1.8%
    • Quality standard deviation: 4.2%
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
    • Not all processes where analyzed, report is missing behavior information

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    No created / dropped files found

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):4.463177731670157
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.15%
    • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:Facturas Pagadas al Vencimiento 6.exe
    File size:135168
    MD5:78c3e32a156e44865fcdf53b4783265b
    SHA1:02f175cb27dcf85b810f40d3c0adc66de1467ca0
    SHA256:4d1b07efb6e87b7c1379fc8f9eacef7443c54a57ab8e9d50c98053193316fd91
    SHA512:18fa858551003d425d3dc71e80fee12c6eb77bef6bcb1961212457e0b85c335ce757c6ae13c07ad90b14d337d009b648c71254f5610953ca2897ed56d4e2bfe9
    SSDEEP:1536:v9J+koIy03uySeJTFsn9FQsZ57DuAPxElSnEtG8z:vP+ko3ytF2nQa5Nzs
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L..._Q.`.....................0....................@................

    File Icon

    Icon Hash:20047c7c70f0e004

    Static PE Info

    General

    Entrypoint:0x4014bc
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    DLL Characteristics:
    Time Stamp:0x60BD515F [Sun Jun 6 22:51:11 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:54ea68151857c1f30c42224007018bf1

    Entrypoint Preview

    Instruction
    push 00401800h
    call 00007F7CCCE82955h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    xor byte ptr [eax], al
    add byte ptr [eax], al
    inc eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [edi+edx*2-1CDD0D78h], dh
    add al, 46h
    xchg dword ptr [edi+42BD2432h], edx
    pushfd
    rol byte ptr [eax], 00000000h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add dword ptr [eax], eax
    add byte ptr [eax], al
    inc edx
    add byte ptr [esi], al
    push eax
    add dword ptr [ecx], 73h
    jo 00007F7CCCE829CBh
    jc 00007F7CCCE829D1h
    arpl word ptr [eax+65h], bp
    je 00007F7CCCE829CBh
    arpl word ptr [ecx+64h], bp
    add byte ptr [ebx], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    dec esp
    xor dword ptr [eax], eax
    or dh, dl
    dec ebp
    xor ch, cl

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7840x28.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x9b8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
    IMAGE_DIRECTORY_ENTRY_IAT0x10000x14c.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1dcf80x1e000False0.334098307292data4.72155519745IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .data0x1f0000x12300x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x210000x9b80x1000False0.17822265625data2.11732977417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    RT_ICON0x218880x130data
    RT_ICON0x215a00x2e8data
    RT_ICON0x214780x128GLS_BINARY_LSB_FIRST
    RT_GROUP_ICON0x214480x30data
    RT_VERSION0x211500x2f8dataSesotho (Sutu)South Africa

    Imports

    DLLImport
    MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaAryConstruct2, __vbaObjVar, __vbaI2I4, DllFunctionCall, _adj_fpatan, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarErrI4, __vbaFPException, _CIlog, __vbaFileOpen, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaUI1Str, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

    Version Infos

    DescriptionData
    Translation0x0430 0x04b0
    LegalCopyrightTera data
    InternalNameAerogun6
    FileVersion1.00
    CompanyNameTera data
    LegalTrademarksTera data
    CommentsTera data
    ProductNameTera data
    ProductVersion1.00
    FileDescriptionTera data
    OriginalFilenameAerogun6.exe

    Possible Origin

    Language of compilation systemCountry where language is spokenMap
    Sesotho (Sutu)South Africa

    Network Behavior

    No network behavior found

    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    System Behavior

    General

    Start time:04:50:01
    Start date:11/06/2021
    Path:C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\Facturas Pagadas al Vencimiento 6.exe'
    Imagebase:0x400000
    File size:135168 bytes
    MD5 hash:78C3E32A156E44865FCDF53B4783265B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Reputation:low

    Disassembly

    Code Analysis

    Reset < >

      Execution Graph

      Execution Coverage:1%
      Dynamic/Decrypted Code Coverage:58%
      Signature Coverage:30.9%
      Total number of Nodes:314
      Total number of Limit Nodes:2

      Graph

      execution_graph 2734 41dc80 __vbaStrCopy #618 __vbaStrMove __vbaStrCmp __vbaFreeStr 2735 41dd34 __vbaFreeStr 2734->2735 2736 41dcfa 2734->2736 2736->2735 2737 41dd76 2736->2737 2739 41dd22 __vbaHresultCheckObj 2736->2739 2737->2737 2739->2735 2522 41da40 #673 __vbaFpR8 2523 41dab4 __vbaFreeVar 2522->2523 2525 41dad1 __vbaVarDup #667 __vbaStrMove __vbaFreeVar 2523->2525 2526 41db05 __vbaFreeStr 2523->2526 2525->2526 2725 41d480 2726 41d4ba __vbaStrCopy __vbaI4Str #608 __vbaVarTstNe __vbaFreeVar 2725->2726 2727 41d662 __vbaFreeObj __vbaFreeStr 2726->2727 2728 41d534 2726->2728 2730 41d53c __vbaNew2 2728->2730 2731 41d54c 2728->2731 2730->2731 2732 41d613 __vbaHresultCheckObj 2731->2732 2733 41d622 __vbaLateIdSt __vbaFreeVar 2731->2733 2732->2733 2733->2727 2740 41e080 2741 41e0b7 6 API calls 2740->2741 2742 41e1a3 __vbaFreeStr 2741->2742 2743 41e124 2741->2743 2744 41e12c __vbaNew2 2743->2744 2746 41e13c 2743->2746 2744->2746 2747 41e161 2746->2747 2748 41e152 __vbaHresultCheckObj 2746->2748 2749 41e180 __vbaHresultCheckObj 2747->2749 2750 41e18f __vbaStrMove __vbaFreeObj 2747->2750 2748->2747 2749->2750 2750->2742 2857 41e380 2858 41e3ca 2857->2858 2859 41e3ba __vbaNew2 2857->2859 2860 41e3e0 __vbaHresultCheckObj 2858->2860 2861 41e3ef 2858->2861 2859->2858 2860->2861 2862 41e407 __vbaHresultCheckObj 2861->2862 2863 41e419 __vbaI2I4 __vbaFreeObj 2861->2863 2862->2863 2864 41e444 2863->2864 2774 41db40 2775 41db77 __vbaStrCopy __vbaVarDup #522 __vbaVarTstNe __vbaFreeVarList 2774->2775 2776 41dc2b __vbaFreeStr 2775->2776 2778 41dbf4 2775->2778 2778->2776 2779 41dc74 2778->2779 2780 41dc19 __vbaHresultCheckObj 2778->2780 2779->2779 2780->2776 2799 41c700 2800 41c740 __vbaAryConstruct2 __vbaUI1Str 2799->2800 2801 41c765 __vbaFileOpen 2800->2801 2802 41c776 __vbaAryDestruct 2800->2802 2801->2802 2816 41dfc0 __vbaStrCopy #539 __vbaStrVarMove __vbaStrMove __vbaFreeVar 2817 41e046 __vbaFreeStr __vbaFreeStr 2816->2817 2843 41dd80 2844 41ddba __vbaStrCopy __vbaVarDup #629 __vbaVarTstNe __vbaFreeVarList 2843->2844 2845 41de89 __vbaFreeStr 2844->2845 2846 41de5c __vbaVarDup #600 __vbaFreeVar 2844->2846 2846->2845 2848 41d380 2849 41d3ca 2848->2849 2850 41d3ba __vbaNew2 2848->2850 2851 41d3e0 __vbaHresultCheckObj 2849->2851 2852 41d3ef 2849->2852 2850->2849 2851->2852 2853 41d407 __vbaHresultCheckObj 2852->2853 2854 41d419 __vbaFreeObj 2852->2854 2853->2854 2855 41d444 2854->2855 2856 41d439 #568 2854->2856 2856->2855 2818 219339e 2820 2193211 2818->2820 2819 2193410 2820->2819 2821 21a082f GetPEB 2820->2821 2821->2820 2751 21946d0 2752 21946e5 2751->2752 2757 2194728 2751->2757 2753 2194709 2752->2753 2752->2757 2754 2194723 2753->2754 2755 219e911 2 API calls 2753->2755 2756 219472d GetPEB 2754->2756 2755->2754 2760 219da40 2756->2760 2758 21a09a4 GetPEB 2757->2758 2759 21948f8 2758->2759 2670 41d6d0 __vbaStrCopy 2671 41d725 2670->2671 2672 41d715 __vbaNew2 2670->2672 2673 41d73b __vbaHresultCheckObj 2671->2673 2674 41d74a 2671->2674 2672->2671 2673->2674 2675 41d765 __vbaHresultCheckObj 2674->2675 2676 41d777 __vbaFreeObj 2674->2676 2675->2676 2677 41d791 __vbaFreeStr 2676->2677 2761 41e290 __vbaStrCopy __vbaVarDup #557 __vbaFreeVar 2762 41e310 2761->2762 2763 41e332 __vbaFreeStr 2761->2763 2762->2763 2765 41e320 __vbaHresultCheckObj 2762->2765 2765->2763 2770 21910cf 2771 2191139 2770->2771 2772 219f08f GetPEB 2771->2772 2773 21911fd 2772->2773 2781 2199b01 GetPEB 2681 219a480 2682 219a502 2681->2682 2683 219f6fe GetPEB 2682->2683 2688 219f200 2682->2688 2684 219f187 2683->2684 2685 219f6fe GetPEB 2684->2685 2684->2688 2686 219f19f 2685->2686 2687 219f6fe GetPEB 2686->2687 2686->2688 2687->2688 2528 219ae38 2529 219aebb 2528->2529 2532 21a09a4 2529->2532 2531 219aee2 2532->2531 2533 219f08f 2532->2533 2533->2531 2536 2199b23 2533->2536 2540 219f6fe GetPEB 2533->2540 2535 219f187 2535->2536 2537 219f6fe GetPEB 2535->2537 2536->2531 2538 219f19f 2537->2538 2538->2536 2539 219f6fe GetPEB 2538->2539 2539->2536 2541 219f764 2540->2541 2541->2535 2559 219be78 2628 219f08f 2559->2628 2561 219be89 2562 219f08f GetPEB 2561->2562 2563 219bec9 2562->2563 2564 219f08f GetPEB 2563->2564 2565 219bf30 2564->2565 2566 219f08f GetPEB 2565->2566 2567 219bf46 2566->2567 2568 219f08f GetPEB 2567->2568 2569 219bf5d 2568->2569 2570 219f08f GetPEB 2569->2570 2571 219bf74 2570->2571 2572 219f08f GetPEB 2571->2572 2573 219bfdb 2572->2573 2574 219bfe7 2573->2574 2611 21973a2 2573->2611 2575 219f08f GetPEB 2574->2575 2576 219c004 2575->2576 2577 219f08f GetPEB 2576->2577 2578 219c01e 2577->2578 2580 219f08f GetPEB 2578->2580 2581 219c088 2580->2581 2582 219f08f GetPEB 2581->2582 2583 219c09b 2582->2583 2585 219f08f GetPEB 2583->2585 2584 219f08f 2586 219f6fe GetPEB 2584->2586 2598 219f200 2584->2598 2587 219c0b4 2585->2587 2588 219f187 2586->2588 2589 219f08f GetPEB 2587->2589 2590 219f6fe GetPEB 2588->2590 2588->2598 2591 219c117 2589->2591 2593 219f19f 2590->2593 2592 219f08f GetPEB 2591->2592 2594 219c132 2592->2594 2597 219f6fe GetPEB 2593->2597 2593->2598 2595 219f08f GetPEB 2594->2595 2596 219c157 2595->2596 2599 219f08f GetPEB 2596->2599 2597->2598 2600 219c1be 2599->2600 2601 219f08f GetPEB 2600->2601 2602 219c1ff 2601->2602 2603 219f08f GetPEB 2602->2603 2604 219c218 2603->2604 2605 219f08f GetPEB 2604->2605 2606 219c22d 2605->2606 2636 219c2ab 2606->2636 2611->2584 2612 2191417 2611->2612 2613 21a0b0b 2611->2613 2614 219f08f GetPEB 2613->2614 2615 21a0b1c 2614->2615 2616 219f08f GetPEB 2615->2616 2618 2191417 2615->2618 2617 21a0b48 GetPEB 2616->2617 2627 21973a2 2617->2627 2618->2611 2619 21a0b0b GetPEB 2619->2627 2620 219f08f 2620->2611 2621 219f6fe GetPEB 2620->2621 2626 219f200 2620->2626 2622 219f187 2621->2622 2623 219f6fe GetPEB 2622->2623 2622->2626 2624 219f19f 2623->2624 2625 219f6fe GetPEB 2624->2625 2624->2626 2625->2626 2626->2611 2627->2618 2627->2619 2627->2620 2628->2561 2629 219f0dd 2628->2629 2630 219f6fe GetPEB 2629->2630 2631 219f200 2629->2631 2632 219f187 2630->2632 2631->2561 2632->2631 2633 219f6fe GetPEB 2632->2633 2634 219f19f 2633->2634 2634->2631 2635 219f6fe GetPEB 2634->2635 2635->2631 2637 219c31d 2636->2637 2638 219f08f GetPEB 2637->2638 2639 219c339 2638->2639 2640 219f08f GetPEB 2639->2640 2641 219c355 2640->2641 2648 219c362 2641->2648 2644 219c2ab GetPEB 2645 219ccbb 2644->2645 2654 2193096 2645->2654 2649 219c3bc 2648->2649 2650 219f08f GetPEB 2649->2650 2651 219c3fb 2650->2651 2652 219f08f GetPEB 2651->2652 2653 219c465 2652->2653 2653->2644 2655 21930e8 2654->2655 2656 21a09a4 GetPEB 2655->2656 2657 21931b0 2656->2657 2659 21a082f 2657->2659 2660 219f08f 2659->2660 2660->2657 2661 219f6fe GetPEB 2660->2661 2666 2199b23 2660->2666 2662 219f187 2661->2662 2663 219f6fe GetPEB 2662->2663 2662->2666 2664 219f19f 2663->2664 2665 219f6fe GetPEB 2664->2665 2664->2666 2665->2666 2666->2657 2689 41dee0 2690 41df17 2689->2690 2691 41df32 2690->2691 2692 41df22 __vbaNew2 2690->2692 2693 41df57 2691->2693 2694 41df48 __vbaHresultCheckObj 2691->2694 2692->2691 2695 41df72 __vbaHresultCheckObj 2693->2695 2696 41df84 __vbaFreeObj 2693->2696 2694->2693 2695->2696 2697 41df9e 2696->2697 2785 41e560 __vbaStrCopy #516 2786 41e5b5 2785->2786 2787 41e638 __vbaFreeStr 2785->2787 2789 41e5bd __vbaNew2 2786->2789 2790 41e5cd 2786->2790 2789->2790 2791 41e5e3 __vbaHresultCheckObj 2790->2791 2792 41e5f2 2790->2792 2791->2792 2793 41e620 __vbaHresultCheckObj 2792->2793 2794 41e62f __vbaFreeObj 2792->2794 2793->2794 2794->2787 2803 41d920 __vbaStrCopy __vbaStrCopy __vbaStrToAnsi 2804 402978 2803->2804 2805 41d97f __vbaSetSystemError __vbaFreeStr 2804->2805 2806 41d9a5 __vbaFpI4 2805->2806 2807 41d9ec __vbaFreeStr __vbaFreeStr 2805->2807 2809 41d9d4 2806->2809 2809->2807 2810 41d9da __vbaHresultCheckObj 2809->2810 2810->2807 2865 21931fc 2866 2193211 2865->2866 2867 21a082f GetPEB 2866->2867 2867->2866 2811 2193170 2812 219317a 2811->2812 2813 21a09a4 GetPEB 2812->2813 2815 21931b0 2813->2815 2814 21a082f GetPEB 2814->2815 2815->2814 2477 41c7b0 2478 41c7f3 __vbaVarDup #557 __vbaFreeVar 2477->2478 2479 41c8c8 2478->2479 2480 41c8eb __vbaStrCopy 2478->2480 2479->2480 2481 41c8d5 __vbaHresultCheckObj 2479->2481 2483 41c941 2480->2483 2481->2480 2484 41c953 __vbaFreeStr 2483->2484 2485 41c945 __vbaHresultCheckObj 2483->2485 2486 41c992 __vbaStrCopy 2484->2486 2485->2484 2518 402978 2486->2518 2519 402981 2518->2519 2542 41e470 2543 41e4a7 __vbaLenBstrB 2542->2543 2544 41e503 __vbaFreeVar 2543->2544 2545 41e4c6 __vbaVarDup #666 __vbaVarMove __vbaFreeVar 2543->2545 2545->2544 2547 41e670 2548 41e6a7 __vbaVarErrI4 #559 __vbaFreeVar 2547->2548 2549 41e745 2548->2549 2550 41e6df 2548->2550 2551 41e6f7 2550->2551 2552 41e6e7 __vbaNew2 2550->2552 2553 41e70d __vbaHresultCheckObj 2551->2553 2554 41e71c 2551->2554 2552->2551 2553->2554 2555 41e72d __vbaHresultCheckObj 2554->2555 2556 41e73c __vbaFreeObj 2554->2556 2555->2556 2556->2549 2826 41e1f0 2827 41e227 #648 __vbaFreeVar 2826->2827 2828 41e267 2827->2828 2868 41d7b0 #512 __vbaStrMove __vbaStrCmp __vbaFreeStr 2869 41d8c9 __vbaFreeObj 2868->2869 2870 41d82a 2868->2870 2872 41d842 2870->2872 2873 41d832 __vbaNew2 2870->2873 2874 41d867 2872->2874 2875 41d858 __vbaHresultCheckObj 2872->2875 2873->2872 2876 41d8ab __vbaObjSet __vbaFreeObj 2874->2876 2877 41d89c __vbaHresultCheckObj 2874->2877 2875->2874 2876->2869 2877->2876 2701 21946ab 2702 219470f 2701->2702 2707 219e911 2702->2707 2704 2194723 2718 219472d 2704->2718 2706 219da40 2716 21973a2 2707->2716 2708 21a0b0b 2 API calls 2708->2716 2709 219f08f 2709->2704 2710 219f6fe GetPEB 2709->2710 2715 219f200 2709->2715 2711 219f187 2710->2711 2712 219f6fe GetPEB 2711->2712 2711->2715 2713 219f19f 2712->2713 2714 219f6fe GetPEB 2713->2714 2713->2715 2714->2715 2715->2704 2716->2708 2716->2709 2717 2191417 2716->2717 2717->2704 2719 2194734 2718->2719 2720 21a09a4 GetPEB 2719->2720 2721 21948f8 2720->2721 2721->2706 2557 219f023 GetPEB 2558 219f07d 2557->2558 2829 21973a2 2838 2197436 2829->2838 2830 21a0b0b 2 API calls 2830->2838 2831 219f08f 2832 219f6fe GetPEB 2831->2832 2837 219f200 2831->2837 2833 219f187 2832->2833 2834 219f6fe GetPEB 2833->2834 2833->2837 2835 219f19f 2834->2835 2836 219f6fe GetPEB 2835->2836 2835->2837 2836->2837 2838->2829 2838->2830 2838->2831 2839 2191417 2838->2839 2520 4014bc #100 2521 4014fb 2520->2521 2840 4011fe 2841 40125b __vbaExceptHandler 2840->2841

      Executed Functions

      Control-flow Graph

      APIs
      • __vbaVarDup.MSVBVM60 ref: 0041C896
      • #557.MSVBVM60(?), ref: 0041C8A3
      • __vbaFreeVar.MSVBVM60 ref: 0041C8BD
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402604,0000071C), ref: 0041C8E7
      • __vbaStrCopy.MSVBVM60 ref: 0041C912
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402604,000006F8), ref: 0041C951
      • __vbaFreeStr.MSVBVM60 ref: 0041C959
      • __vbaStrCopy.MSVBVM60 ref: 0041C9AD
      • __vbaFreeStr.MSVBVM60 ref: 0041C9DB
      • __vbaStrCopy.MSVBVM60 ref: 0041C9F5
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402604,000006FC), ref: 0041CA37
      • __vbaFreeStr.MSVBVM60 ref: 0041CA3F
      • __vbaStrCopy.MSVBVM60 ref: 0041CA6F
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402604,00000700), ref: 0041CAB8
      • __vbaFreeStr.MSVBVM60 ref: 0041CAC0
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402604,00000704), ref: 0041CB0B
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402604,00000708), ref: 0041CB7A
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402604,0000070C), ref: 0041CBB0
      • __vbaStrCopy.MSVBVM60 ref: 0041CBBD
      • __vbaFreeStr.MSVBVM60 ref: 0041CBF7
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402604,00000710), ref: 0041CC5C
      • __vbaStrCopy.MSVBVM60 ref: 0041CCB0
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402604,00000714), ref: 0041CCE5
      • __vbaFreeStr.MSVBVM60 ref: 0041CCED
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,004025D4,000002B4), ref: 0041CD0E
      • __vbaVarAdd.MSVBVM60(?,00000008,?), ref: 0041CD42
      • __vbaVarMove.MSVBVM60 ref: 0041CD49
      • __vbaVarTstLt.MSVBVM60(00000002,?), ref: 0041CD6A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$CheckHresult$Free$Copy$#557Move
      • String ID: 7-7-7$Abhorlagerstyringer8$ECHESSTRIKKEGARNERNE$FAGBEVGELSER$Forhindringslbene5$Generablenessbitnivea$MAXILNGDES$Mentation5$Rabarbergrdens1$Underlivssygdoms$inchamber$n]$stakkequantisesamphi$vd
      • API String ID: 1267258746-2487779393
      • Opcode ID: ddd08c0d7e97625125403577147d377ea54a4fd3a902d7807057bc946b4400c5
      • Instruction ID: 361fae68542eab6bcbe660f3c8bb3b0b7b427dd290654eaeea9a084850c098ed
      • Opcode Fuzzy Hash: ddd08c0d7e97625125403577147d377ea54a4fd3a902d7807057bc946b4400c5
      • Instruction Fuzzy Hash: 26F16FB0940619AFDB24DF54CD88FDAB7B8FF48305F1045EAE249A7180DBB46A85CF58
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 48 4014bc-4014f9 #100 49 401564-40156a 48->49 50 4014fb 48->50 53 40156b 49->53 51 40156c-401589 50->51 52 4014fd-401500 50->52 55 4015f7-401603 51->55 56 40158c-40159d 51->56 52->53 54 401502-401513 52->54 53->51 54->49 59 401674-4016ad 55->59 60 401605 55->60 57 4015a0-4015f4 56->57 58 40160b-401625 56->58 57->55 63 401627-40162e 58->63 64 401659-40166d 58->64 65 401721-401766 59->65 66 4016af-4016b0 59->66 61 401673 60->61 62 401607-401608 60->62 61->59 68 40160a 62->68 69 40166f-401672 62->69 63->64 64->69 71 4016b3-4016d1 66->71 72 401718-40171d 66->72 68->58 69->61 73 4016d3-4016ed 71->73 74 401705-401717 71->74 75 401720 72->75 73->75 76 4016ef-401703 73->76 74->72 75->65 76->74
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: #100
      • String ID: VB5!6&*
      • API String ID: 1341478452-3593831657
      • Opcode ID: 16e453182858942501f48c80791f5e5c8615eff8f2bf65b9d668a6173b283620
      • Instruction ID: 6524a968a2050ee8b4c8b89f62b6cc3893f7cc034de3ca27ff62e46cb409f239
      • Opcode Fuzzy Hash: 16e453182858942501f48c80791f5e5c8615eff8f2bf65b9d668a6173b283620
      • Instruction Fuzzy Hash: C49120A284E7D19FC3078BB04D6A5A2BFB4AE1321171E46DBC4C2CE0F3D21C591AD766
      Uniqueness

      Uniqueness Score: -1.00%

      Non-executed Functions

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID: H{SF$]g'8${F
      • API String ID: 0-302411050
      • Opcode ID: a8dcbd0fcd77e331a5998bc07df19939b1a5af05fa5b7e48b04040ee1187a3a2
      • Instruction ID: a1c02deda71f94e44d8ccc5b9bd2aa54d7427970264ea1a28ada55837f860402
      • Opcode Fuzzy Hash: a8dcbd0fcd77e331a5998bc07df19939b1a5af05fa5b7e48b04040ee1187a3a2
      • Instruction Fuzzy Hash: 1BB29D756443469FDF349E38CDA47EA7BA2AF12360F96826DCCDA8B195D3348481CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID: H{SF${F$#zq
      • API String ID: 0-2452091416
      • Opcode ID: a5e2c7b5d430bce739f1032f9f706ad6409a6d6ceb2236e22ec2344fe0677237
      • Instruction ID: d5027cbdca36705c171dacdd783884ef890acc446cc8eec458cdabb5d8d26cfa
      • Opcode Fuzzy Hash: a5e2c7b5d430bce739f1032f9f706ad6409a6d6ceb2236e22ec2344fe0677237
      • Instruction Fuzzy Hash: BB9255B064434ADFDF389E78CD957EA77A3AF56350F96422DDC8A87240D3358982CB42
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID: 2Oe{$|40
      • API String ID: 0-1795958494
      • Opcode ID: dcbcfcf3fef957b0f77ff53615139eff5e45ed97835a539090dcd06257554f34
      • Instruction ID: 2c8a2f0ea227ffdab731cc2d2f4969b9c535952c4a8954f375c28f3bbd765744
      • Opcode Fuzzy Hash: dcbcfcf3fef957b0f77ff53615139eff5e45ed97835a539090dcd06257554f34
      • Instruction Fuzzy Hash: FE7126786043869FDF349E68C9A5BEB3BB5AF597D0F05026DDC99AB240D7318A02CB41
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID: 2Oe{$|40
      • API String ID: 0-1795958494
      • Opcode ID: 2305a10bfd5e0fbc097448a107eabe97146da32267a4378b9839a6d22128ed9b
      • Instruction ID: 68a373b2b9380cd850f170024901a6f552b5a7a065d2b13a9b2fbcc36e4b9955
      • Opcode Fuzzy Hash: 2305a10bfd5e0fbc097448a107eabe97146da32267a4378b9839a6d22128ed9b
      • Instruction Fuzzy Hash: 6F513379604386DFDF389E28C9A5BEB37B6BF497D0F45012D9C99A7280D7314A41CB41
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID: 2Oe{$|40
      • API String ID: 0-1795958494
      • Opcode ID: d8ccd94ca3828c423a245147d53b1b743c8408af29718c1dab128183bb671c04
      • Instruction ID: e494df45c2ba6fa70f02a399d0b68855e8210762fc9534408461b85e82fcbc29
      • Opcode Fuzzy Hash: d8ccd94ca3828c423a245147d53b1b743c8408af29718c1dab128183bb671c04
      • Instruction Fuzzy Hash: DB5101786043868FDF349E28CDA5BEB37A6BF997D0F4502299C99AB280D7315A01CB41
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID: \G=<
      • API String ID: 0-2429403258
      • Opcode ID: abed0965e3b10dad5386ddff4031c2ed5f2150b2aaa984055a7c2fee0b98b3e9
      • Instruction ID: 47a5424899e2ea1b618463553fb1f3050a709c1d246ea17f410e2de41bc3f4ed
      • Opcode Fuzzy Hash: abed0965e3b10dad5386ddff4031c2ed5f2150b2aaa984055a7c2fee0b98b3e9
      • Instruction Fuzzy Hash: 5B519D345893499FCF24AEA8D8E47FA37F3AF56744F46011ECC9A97215D7324982CB12
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID: 4N
      • API String ID: 0-1258314070
      • Opcode ID: 944a2a7b1eb43544a94ca81a9a05934432f6efffda835c5fc72981639e5bdfaa
      • Instruction ID: ffe9e99fd0c56d0a8c92c0fd4e4bc863ddd0617f12ff05d45bf20d484ec397fb
      • Opcode Fuzzy Hash: 944a2a7b1eb43544a94ca81a9a05934432f6efffda835c5fc72981639e5bdfaa
      • Instruction Fuzzy Hash: B8F02471B052184EEF7D45788D913ED20D79FC2260F61422E9D1ED2289EBBA85C0C101
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3d757d3d1058c6ee8d3ece3b088a8dc3486b7293fd8928ed6b4c06dc4d4b4faa
      • Instruction ID: ddf065b5bcd5f128072a9508daa7ce3b3c7f2e6834f2f5624672656a50f1d6fe
      • Opcode Fuzzy Hash: 3d757d3d1058c6ee8d3ece3b088a8dc3486b7293fd8928ed6b4c06dc4d4b4faa
      • Instruction Fuzzy Hash: B93138B6A442159FDF3C9E648CA57FB76ABAF94340F8A802FDC4B97241C7301A85C742
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f327da821f270ed39799352a825fd1d9374280029e158b6b3643887bc9e6742f
      • Instruction ID: 59fc99de19c93509877eb0636399de59f027d8bfe5d4fae9cb558c38e7821a0e
      • Opcode Fuzzy Hash: f327da821f270ed39799352a825fd1d9374280029e158b6b3643887bc9e6742f
      • Instruction Fuzzy Hash: ED212375608301CFD7596E708AA67EBBAE6BF1A390F830A1DDEC643456E3314981CB02
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8a749f0cd0be0494bbe77c697ed0c91060c61093e0bb8f24794a972d11c74344
      • Instruction ID: a0ee58f5cb8e3476a502253259e81090ce3af87b29f54a373955a212ee619fbc
      • Opcode Fuzzy Hash: 8a749f0cd0be0494bbe77c697ed0c91060c61093e0bb8f24794a972d11c74344
      • Instruction Fuzzy Hash: 50F05E34354241EFCB2CCF08C5D4F9573A1AB59710FA2466AE956CB6A5C331D942CA15
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f5ef896633675a675381882a3a438dfe694da797c54b97afb027cd7354525cbc
      • Instruction ID: ff678b572f987065c8a44ede89a8eccc45d2f8a1d0a8b402c5e5dfc19e20d228
      • Opcode Fuzzy Hash: f5ef896633675a675381882a3a438dfe694da797c54b97afb027cd7354525cbc
      • Instruction Fuzzy Hash: 94B092BA2015808FEB02CE08C4C1B0073B6F706644B860490E406CBB51C328ED44CA00
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.721714240.0000000002190000.00000040.00000001.sdmp, Offset: 02190000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_2190000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fdf5e24749be8989b344407b7d12498d61ad51b9d6d071649696efc163827a71
      • Instruction ID: 364ab0da88f034ffd05401964857ec8f4bee43e921e2cb697bea9e09e9bbef47
      • Opcode Fuzzy Hash: fdf5e24749be8989b344407b7d12498d61ad51b9d6d071649696efc163827a71
      • Instruction Fuzzy Hash: 0EB09238256A40CFCA59CA08C480E4073B4B704A20FC606C0E4228BFA5C328E800CE00
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • __vbaVarDup.MSVBVM60 ref: 0041E0DA
      • #591.MSVBVM60(?), ref: 0041E0E4
      • __vbaStrMove.MSVBVM60 ref: 0041E0F5
      • __vbaStrCmp.MSVBVM60(String,00000000), ref: 0041E0FD
      • __vbaFreeStr.MSVBVM60 ref: 0041E110
      • __vbaFreeVar.MSVBVM60 ref: 0041E119
      • __vbaNew2.MSVBVM60(00402CA0,0041F3C0), ref: 0041E136
      • __vbaHresultCheckObj.MSVBVM60(00000000,0218EDD4,00402C90,0000004C), ref: 0041E15B
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402D14,00000024), ref: 0041E189
      • __vbaStrMove.MSVBVM60 ref: 0041E198
      • __vbaFreeObj.MSVBVM60 ref: 0041E19D
      • __vbaFreeStr.MSVBVM60(0041E1D0), ref: 0041E1C9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$CheckHresultMove$#591New2
      • String ID: AIRPORT$String$stakkequantisesamphi
      • API String ID: 1960000165-2758877968
      • Opcode ID: 866bc89fc07bf0eab76444cc517bb9a2b53d3a3ba47905b8cb7dc5fdc612d555
      • Instruction ID: 96f17b4c81df45c5b20c5e5337a2515f7c5083fa0239f5e1099d30d77b6a98e0
      • Opcode Fuzzy Hash: 866bc89fc07bf0eab76444cc517bb9a2b53d3a3ba47905b8cb7dc5fdc612d555
      • Instruction Fuzzy Hash: DE316D74900219EFCB00DF95DE49AEEBBB8FF58704F10412AE901F32A0D7B85945CBA8
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041D4E7
      • __vbaI4Str.MSVBVM60(00402CD4), ref: 0041D4F2
      • #608.MSVBVM60(?,00000000), ref: 0041D4FD
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041D519
      • __vbaFreeVar.MSVBVM60 ref: 0041D525
      • __vbaNew2.MSVBVM60(00402CA0,0041F3C0), ref: 0041D546
      • __vbaHresultCheckObj.MSVBVM60(00000000,0218EDD4,00402C90,00000044), ref: 0041D61C
      • __vbaLateIdSt.MSVBVM60(?,00000000), ref: 0041D653
      • __vbaFreeVar.MSVBVM60 ref: 0041D65C
      • __vbaFreeObj.MSVBVM60(0041D6A0), ref: 0041D690
      • __vbaFreeStr.MSVBVM60 ref: 0041D699
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$#608CheckCopyHresultLateNew2
      • String ID: Abhorlagerstyringer8$,@
      • API String ID: 1142404513-3622403661
      • Opcode ID: 06e2efba301047cf41dd1a35494c64062a35d745ec3644171aee33b3b9125436
      • Instruction ID: 8d2764329bcd8962fe2a95772a7d671e8d4f8ff4e4d2b0119504e325c22d1906
      • Opcode Fuzzy Hash: 06e2efba301047cf41dd1a35494c64062a35d745ec3644171aee33b3b9125436
      • Instruction Fuzzy Hash: F761F5B0D012189FCB04DFA8DA89A9DBBB4FB48704F20C16AE509AB351D7759946CF94
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041DDD8
      • __vbaVarDup.MSVBVM60 ref: 0041DE03
      • #629.MSVBVM60(?,?,00000001,?), ref: 0041DE13
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041DE38
      • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 0041DE4E
      • __vbaVarDup.MSVBVM60 ref: 0041DE70
      • #600.MSVBVM60(?,00000002), ref: 0041DE78
      • __vbaFreeVar.MSVBVM60 ref: 0041DE83
      • __vbaFreeStr.MSVBVM60(0041DEB7), ref: 0041DEB0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$#600#629CopyList
      • String ID: FGFG$Generablenessbitnivea
      • API String ID: 3038482304-923814605
      • Opcode ID: 458b8fd6ed2de39e5597b796f810ef0f35d0bb08436a092b428149d6783c4567
      • Instruction ID: 0cffc96e5b2a4485457dd3674565ceec3cc0d978b9627a136334c6ada1e7872d
      • Opcode Fuzzy Hash: 458b8fd6ed2de39e5597b796f810ef0f35d0bb08436a092b428149d6783c4567
      • Instruction Fuzzy Hash: EA31D6B1C10228EFCB10DFA4DD89ADDBBB8FB58704F10815AE105A7291DBB45949CFA5
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D960
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D968
      • __vbaStrToAnsi.MSVBVM60(?,Indtrykker4,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D973
      • __vbaSetSystemError.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D981
      • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D99A
      • __vbaFpI4.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D9B0
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,004025D4,000002C8,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D9E6
      • __vbaFreeStr.MSVBVM60(0041DA16), ref: 0041DA0E
      • __vbaFreeStr.MSVBVM60 ref: 0041DA13
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$Copy$AnsiCheckErrorHresultSystem
      • String ID: Indtrykker4
      • API String ID: 2456558797-126329048
      • Opcode ID: a3f2585b840f3a0bee6e0f65f0c0bdb7c59b9d78b4bc70530c3f234d4b2a7e00
      • Instruction ID: e11c87a1e707751d877b8a1d2ef517ccadc1ce563f47a5893495cf133e144a3b
      • Opcode Fuzzy Hash: a3f2585b840f3a0bee6e0f65f0c0bdb7c59b9d78b4bc70530c3f234d4b2a7e00
      • Instruction Fuzzy Hash: E921C2B1C00219ABCB14DF61DE49DEEBB78FF18780F114026FA41B72A0CB741945CBA8
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 117 41da40-41dab2 #673 __vbaFpR8 118 41dab4-41dab9 117->118 119 41dabb 117->119 120 41dabd-41dacf __vbaFreeVar 118->120 119->120 121 41dad1-41db03 __vbaVarDup #667 __vbaStrMove __vbaFreeVar 120->121 122 41db05-41db20 __vbaFreeStr 120->122 121->122
      APIs
      • #673.MSVBVM60(00000000,40280000,00000000,3FF00000,00000000,3FF00000,00000000,3FF00000,?), ref: 0041DA9B
      • __vbaFpR8.MSVBVM60 ref: 0041DAA1
      • __vbaFreeVar.MSVBVM60 ref: 0041DACA
      • __vbaVarDup.MSVBVM60 ref: 0041DAE5
      • #667.MSVBVM60(00000002), ref: 0041DAEF
      • __vbaStrMove.MSVBVM60 ref: 0041DAFA
      • __vbaFreeVar.MSVBVM60 ref: 0041DB03
      • __vbaFreeStr.MSVBVM60(0041DB21), ref: 0041DB1A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$#667#673Move
      • String ID: Generablenessbitnivea
      • API String ID: 1795453576-1714275343
      • Opcode ID: 5252931e87387409d73e9cd901064278deca583fb53fd56a0f3dbf4b885eb7bb
      • Instruction ID: 8f1f19a21395d2aed026689190fd1456c6156e1341eea7a4b899c816bb0b0776
      • Opcode Fuzzy Hash: 5252931e87387409d73e9cd901064278deca583fb53fd56a0f3dbf4b885eb7bb
      • Instruction Fuzzy Hash: 8E214F71800109ABCB04DFA4DE89BEEB7B8FB08745F204169E502B22A4D7746E45CF69
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • #512.MSVBVM60(00402D04,00000002), ref: 0041D7F1
      • __vbaStrMove.MSVBVM60 ref: 0041D7FC
      • __vbaStrCmp.MSVBVM60(00402D10,00000000), ref: 0041D808
      • __vbaFreeStr.MSVBVM60 ref: 0041D81B
      • __vbaNew2.MSVBVM60(00402CA0,0041F3C0), ref: 0041D83C
      • __vbaHresultCheckObj.MSVBVM60(00000000,0218EDD4,00402C90,0000004C), ref: 0041D861
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402D14,0000001C), ref: 0041D8A5
      • __vbaObjSet.MSVBVM60(?,?), ref: 0041D8BA
      • __vbaFreeObj.MSVBVM60 ref: 0041D8C3
      • __vbaFreeObj.MSVBVM60(0041D8FE), ref: 0041D8F7
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$CheckHresult$#512MoveNew2
      • String ID:
      • API String ID: 2567612295-0
      • Opcode ID: e475d5089c89bf89e10180dda254fb9a2a82a47a0363932fb2e67b4900636f27
      • Instruction ID: 63f5fdbbe8f8172190c1b4eabbdd1cd20ab07b311573aa695cb11e48f1dc7fea
      • Opcode Fuzzy Hash: e475d5089c89bf89e10180dda254fb9a2a82a47a0363932fb2e67b4900636f27
      • Instruction Fuzzy Hash: 313152B0900218EBDB04DF95DE49ADEBBB4FF48701F20412AE555F72A0D7785945CBA8
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 136 41dc80-41dcf8 __vbaStrCopy #618 __vbaStrMove __vbaStrCmp __vbaFreeStr 137 41dd34-41dd56 __vbaFreeStr 136->137 138 41dcfa-41dd09 136->138 139 41dd76 138->139 140 41dd0b-41dd20 138->140 139->139 140->137 143 41dd22-41dd2e __vbaHresultCheckObj 140->143 143->137
      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,004012D6), ref: 0041DCB9
      • #618.MSVBVM60(?,00000001,?,?,?,?,?,?,?,?,004012D6), ref: 0041DCC5
      • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,004012D6), ref: 0041DCD0
      • __vbaStrCmp.MSVBVM60(00402D64,00000000,?,?,?,?,?,?,?,?,004012D6), ref: 0041DCDC
      • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,004012D6), ref: 0041DCEF
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,004025D4,00000084,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DD2E
      • __vbaFreeStr.MSVBVM60(0041DD57), ref: 0041DD50
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$#618CheckCopyHresultMove
      • String ID: var
      • API String ID: 592353017-1842382598
      • Opcode ID: 96bb6f7f7540ae65e84f3b67886794817f10582e8e5969ffa3a2ad276666cc9a
      • Instruction ID: 2fc48ceac819be181093cb6d18cb1d53f5cde3e7bff8b9bc1b60b8b53dafc0e0
      • Opcode Fuzzy Hash: 96bb6f7f7540ae65e84f3b67886794817f10582e8e5969ffa3a2ad276666cc9a
      • Instruction Fuzzy Hash: BD218174D40105EBCB149F54DE49AEEBB78FF18700F20456AE542F31E0CB780985CBA9
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 144 41d6d0-41d713 __vbaStrCopy 145 41d725-41d739 144->145 146 41d715-41d71f __vbaNew2 144->146 148 41d73b-41d744 __vbaHresultCheckObj 145->148 149 41d74a-41d763 145->149 146->145 148->149 151 41d765-41d771 __vbaHresultCheckObj 149->151 152 41d777-41d79a __vbaFreeObj __vbaFreeStr 149->152 151->152
      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D707
      • __vbaNew2.MSVBVM60(00402CA0,0041F3C0,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D71F
      • __vbaHresultCheckObj.MSVBVM60(00000000,0218EDD4,00402C90,00000014,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D744
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CC0,00000138,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D771
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D77A
      • __vbaFreeStr.MSVBVM60(0041D79B,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D794
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$CheckFreeHresult$CopyNew2
      • String ID: penetrancy
      • API String ID: 3978771648-2862842630
      • Opcode ID: 91f2177cd724fd618b021bd029feaaef94bcad7767018ee055e40eb9c1157327
      • Instruction ID: e9f011272aa7636626b49981071435103528549038dc7e8383908f181407477f
      • Opcode Fuzzy Hash: 91f2177cd724fd618b021bd029feaaef94bcad7767018ee055e40eb9c1157327
      • Instruction Fuzzy Hash: F4112EB1940205ABCB04DF54CE8AEEEBBB8FB58741F204126F551B31E0D6785585CAA9
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 154 41e290-41e30e __vbaStrCopy __vbaVarDup #557 __vbaFreeVar 155 41e310-41e31e 154->155 156 41e332-41e35b __vbaFreeStr 154->156 155->156 159 41e320-41e32c __vbaHresultCheckObj 155->159 159->156
      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E2CA
      • __vbaVarDup.MSVBVM60 ref: 0041E2E4
      • #557.MSVBVM60(?), ref: 0041E2EE
      • __vbaFreeVar.MSVBVM60 ref: 0041E305
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402604,0000071C), ref: 0041E32C
      • __vbaFreeStr.MSVBVM60(0041E35C), ref: 0041E355
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$#557CheckCopyHresult
      • String ID: 7-7-7
      • API String ID: 400132357-1053354141
      • Opcode ID: 4af4bfa6e6a6b99454207489abb534a2375d72450d4a45c6eb718ec6e85541e2
      • Instruction ID: 2628199000a06d9b8ad597a67ba0634a8e226d78e2026738a742a2c24d1c2978
      • Opcode Fuzzy Hash: 4af4bfa6e6a6b99454207489abb534a2375d72450d4a45c6eb718ec6e85541e2
      • Instruction Fuzzy Hash: 69118474C01209EBCB04DFA5DA89ADEBBB8FF14B04F50812AF811B76A0D7785945CF69
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$#666BstrMove
      • String ID: Amagermadders3
      • API String ID: 2589103371-518441997
      • Opcode ID: f5e19c21a24a376ce5c79ce7207f8de5f0ba40b5a9f9019d7316c3d09fac64b7
      • Instruction ID: 1d6fbd21122aba814c5bfb48c8e0eff7985b5a8ea55e4ba3878607cc2b213461
      • Opcode Fuzzy Hash: f5e19c21a24a376ce5c79ce7207f8de5f0ba40b5a9f9019d7316c3d09fac64b7
      • Instruction Fuzzy Hash: 2211C9B4C00249EBCB00DFD4DA89ACDBFB8FF48705F10805AF401B6665D7B81985CB99
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 165 41db40-41dbf2 __vbaStrCopy __vbaVarDup #522 __vbaVarTstNe __vbaFreeVarList 167 41dbf4-41dc00 165->167 168 41dc2b-41dc54 __vbaFreeStr 165->168 170 41dc02-41dc17 167->170 171 41dc74 167->171 170->168 173 41dc19-41dc25 __vbaHresultCheckObj 170->173 171->171 173->168
      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041DB8F
      • __vbaVarDup.MSVBVM60 ref: 0041DBA9
      • #522.MSVBVM60(?,?), ref: 0041DBB7
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041DBD3
      • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041DBE6
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401208,004025D4,00000084), ref: 0041DC25
      • __vbaFreeStr.MSVBVM60(0041DC55), ref: 0041DC4E
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$#522CheckCopyHresultList
      • String ID:
      • API String ID: 101959151-0
      • Opcode ID: cb4ae9d35b98a8c3c3e50fa2ce7e41e01c1c8fe4e686c3d8ef28dabb46ea15e9
      • Instruction ID: 8c4b9e8a4741fdf3913f1400c8626c9467c40b898100dff34e21c73aa9932243
      • Opcode Fuzzy Hash: cb4ae9d35b98a8c3c3e50fa2ce7e41e01c1c8fe4e686c3d8ef28dabb46ea15e9
      • Instruction Fuzzy Hash: 37312AB0C00249ABCB10DF94D989ADEFFB8FF58704F10451AE545B72A0D7B45589CFA9
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 174 41e560-41e5af __vbaStrCopy #516 175 41e5b5-41e5bb 174->175 176 41e638-41e652 __vbaFreeStr 174->176 178 41e5cd-41e5e1 175->178 179 41e5bd-41e5c7 __vbaNew2 175->179 181 41e5e3-41e5ec __vbaHresultCheckObj 178->181 182 41e5f2-41e61e 178->182 179->178 181->182 184 41e620-41e629 __vbaHresultCheckObj 182->184 185 41e62f-41e632 __vbaFreeObj 182->185 184->185 185->176
      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E59A
      • #516.MSVBVM60(00402CE0,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E5A5
      • __vbaNew2.MSVBVM60(00402CA0,0041F3C0,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E5C7
      • __vbaHresultCheckObj.MSVBVM60(00000000,0218EDD4,00402C90,0000004C), ref: 0041E5EC
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402D14,0000002C), ref: 0041E629
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E632
      • __vbaFreeStr.MSVBVM60(0041E653,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E64C
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$CheckFreeHresult$#516CopyNew2
      • String ID:
      • API String ID: 742114213-0
      • Opcode ID: f1a2462502e3e3d94a2cf35f44f0ccf952fd11926a18f986f41dd9e0d2b86583
      • Instruction ID: 8ab6d04181890b57d821e5cb24fab6d5dadfb6759c1115d2a5caea9a7e116bdf
      • Opcode Fuzzy Hash: f1a2462502e3e3d94a2cf35f44f0ccf952fd11926a18f986f41dd9e0d2b86583
      • Instruction Fuzzy Hash: 6B219174900205EBDB04DF95CA49ADEBBB4FF18700F60802BE905F72A0D7785885CBA9
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaVarErrI4.MSVBVM60(?,0000648E,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E6B6
      • #559.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E6BD
      • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E6D4
      • __vbaNew2.MSVBVM60(00402CA0,0041F3C0,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E6F1
      • __vbaHresultCheckObj.MSVBVM60(00000000,0218EDD4,00402C90,0000001C), ref: 0041E716
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CB0,00000050), ref: 0041E736
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E73F
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$CheckFreeHresult$#559New2
      • String ID:
      • API String ID: 3171936532-0
      • Opcode ID: a2ed2ef3ffd7313335aff2e5b68ff41c4eaa1f76ebbe0adeff4e43cebf24e18e
      • Instruction ID: 9b085fe7b54f27d1e8e62bf7916a8db80ac94c37797e5fd156b37036e07e7e0d
      • Opcode Fuzzy Hash: a2ed2ef3ffd7313335aff2e5b68ff41c4eaa1f76ebbe0adeff4e43cebf24e18e
      • Instruction Fuzzy Hash: A7219D78900244ABDB00AFA5CE49AEEBBB8FF48700F10402BF501F35E0D77854858B68
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00402CA0,0041F3C0,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E3C4
      • __vbaHresultCheckObj.MSVBVM60(00000000,0218EDD4,00402C90,00000014,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E3E9
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CC0,00000118,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E413
      • __vbaI2I4.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E41C
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E425
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$CheckHresult$FreeNew2
      • String ID: *:>K
      • API String ID: 4261391273-1744597861
      • Opcode ID: 3fcf6760a049a77f9feda5be28ee1cb1bad7d5c98f610de63fee2e1290e7a8be
      • Instruction ID: f35e56bf71a076cdf5fece3502bffefb051013c1f1ad50f2e8da73ee155c27b3
      • Opcode Fuzzy Hash: 3fcf6760a049a77f9feda5be28ee1cb1bad7d5c98f610de63fee2e1290e7a8be
      • Instruction Fuzzy Hash: E8116374940218ABCB04DF95CE49EEEBBB8FB18705F14402BF915F32A0D67864858BA9
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DFFA
      • #539.MSVBVM60(?,00000001,00000001,00000001,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E00A
      • __vbaStrVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E014
      • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E01F
      • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E028
      • __vbaFreeStr.MSVBVM60(0041E057), ref: 0041E04F
      • __vbaFreeStr.MSVBVM60 ref: 0041E054
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Free$Move$#539Copy
      • String ID:
      • API String ID: 602717009-0
      • Opcode ID: de0d5a46068007d835a4a367c04c690c57c90dffcc10571f13e013657d0e1602
      • Instruction ID: afe9d5dc07b617d4a23c82e0b0c8fea390ada8d76d3343b65ac675ae7bea415e
      • Opcode Fuzzy Hash: de0d5a46068007d835a4a367c04c690c57c90dffcc10571f13e013657d0e1602
      • Instruction Fuzzy Hash: F1011E75D00249DFCB04DFA5DE49BDEBB74EB18701F10802AE512B71A0EB745945CFA5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00402CA0,0041F3C0,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DF2C
      • __vbaHresultCheckObj.MSVBVM60(00000000,0218EDD4,00402C90,00000014,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DF51
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CC0,00000138,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DF7E
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DF87
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$CheckHresult$FreeNew2
      • String ID: Generablenessbitnivea
      • API String ID: 4261391273-1714275343
      • Opcode ID: 01be1006230f1bcedb8d334086fd289f4033e94c2d25fe41662ac842e4b38420
      • Instruction ID: bf7288f783e5c1d3d76b78825245bd60caefa85570576f342316b25351deee46
      • Opcode Fuzzy Hash: 01be1006230f1bcedb8d334086fd289f4033e94c2d25fe41662ac842e4b38420
      • Instruction Fuzzy Hash: A7113DB4940204BBCB009F95CE4AFDABBB8FB54704F20406BF545F72E0D6B85586CAA9
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaAryConstruct2.MSVBVM60(?,00402B5C,00000011), ref: 0041C750
      • __vbaUI1Str.MSVBVM60(00402B34), ref: 0041C75B
      • __vbaFileOpen.MSVBVM60(00000020,000000FF,00000027,dikteringers), ref: 0041C770
      • __vbaAryDestruct.MSVBVM60(00000000,?,0041C791), ref: 0041C78A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$Construct2DestructFileOpen
      • String ID: dikteringers
      • API String ID: 1429767298-700272923
      • Opcode ID: 0cdbb48806a598a0f51adcedbdb89c3d8cc30fe6809b3357790c7dc48a0d55c2
      • Instruction ID: 1698f67f0930dfa05ffb6cf0e559c6027ec64b37a55cff0092c05c039d5b6d43
      • Opcode Fuzzy Hash: 0cdbb48806a598a0f51adcedbdb89c3d8cc30fe6809b3357790c7dc48a0d55c2
      • Instruction Fuzzy Hash: CB012171980308ABCB14DFA8CE4AFCEBF74EB08B50F10816AF555BA2D4C3B85541CB94
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00402CA0,0041F3C0,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D3C4
      • __vbaHresultCheckObj.MSVBVM60(00000000,0218EDD4,00402C90,00000014), ref: 0041D3E9
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CC0,00000100), ref: 0041D413
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D42E
      • #568.MSVBVM60(000000B3,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D43E
      Memory Dump Source
      • Source File: 00000000.00000002.720336578.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.720221025.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.720239305.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.720361748.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.720387303.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas al Vencimiento 6.jbxd
      Similarity
      • API ID: __vba$CheckHresult$#568FreeNew2
      • String ID:
      • API String ID: 575755541-0
      • Opcode ID: 55eb4606ab71cda27587c7db220d89d18a88670e93d0404e541927e20ccd7809
      • Instruction ID: f626ac595c046e404a3ec50fab700b849e5e2c7445e6d2eba32f43aaea7aa71a
      • Opcode Fuzzy Hash: 55eb4606ab71cda27587c7db220d89d18a88670e93d0404e541927e20ccd7809
      • Instruction Fuzzy Hash: 7721C674D40214ABCB00DB55CD49FDEB7B8FF58701F248027F815F32A0D3B868818AA9
      Uniqueness

      Uniqueness Score: -1.00%