Loading ...

Play interactive tourEdit tour

Analysis Report Facturas Pagadas Al Vencimiento.exe

Overview

General Information

Sample Name:Facturas Pagadas Al Vencimiento.exe
Analysis ID:433561
MD5:c8d357afda8635441bc5838244ca0029
SHA1:026b3b6bafa462c763860afeb21b3cfe05aeb600
SHA256:94bfbe95a21d987080ac95825abde8cf1aa7955fa711c8daeea32ba18590979d
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Checks if the current process is being debugged
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
One or more processes crash
PE file contains strange resources
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • Facturas Pagadas Al Vencimiento.exe (PID: 6040 cmdline: 'C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe' MD5: C8D357AFDA8635441BC5838244CA0029)
    • WerFault.exe (PID: 5540 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 3180 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=1dBTGLOe-ZeMuRpNWg8qsJp7BOE8QNF9s5l"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
Facturas Pagadas Al Vencimiento.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: Facturas Pagadas Al Vencimiento.exeMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1dBTGLOe-ZeMuRpNWg8qsJp7BOE8QNF9s5l"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: Facturas Pagadas Al Vencimiento.exeVirustotal: Detection: 71%Perma Link
    Source: Facturas Pagadas Al Vencimiento.exeMetadefender: Detection: 45%Perma Link
    Source: Facturas Pagadas Al Vencimiento.exeReversingLabs: Detection: 69%
    Source: Facturas Pagadas Al Vencimiento.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1dBTGLOe-ZeMuRpNWg8qsJp7BOE8QNF9s5l
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000002.251983968.000000000073A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

    System Summary:

    barindex
    Potential malicious icon foundShow sources
    Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_004014BC0_2_004014BC
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Source: Facturas Pagadas Al Vencimiento.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.236913139.0000000000610000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs Facturas Pagadas Al Vencimiento.exe
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.228562671.0000000000421000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameGRFTNING.exe vs Facturas Pagadas Al Vencimiento.exe
    Source: Facturas Pagadas Al Vencimiento.exeBinary or memory string: OriginalFilenameGRFTNING.exe vs Facturas Pagadas Al Vencimiento.exe
    Source: Facturas Pagadas Al Vencimiento.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: classification engineClassification label: mal76.rans.troj.winEXE@3/8@0/1
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6040
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C35.tmpJump to behavior
    Source: Facturas Pagadas Al Vencimiento.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Facturas Pagadas Al Vencimiento.exeVirustotal: Detection: 71%
    Source: Facturas Pagadas Al Vencimiento.exeMetadefender: Detection: 45%
    Source: Facturas Pagadas Al Vencimiento.exeReversingLabs: Detection: 69%
    Source: unknownProcess created: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe 'C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe'
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Source: Window RecorderWindow detected: More than 3 window changes detected

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: Facturas Pagadas Al Vencimiento.exe, type: SAMPLE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Facturas Pagadas Al Vencimiento.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.0.Facturas Pagadas Al Vencimiento.exe.400000.7.unpack, type: UNPACKEDPE
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00406C48 push edi; iretd 0_2_00406C4C
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040A4F0 push edi; retf 0_2_0040A4F6
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040B88A push es; ret 0_2_0040B902
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_004018A5 push eax; retn 0041h0_2_004018AD
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040CD40 push FFFFFF87h; ret 0_2_0040CD42
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040AD1C pushfd ; ret 0_2_0040AD2E
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040DE63 push ds; ret 0_2_0040DE6D
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040C20B push FFFFFFF9h; ret 0_2_0040C2DE
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040C20D push FFFFFFF9h; ret 0_2_0040C2DE
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040CAC2 pushad ; ret 0_2_0040CAD2
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00405EC5 push es; ret 0_2_00405EC8
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040D6DA push cs; ret 0_2_0040D6F1
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040BA91 push ss; ret 0_2_0040BA92
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_0040829F push 00000055h; ret 0_2_004082BD
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00409768 push ebp; ret 0_2_0040976D
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00409F3A push 00000048h; ret 0_2_00409F92
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_00409FCB push 00000048h; ret 0_2_00409F92
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeCode function: 0_2_004077DD push ebp; ret 0_2_0040780E
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exeProcess queried: DebugPortJump to behavior
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.237197797.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.237197797.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.237197797.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: Facturas Pagadas Al Vencimiento.exe, 00000000.00000000.237197797.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection2Virtualization/Sandbox Evasion1Input Capture1Security Software Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection2LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Facturas Pagadas Al Vencimiento.exe71%VirustotalBrowse
    Facturas Pagadas Al Vencimiento.exe49%MetadefenderBrowse
    Facturas Pagadas Al Vencimiento.exe70%ReversingLabsWin32.Trojan.Midie

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious

    Private

    IP
    192.168.2.1

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:433561
    Start date:12.06.2021
    Start time:15:09:33
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 26s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:Facturas Pagadas Al Vencimiento.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:25
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal76.rans.troj.winEXE@3/8@0/1
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 14.2% (good quality ratio 2.9%)
    • Quality average: 15.3%
    • Quality standard deviation: 28.6%
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .exe
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
    • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 13.64.90.137, 92.122.145.220, 168.61.161.212, 13.88.21.125, 20.82.210.154, 184.30.20.56, 20.54.26.129, 51.103.5.159, 92.122.213.247, 92.122.213.194
    • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
    • Not all processes where analyzed, report is missing behavior information

    Simulations

    Behavior and APIs

    TimeTypeDescription
    15:10:33API Interceptor2x Sleep call for process: WerFault.exe modified

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Facturas Pagadas_2024e1b44264dba4d9a5d8d4883c883c62d1e68_380e93cd_0c3f9333\Report.wer
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):11524
    Entropy (8bit):3.776556767599868
    Encrypted:false
    SSDEEP:96:UYX3IxwgNFA3gQzFD7DcSpXIQcQ5c6ScE4cw3M+HbHg/TVG4rmMoVazWbSmnFdOx:r4xwg/KC0HnWSZja0I/u7sXS274ItSBw
    MD5:9EA029D2DEC2DAC1871DA0DE53099B26
    SHA1:EC7F053B9C4D11B27BA47633298867D30D4348AE
    SHA-256:DA4F27E735FEA5ECF5F676004681DC59A448345BBB6EA095624B160C2BF7C63A
    SHA-512:FD3C3369C289ED666F47C10EE187B42B089B25C9E49762FD003A5F944B3C8CE00897077152FCC3165F29115C55B02E0DE3B31D6247D5F24F25631B15DBDC9FBD
    Malicious:false
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.8.0.0.9.4.4.1.7.0.5.0.2.1.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.8.0.0.9.4.4.2.2.5.1.9.5.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.0.a.1.6.3.d.7.-.9.a.9.1.-.4.a.6.a.-.9.d.7.5.-.3.f.a.c.1.b.8.d.9.7.9.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.b.5.c.2.0.9.-.b.b.5.0.-.4.6.9.c.-.8.c.f.0.-.1.4.f.e.5.4.6.0.0.8.d.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.a.c.t.u.r.a.s. .P.a.g.a.d.a.s. .A.l. .V.e.n.c.i.m.i.e.n.t.o...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.G.R.F.T.N.I.N.G...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.9.8.-.0.0.0.1.-.0.0.1.7.-.a.1.e.1.-.9.d.b.a.d.7.5.f.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.2.e.9.0.d.e.3.b.2.2.c.3.8.1.3.0.2.7.1.1.4.8.7.a.2.3.3.c.3.1.6.0.0.0.0.3.0.0.4.!.0.0.0.0.0.2.6.b.3.b.6.b.a.f.a.
    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Facturas Pagadas_e1b59d2026da206526c3718df9ca6d5772b50_380e93cd_15f7655d\Report.wer
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):11526
    Entropy (8bit):3.7729071083685213
    Encrypted:false
    SSDEEP:192:4G7zwgC+0HDOgHTja0I/u7sXS274ItSBC:b7zwgCNDHHTjO/u7sXX4ItSw
    MD5:A29547129D5A2CB01A0ACB99A9CDC563
    SHA1:C9AFB5880D3BCA7B7F8D44895DAAECCA6FA30BA5
    SHA-256:35C3B671447641B38440405ABA08AC6B6296BE017A0CE7F9A1D4E394B0C86DB7
    SHA-512:2C3199487863F9191D8BAF336C42F5368241DB588D030449C51DC287E757519F231481CE60D0B5652DBC15CFA3CB07455A38F7D8EC64737FB85BA51635627963
    Malicious:false
    Reputation:low
    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.8.0.0.9.4.3.1.1.2.6.9.2.2.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.8.0.0.9.4.3.1.7.2.0.6.7.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.2.0.e.6.a.7.7.-.8.6.f.8.-.4.d.c.7.-.9.0.d.1.-.4.e.7.5.0.c.9.9.9.b.c.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.2.0.8.1.8.8.c.-.0.a.6.5.-.4.5.b.1.-.a.1.6.0.-.1.a.0.4.f.9.2.2.d.0.4.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.F.a.c.t.u.r.a.s. .P.a.g.a.d.a.s. .A.l. .V.e.n.c.i.m.i.e.n.t.o...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.G.R.F.T.N.I.N.G...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.9.8.-.0.0.0.1.-.0.0.1.7.-.a.1.e.1.-.9.d.b.a.d.7.5.f.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.2.e.9.0.d.e.3.b.2.2.c.3.8.1.3.0.2.7.1.1.4.8.7.a.2.3.3.c.3.1.6.0.0.0.0.3.0.0.4.!.0.0.0.0.0.2.6.b.3.b.6.b.a.f.a.
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C35.tmp.dmp
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Sat Jun 12 22:10:31 2021, 0x1205a4 type
    Category:dropped
    Size (bytes):45970
    Entropy (8bit):2.4100728525187844
    Encrypted:false
    SSDEEP:192:yOh/DVldZ7UACdPlSlCyaLbHT1yn/X2iZs2wbGVfZNMdk3/bS5JdUwa0IkM:LdLLdCdPl1yIcej9/dqDStS0+
    MD5:1631B17E646B5ABB302115F47F42516A
    SHA1:6B9FA3B6E2E47306B33C4622A993A43446ACF02E
    SHA-256:635BAF95212741218C99B5A61B6E547E1DB55CC61C49A900BAE3751D9049964B
    SHA-512:8E83BFF4B35A75032CD9F5FE5273A51FFF4AA62A99D8623AF97D86D471935712CBCC40B2FCDF115B1DAFE52BDE5B1F44CE722B110394F45A717B06C7FDA27B49
    Malicious:false
    Reputation:low
    Preview: MDMP....... ........0.`...................U...........B..............GenuineIntelW...........T............0.`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D8E.tmp.WERInternalMetadata.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8386
    Entropy (8bit):3.693798672862176
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNiZu6IDP6YSySUqFgmfo0vFSBiCprV89btMsfpvm:RrlsNiA6IDP6YXSUqFgmfo0NSOtffM
    MD5:6E948DEB4BF5FCA5846D52C14CEB2F19
    SHA1:98419967C462534BCBD83F4D5992DCFBFD2018B3
    SHA-256:E78B92EC4695D4C464298740C0A83F09392971B5A99D945FE41D2AC318F3841D
    SHA-512:04D3A57C5D51C87FDEBB41DC9D24A49D9369D199F704FE0985A6090D1367CBE6E755DA739EAD1E561E8F1A5AE523E58A4CBFD47B28071E067A09A8C7F44AD5C9
    Malicious:false
    Reputation:low
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.4.0.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E2B.tmp.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4741
    Entropy (8bit):4.490976525072211
    Encrypted:false
    SSDEEP:48:cvIwSD8zsKJgtWI9NpWSC8Bws8fm8M4JXT7/SIFK0C+q8a7lIGCzX3XqPd:uITfYuYSNeJutEHSd
    MD5:5C690A8607E83CF1AC15D11729446481
    SHA1:C1E5152E057B266A70454F0D541FE284F165CE74
    SHA-256:A712512A506D92FC2E5EA1BF56026954E8D67CF61AD60C1CDAA6AED6527858F2
    SHA-512:CA694FD5649DBAB675DCC0B6167867DB16867EDB91607C5B98E29FDC66B954F49D3780A33F9563EBCB2C2ED50F7C7445BB4E62CE5C6600AC460A6DEA67B0EB73
    Malicious:false
    Reputation:low
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1031481" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER8587.tmp.dmp
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Sat Jun 12 22:10:41 2021, 0x1205a4 type
    Category:dropped
    Size (bytes):46862
    Entropy (8bit):2.140785403689248
    Encrypted:false
    SSDEEP:192:sOhCRR2dm20T1yn/72Zhw8mz2EUlSAqzF8ZUU2JSY:BM2opcKZfu7GSDzMJY
    MD5:740B80A74D73165741D221C663BF2747
    SHA1:F9CA62EE3CCA562211EC55E79D567EBB8FD44A22
    SHA-256:4A265581BA51892FC94B803C6E776FF2B2E3FD5004B6E5E7E07FEA1A8F8B8AEC
    SHA-512:5462DC6E03F806A9D063BFA3B7C007C6BBAB750036E861DAF29A248C5D570F09F66C7B503998D015F69572747B0CE24EBDE4DC8443CB39298494C8F6A540D570
    Malicious:false
    Reputation:low
    Preview: MDMP....... ........0.`...................U...........B..............GenuineIntelW...........T............0.`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER86B1.tmp.WERInternalMetadata.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
    Category:dropped
    Size (bytes):8394
    Entropy (8bit):3.6980242405197026
    Encrypted:false
    SSDEEP:192:Rrl7r3GLNiZf6ID9o6YSfSU8Ajgmfo0jFSeCpDi89bBMsfsrm:RrlsNih6ID9o6Y6SU8Ajgmfo05SlBffN
    MD5:F922260DAAF05B490EB120AEF46E81FE
    SHA1:47DA4C10A2B4B214357A85DC16824168DB99251C
    SHA-256:839A6D242FE912CC16F82DF24F0D0214F1F0E20D7816B49B9FAEA715A575A93A
    SHA-512:A619DF416750571E521ABA7F5621A7A8E94239FF26DD07B034C65C37F1B5B06E518D8483EAF160004188C0E670B15D1E59208E208863530EC5C9E227E96F6120
    Malicious:false
    Reputation:low
    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.4.0.<./.P.i.d.>.......
    C:\ProgramData\Microsoft\Windows\WER\Temp\WER874F.tmp.xml
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4741
    Entropy (8bit):4.493586948294421
    Encrypted:false
    SSDEEP:48:cvIwSD8zsKJgtWI9NpWSC8BZ8fm8M4JXT7/SWFlL+q8a7l2GCzX3XqPd:uITfYuYSN4J3vEHSd
    MD5:E02DDF099C74EDBE4B94FCE2858DFE5D
    SHA1:050B6AA8F3393539E468BD039BA4C76DFF46D763
    SHA-256:93E8E1A1BED1CE09C3229858CCE21C853F7F958E1B6A29063875123220844AA6
    SHA-512:63BD92AAA8079571025B78252D1A3002482EDCB79EEEAA3E50FA7D0A104BB22E39F647C16904392FBD51247BBC3DA2669BCFC7EAD6494BE27B3773FA310487C2
    Malicious:false
    Reputation:low
    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1031481" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):4.463887810480926
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.15%
    • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:Facturas Pagadas Al Vencimiento.exe
    File size:135168
    MD5:c8d357afda8635441bc5838244ca0029
    SHA1:026b3b6bafa462c763860afeb21b3cfe05aeb600
    SHA256:94bfbe95a21d987080ac95825abde8cf1aa7955fa711c8daeea32ba18590979d
    SHA512:0630394ea500b46626aeb13033d6d6c213c79f1d7babc187e3bc62e4dc43272b57863fe1cdd33d83312866374801f47b4975f2631c44c96aa23f48150b8498bd
    SSDEEP:1536:8r2A295OAR92knLfapZm5sXu0dtyb/vxG8A:9A295OAR9ffUb+3m
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...hO.`.....................0....................@................

    File Icon

    Icon Hash:20047c7c70f0e004

    Static PE Info

    General

    Entrypoint:0x4014bc
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    DLL Characteristics:
    Time Stamp:0x60BD4F68 [Sun Jun 6 22:42:48 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:54ea68151857c1f30c42224007018bf1

    Entrypoint Preview

    Instruction
    push 00401764h
    call 00007F53D0B73E05h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    xor byte ptr [eax], al
    add byte ptr [eax], al
    dec eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add ch, ah
    leave
    cmp al, 4Fh
    push esi
    arpl word ptr [ebp-32207EBAh], bp
    cmp dword ptr fs:[esi+0000B89Ah], esp
    add byte ptr [eax], al
    add byte ptr [eax], al
    add dword ptr [eax], eax
    add byte ptr [eax], al
    inc edx
    add byte ptr [esi], al
    push eax
    add dword ptr [ecx], 61h
    outsd
    jo 00007F53D0B73E86h
    imul esi, dword ptr [esi+66h], 646C726Fh
    jc 00007F53D0B73E77h
    outsb
    jnc 00007F53D0B73E13h
    add byte ptr [eax], al
    pushad
    jle 00007F53D0B73E2Eh
    add eax, dword ptr [eax]
    add byte ptr [eax], al
    add bh, bh
    int3
    xor dword ptr [eax], eax
    or ah, dl
    xchg eax, ebp
    sub bl, al
    jne 00007F53D0B73DC5h
    jnp 00007F53D0B73E59h
    call far 4E1Ch : 67233F9Ch
    out dx, eax
    daa
    sahf
    stosb
    jmp far AE85h : 4982311Ah
    dec ebp
    xchg eax, esp
    pop esp
    push cs
    push es
    or dword ptr [edx], edi
    dec edi
    lodsd
    xor ebx, dword ptr [ecx-48EE309Ah]
    or al, 00h
    stosb
    add byte ptr [eax-2Dh], ah
    xchg eax, ebx
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    xchg eax, ebp
    add dword ptr [eax], eax
    add byte ptr [edi+00h], cl
    add byte ptr [eax], al
    add byte ptr [ebx], cl
    add byte ptr [edi+ecx*2+52h], dl
    push ebx
    dec ecx
    dec edi
    inc edi
    push edx
    inc ecx
    push eax
    dec eax

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1e6040x28.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x9b8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
    IMAGE_DIRECTORY_ENTRY_IAT0x10000x14c.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1db780x1e000False0.337109375data4.7219788122IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .data0x1f0000x12300x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x210000x9b80x1000False0.178466796875data2.11818351755IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    RT_ICON0x218880x130data
    RT_ICON0x215a00x2e8data
    RT_ICON0x214780x128GLS_BINARY_LSB_FIRST
    RT_GROUP_ICON0x214480x30data
    RT_VERSION0x211500x2f8dataSesotho (Sutu)South Africa

    Imports

    DLLImport
    MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaAryConstruct2, __vbaObjVar, __vbaI2I4, DllFunctionCall, _adj_fpatan, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarErrI4, __vbaFPException, _CIlog, __vbaFileOpen, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaUI1Str, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

    Version Infos

    DescriptionData
    Translation0x0430 0x04b0
    LegalCopyrightTera data
    InternalNameGRFTNING
    FileVersion1.00
    CompanyNameTera data
    LegalTrademarksTera data
    CommentsTera data
    ProductNameTera data
    ProductVersion1.00
    FileDescriptionTera data
    OriginalFilenameGRFTNING.exe

    Possible Origin

    Language of compilation systemCountry where language is spokenMap
    Sesotho (Sutu)South Africa

    Network Behavior

    Network Port Distribution

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jun 12, 2021 15:10:12.102142096 CEST5754453192.168.2.38.8.8.8
    Jun 12, 2021 15:10:12.160832882 CEST53575448.8.8.8192.168.2.3
    Jun 12, 2021 15:10:12.318170071 CEST5598453192.168.2.38.8.8.8
    Jun 12, 2021 15:10:12.369839907 CEST53559848.8.8.8192.168.2.3
    Jun 12, 2021 15:10:12.452097893 CEST6418553192.168.2.38.8.8.8
    Jun 12, 2021 15:10:12.512283087 CEST53641858.8.8.8192.168.2.3
    Jun 12, 2021 15:10:13.467622995 CEST6511053192.168.2.38.8.8.8
    Jun 12, 2021 15:10:13.520572901 CEST53651108.8.8.8192.168.2.3
    Jun 12, 2021 15:10:14.403872013 CEST5836153192.168.2.38.8.8.8
    Jun 12, 2021 15:10:14.454022884 CEST53583618.8.8.8192.168.2.3
    Jun 12, 2021 15:10:15.351442099 CEST6349253192.168.2.38.8.8.8
    Jun 12, 2021 15:10:15.406727076 CEST53634928.8.8.8192.168.2.3
    Jun 12, 2021 15:10:16.326603889 CEST6083153192.168.2.38.8.8.8
    Jun 12, 2021 15:10:16.382205009 CEST53608318.8.8.8192.168.2.3
    Jun 12, 2021 15:10:17.639139891 CEST6010053192.168.2.38.8.8.8
    Jun 12, 2021 15:10:17.692406893 CEST53601008.8.8.8192.168.2.3
    Jun 12, 2021 15:10:18.781671047 CEST5319553192.168.2.38.8.8.8
    Jun 12, 2021 15:10:18.831770897 CEST53531958.8.8.8192.168.2.3
    Jun 12, 2021 15:10:20.404968977 CEST5014153192.168.2.38.8.8.8
    Jun 12, 2021 15:10:20.457632065 CEST53501418.8.8.8192.168.2.3
    Jun 12, 2021 15:10:22.030080080 CEST5302353192.168.2.38.8.8.8
    Jun 12, 2021 15:10:22.080522060 CEST53530238.8.8.8192.168.2.3
    Jun 12, 2021 15:10:22.960958004 CEST4956353192.168.2.38.8.8.8
    Jun 12, 2021 15:10:23.013819933 CEST53495638.8.8.8192.168.2.3
    Jun 12, 2021 15:10:25.462291002 CEST5135253192.168.2.38.8.8.8
    Jun 12, 2021 15:10:25.513123035 CEST53513528.8.8.8192.168.2.3
    Jun 12, 2021 15:10:26.380023956 CEST5934953192.168.2.38.8.8.8
    Jun 12, 2021 15:10:26.430704117 CEST53593498.8.8.8192.168.2.3
    Jun 12, 2021 15:10:27.581918955 CEST5708453192.168.2.38.8.8.8
    Jun 12, 2021 15:10:27.633286953 CEST53570848.8.8.8192.168.2.3
    Jun 12, 2021 15:10:28.657243013 CEST5882353192.168.2.38.8.8.8
    Jun 12, 2021 15:10:28.716032982 CEST53588238.8.8.8192.168.2.3
    Jun 12, 2021 15:10:29.591808081 CEST5756853192.168.2.38.8.8.8
    Jun 12, 2021 15:10:29.650279045 CEST53575688.8.8.8192.168.2.3
    Jun 12, 2021 15:10:30.867782116 CEST5054053192.168.2.38.8.8.8
    Jun 12, 2021 15:10:30.920933008 CEST53505408.8.8.8192.168.2.3
    Jun 12, 2021 15:10:31.782145977 CEST5436653192.168.2.38.8.8.8
    Jun 12, 2021 15:10:31.815999985 CEST5303453192.168.2.38.8.8.8
    Jun 12, 2021 15:10:31.832814932 CEST53543668.8.8.8192.168.2.3
    Jun 12, 2021 15:10:31.868969917 CEST53530348.8.8.8192.168.2.3
    Jun 12, 2021 15:10:32.765168905 CEST5776253192.168.2.38.8.8.8
    Jun 12, 2021 15:10:32.816920042 CEST53577628.8.8.8192.168.2.3
    Jun 12, 2021 15:10:42.059823990 CEST5543553192.168.2.38.8.8.8
    Jun 12, 2021 15:10:42.110271931 CEST53554358.8.8.8192.168.2.3
    Jun 12, 2021 15:10:46.943970919 CEST5071353192.168.2.38.8.8.8
    Jun 12, 2021 15:10:47.005245924 CEST53507138.8.8.8192.168.2.3
    Jun 12, 2021 15:10:51.072354078 CEST5613253192.168.2.38.8.8.8
    Jun 12, 2021 15:10:51.147378922 CEST53561328.8.8.8192.168.2.3
    Jun 12, 2021 15:11:05.160324097 CEST5898753192.168.2.38.8.8.8
    Jun 12, 2021 15:11:05.229918957 CEST53589878.8.8.8192.168.2.3
    Jun 12, 2021 15:11:08.037477970 CEST5657953192.168.2.38.8.8.8
    Jun 12, 2021 15:11:08.096488953 CEST53565798.8.8.8192.168.2.3
    Jun 12, 2021 15:11:17.419631004 CEST6063353192.168.2.38.8.8.8
    Jun 12, 2021 15:11:17.483326912 CEST53606338.8.8.8192.168.2.3
    Jun 12, 2021 15:11:47.839689970 CEST6129253192.168.2.38.8.8.8
    Jun 12, 2021 15:11:47.909065008 CEST53612928.8.8.8192.168.2.3
    Jun 12, 2021 15:11:48.306693077 CEST6361953192.168.2.38.8.8.8
    Jun 12, 2021 15:11:48.376354933 CEST53636198.8.8.8192.168.2.3
    Jun 12, 2021 15:12:12.693031073 CEST6493853192.168.2.38.8.8.8
    Jun 12, 2021 15:12:12.753371954 CEST53649388.8.8.8192.168.2.3

    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:15:10:18
    Start date:12/06/2021
    Path:C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\Facturas Pagadas Al Vencimiento.exe'
    Imagebase:0x400000
    File size:135168 bytes
    MD5 hash:C8D357AFDA8635441BC5838244CA0029
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Reputation:low

    General

    Start time:15:10:30
    Start date:12/06/2021
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Imagebase:0x180000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Reputation:high

    General

    Start time:15:10:41
    Start date:12/06/2021
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6040 -s 696
    Imagebase:0x180000
    File size:434592 bytes
    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Reputation:high

    Disassembly

    Code Analysis

    Reset < >

      Execution Graph

      Execution Coverage:6.9%
      Dynamic/Decrypted Code Coverage:3.5%
      Signature Coverage:0.9%
      Total number of Nodes:227
      Total number of Limit Nodes:12

      Graph

      execution_graph 859 41dc00 860 41dc3a __vbaStrCopy __vbaVarDup #629 __vbaVarTstNe __vbaFreeVarList 859->860 861 41dd09 __vbaFreeStr 860->861 862 41dcdc __vbaVarDup #600 __vbaFreeVar 860->862 862->861 864 41d200 865 41d24a 864->865 866 41d23a __vbaNew2 864->866 867 41d260 __vbaHresultCheckObj 865->867 868 41d26f 865->868 866->865 867->868 869 41d287 __vbaHresultCheckObj 868->869 870 41d299 __vbaFreeObj 868->870 869->870 871 41d2c4 870->871 872 41d2b9 #568 870->872 872->871 980 41c580 981 41c5c0 __vbaAryConstruct2 __vbaUI1Str 980->981 982 41c5e5 __vbaFileOpen 981->982 983 41c5f6 __vbaAryDestruct 981->983 982->983 873 41e200 874 41e24a 873->874 875 41e23a __vbaNew2 873->875 876 41e260 __vbaHresultCheckObj 874->876 877 41e26f 874->877 875->874 876->877 878 41e287 __vbaHresultCheckObj 877->878 879 41e299 __vbaI2I4 __vbaFreeObj 877->879 878->879 880 41e2c4 879->880 891 41d8c0 #673 __vbaFpR8 892 41d934 __vbaFreeVar 891->892 894 41d951 __vbaVarDup #667 __vbaStrMove __vbaFreeVar 892->894 895 41d985 __vbaFreeStr 892->895 894->895 932 41d300 933 41d33a __vbaStrCopy __vbaI4Str #608 __vbaVarTstNe __vbaFreeVar 932->933 934 41d4e2 __vbaFreeObj __vbaFreeStr 933->934 935 41d3b4 933->935 937 41d3cc 935->937 938 41d3bc __vbaNew2 935->938 939 41d493 __vbaHresultCheckObj 937->939 940 41d4a2 __vbaLateIdSt __vbaFreeVar 937->940 938->937 939->940 940->934 941 41df00 942 41df37 6 API calls 941->942 943 41e023 __vbaFreeStr 942->943 944 41dfa4 942->944 945 41dfbc 944->945 946 41dfac __vbaNew2 944->946 948 41dfe1 945->948 949 41dfd2 __vbaHresultCheckObj 945->949 946->945 950 41e000 __vbaHresultCheckObj 948->950 951 41e00f __vbaStrMove __vbaFreeObj 948->951 949->948 950->951 951->943 952 41db00 __vbaStrCopy #618 __vbaStrMove __vbaStrCmp __vbaFreeStr 953 41dbb4 __vbaFreeStr 952->953 954 41db7a 952->954 954->953 955 41dbf6 954->955 957 41dba2 __vbaHresultCheckObj 954->957 955->955 957->953 963 41d9c0 964 41d9f7 __vbaStrCopy __vbaVarDup #522 __vbaVarTstNe __vbaFreeVarList 963->964 965 41daab __vbaFreeStr 964->965 968 41da74 964->968 966 41daf4 966->966 968->965 968->966 969 41da99 __vbaHresultCheckObj 968->969 969->965 912 41d550 __vbaStrCopy 913 41d595 __vbaNew2 912->913 914 41d5a5 912->914 913->914 915 41d5bb __vbaHresultCheckObj 914->915 916 41d5ca 914->916 915->916 917 41d5e5 __vbaHresultCheckObj 916->917 918 41d5f7 __vbaFreeObj 916->918 917->918 919 41d611 __vbaFreeStr 918->919 958 41e110 __vbaStrCopy __vbaVarDup #557 __vbaFreeVar 959 41e190 958->959 960 41e1b2 __vbaFreeStr 958->960 959->960 962 41e1a0 __vbaHresultCheckObj 959->962 962->960 852 40125a 853 40126f 852->853 854 4012d0 __vbaChkstk __vbaExceptHandler 853->854 855 4012ec 853->855 854->855 920 41dd60 921 41dd97 920->921 922 41ddb2 921->922 923 41dda2 __vbaNew2 921->923 924 41ddd7 922->924 925 41ddc8 __vbaHresultCheckObj 922->925 923->922 926 41ddf2 __vbaHresultCheckObj 924->926 927 41de04 __vbaFreeObj 924->927 925->924 926->927 928 41de1e 927->928 970 41e3e0 __vbaStrCopy #516 971 41e435 970->971 972 41e4b8 __vbaFreeStr 970->972 973 41e44d 971->973 974 41e43d __vbaNew2 971->974 976 41e463 __vbaHresultCheckObj 973->976 977 41e472 973->977 974->973 976->977 978 41e4a0 __vbaHresultCheckObj 977->978 979 41e4af __vbaFreeObj 977->979 978->979 979->972 984 41d7a0 __vbaStrCopy __vbaStrCopy __vbaStrToAnsi 985 402974 984->985 986 41d7ff __vbaSetSystemError __vbaFreeStr 985->986 987 41d825 __vbaFpI4 986->987 988 41d86c __vbaFreeStr __vbaFreeStr 986->988 990 41d854 987->990 990->988 991 41d85a __vbaHresultCheckObj 990->991 991->988 929 40df6c 930 41de77 __vbaStrCopy #539 __vbaStrVarMove __vbaStrMove __vbaFreeVar 929->930 931 41dec6 __vbaFreeStr __vbaFreeStr 930->931 746 41c630 747 41c673 __vbaVarDup #557 __vbaFreeVar 746->747 748 41c748 747->748 749 41c76b 747->749 748->749 751 41c755 __vbaHresultCheckObj 748->751 750 41c771 __vbaStrCopy __vbaStrCopy 749->750 752 41c7c1 750->752 751->750 753 41c7d3 __vbaFreeStr 752->753 754 41c7c5 __vbaHresultCheckObj 752->754 755 41c812 __vbaStrCopy 753->755 754->753 845 402974 755->845 757 41c855 __vbaFreeStr 758 41c86a __vbaStrCopy 757->758 759 41c8a7 758->759 760 41c8b9 __vbaFreeStr 759->760 761 41c8ab __vbaHresultCheckObj 759->761 762 41c8e4 __vbaStrCopy 760->762 761->760 763 41c928 762->763 764 41c93a __vbaFreeStr 763->764 765 41c92c __vbaHresultCheckObj 763->765 766 41c97b 764->766 765->764 767 41c98d 766->767 768 41c97f __vbaHresultCheckObj 766->768 769 41c9fc 767->769 770 41c9ee __vbaHresultCheckObj 767->770 768->767 771 41ca32 __vbaStrCopy 769->771 772 41ca24 __vbaHresultCheckObj 769->772 770->769 773 41ca71 __vbaFreeStr 771->773 772->771 774 41caa8 773->774 775 41cad0 __vbaHresultCheckObj 774->775 776 41cade __vbaStrCopy 774->776 775->776 778 41cb55 776->778 779 41cb67 __vbaFreeStr 778->779 780 41cb59 __vbaHresultCheckObj 778->780 781 41cb7c 779->781 780->779 782 41cb90 781->782 783 41cb82 __vbaHresultCheckObj 781->783 784 41cb9c __vbaVarAdd __vbaVarMove __vbaVarTstLt 782->784 783->782 784->784 785 41cbf5 #595 __vbaFreeVarList __vbaStrToAnsi 784->785 786 4027ec 785->786 787 41cc9e __vbaSetSystemError __vbaFreeStr 786->787 788 41cd65 787->788 789 41ccd7 787->789 792 41cd74 __vbaSetSystemError 788->792 790 41ccf0 _adj_fdiv_m64 789->790 791 41cce8 789->791 790->791 795 41cd11 __vbaFpI4 791->795 796 41d1f9 791->796 793 41cd90 792->793 794 41cd88 #571 792->794 797 41cd9a __vbaSetSystemError 793->797 794->793 798 41cd4d 795->798 796->796 799 4028d8 797->799 798->788 800 41cd53 __vbaHresultCheckObj 798->800 801 41cda1 __vbaSetSystemError 799->801 800->788 802 41cdb5 __vbaEnd 801->802 803 41cdbb __vbaRecUniToAnsi 801->803 802->803 804 402920 803->804 805 41cddf __vbaSetSystemError __vbaRecAnsiToUni 804->805 806 41ce71 __vbaStrToAnsi 805->806 807 41ce0c 805->807 808 402974 806->808 809 41ce25 __vbaObjVar __vbaObjSetAddref 807->809 810 41ce15 __vbaNew2 807->810 811 41ce89 __vbaSetSystemError __vbaFreeStr 808->811 812 41ce4a 809->812 810->809 813 41cf00 811->813 814 41ceb8 __vbaFpI4 811->814 815 41ce50 __vbaHresultCheckObj 812->815 816 41ce5f __vbaFreeObj 812->816 819 41cf1e __vbaSetSystemError 813->819 817 41cee4 814->817 815->816 816->806 817->813 818 41ceea __vbaHresultCheckObj 817->818 818->813 820 41cfa3 819->820 821 41cf32 819->821 824 41cfb2 __vbaSetSystemError 820->824 822 41cf4b 821->822 823 41cf3b __vbaNew2 821->823 827 41cf64 __vbaHresultCheckObj 822->827 828 41cf6f 822->828 823->822 825 41d073 824->825 826 41cfca 824->826 831 41d08c __vbaSetSystemError 825->831 829 41cfe3 826->829 830 41cfd3 __vbaNew2 826->830 827->828 836 41cf97 __vbaFreeObj 828->836 837 41cf8c __vbaHresultCheckObj 828->837 834 41d007 829->834 835 41cffc __vbaHresultCheckObj 829->835 830->829 832 41d143 831->832 833 41d0a4 __vbaVarDup #595 __vbaFreeVarList 831->833 838 41d15e __vbaSetSystemError 832->838 833->832 842 41d061 __vbaFreeObj 834->842 843 41d052 __vbaHresultCheckObj 834->843 835->834 836->820 837->836 839 41d172 #568 838->839 840 41d17a __vbaFreeVar __vbaFreeVar 838->840 839->840 842->825 843->842 846 40297d 845->846 856 41e070 857 41e0a7 #648 __vbaFreeVar 856->857 858 41e0e7 857->858 881 41d630 #512 __vbaStrMove __vbaStrCmp __vbaFreeStr 882 41d749 __vbaFreeObj 881->882 883 41d6aa 881->883 885 41d6c2 883->885 886 41d6b2 __vbaNew2 883->886 887 41d6e7 885->887 888 41d6d8 __vbaHresultCheckObj 885->888 886->885 889 41d72b __vbaObjSet __vbaFreeObj 887->889 890 41d71c __vbaHresultCheckObj 887->890 888->887 889->882 890->889 897 41e4f0 898 41e527 __vbaVarErrI4 #559 __vbaFreeVar 897->898 899 41e5c5 898->899 900 41e55f 898->900 901 41e577 900->901 902 41e567 __vbaNew2 900->902 903 41e58d __vbaHresultCheckObj 901->903 904 41e59c 901->904 902->901 903->904 905 41e5ad __vbaHresultCheckObj 904->905 906 41e5bc __vbaFreeObj 904->906 905->906 906->899 907 41e2f0 908 41e327 __vbaLenBstrB 907->908 909 41e383 __vbaFreeVar 908->909 910 41e346 __vbaVarDup #666 __vbaVarMove __vbaFreeVar 908->910 910->909 847 4014bc #100 848 4014fd 847->848

      Executed Functions

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 116 4014bc-4014fb #100 117 401571-40158e 116->117 118 4014fd-401504 116->118 121 401591-4015a0 117->121 122 4015ff-401606 117->122 119 401506-40150d 118->119 120 40156b-401570 118->120 126 40152b-40152c 119->126 127 40150f-40151f 119->127 120->117 124 4015a2-4015fd 121->124 125 40160b 121->125 122->125 124->122 128 401681 125->128 129 40160e-401628 125->129 133 401568-40156a 126->133 127->133 136 401521-40152a 127->136 134 401682-40169f 128->134 130 40162a-40163d 129->130 131 40165c-401662 129->131 140 401673-40167e 130->140 141 40163f-40164f 130->141 137 401664-401665 131->137 138 4016c5-4016cc 131->138 133->120 139 4016a0-4016ae 134->139 136->126 142 401668 137->142 143 4016cd-4016ce 137->143 138->143 144 401720-401721 139->144 145 4016b1-4016c1 139->145 140->128 141->134 147 401651-401658 141->147 146 4016cf-4016d3 142->146 149 40166a-40166b 142->149 143->146 155 401722-40179c 144->155 145->138 150 4016d5-4016ef 146->150 151 401707-40171f 146->151 147->131 149->139 153 40166d-401671 149->153 154 4016f1-401705 150->154 150->155 151->144 153->140 154->151
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: #100
      • String ID: VB5!6&*
      • API String ID: 1341478452-3593831657
      • Opcode ID: 5f3e2e100136f1232d624c4753613b012adc6fe0ec8d1085d54ea81a9ba19397
      • Instruction ID: a6ea99614695e4be4f8370293d5bc7d4b887457d99e0c55c48bf5437bc75f3b0
      • Opcode Fuzzy Hash: 5f3e2e100136f1232d624c4753613b012adc6fe0ec8d1085d54ea81a9ba19397
      • Instruction Fuzzy Hash: CFB1326284E3C19FC7139B708D655A27FB0AE1321431E09DBC4C1DE0F3D22C9A5AC76A
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 41c630-41c746 __vbaVarDup #557 __vbaFreeVar 2 41c748-41c753 0->2 3 41c76b 0->3 2->3 6 41c755-41c769 __vbaHresultCheckObj 2->6 4 41c771-41c7c3 __vbaStrCopy * 2 3->4 8 41c7d3-41c8a9 __vbaFreeStr __vbaStrCopy call 402974 __vbaFreeStr __vbaStrCopy 4->8 9 41c7c5-41c7d1 __vbaHresultCheckObj 4->9 6->4 15 41c8b9-41c92a __vbaFreeStr __vbaStrCopy 8->15 16 41c8ab-41c8b7 __vbaHresultCheckObj 8->16 9->8 19 41c93a-41c97d __vbaFreeStr 15->19 20 41c92c-41c938 __vbaHresultCheckObj 15->20 16->15 22 41c98d-41c9ec 19->22 23 41c97f-41c98b __vbaHresultCheckObj 19->23 20->19 26 41c9fc-41ca22 22->26 27 41c9ee-41c9fa __vbaHresultCheckObj 22->27 23->22 29 41ca32-41cace __vbaStrCopy __vbaFreeStr 26->29 30 41ca24-41ca30 __vbaHresultCheckObj 26->30 27->26 34 41cad0-41cadc __vbaHresultCheckObj 29->34 35 41cade-41cb57 __vbaStrCopy 29->35 30->29 34->35 38 41cb67-41cb80 __vbaFreeStr 35->38 39 41cb59-41cb65 __vbaHresultCheckObj 35->39 41 41cb90-41cb96 38->41 42 41cb82-41cb8e __vbaHresultCheckObj 38->42 39->38 43 41cb9c-41cbf3 __vbaVarAdd __vbaVarMove __vbaVarTstLt 41->43 42->41 43->43 44 41cbf5-41ccd1 #595 __vbaFreeVarList __vbaStrToAnsi call 4027ec __vbaSetSystemError __vbaFreeStr 43->44 47 41cd65-41cd6f call 40283c 44->47 48 41ccd7-41cce6 44->48 52 41cd74-41cd86 __vbaSetSystemError 47->52 50 41ccf0-41ccfc _adj_fdiv_m64 48->50 51 41cce8-41ccee 48->51 53 41cd01-41cd0b 50->53 51->53 54 41cd90-41cdb3 call 40288c __vbaSetSystemError call 4028d8 __vbaSetSystemError 52->54 55 41cd88-41cd8a #571 52->55 56 41cd11-41cd51 __vbaFpI4 53->56 57 41d1f9 53->57 64 41cdb5 __vbaEnd 54->64 65 41cdbb-41ce0a __vbaRecUniToAnsi call 402920 __vbaSetSystemError __vbaRecAnsiToUni 54->65 55->54 56->47 62 41cd53-41cd5f __vbaHresultCheckObj 56->62 57->57 62->47 64->65 68 41ce71-41ceb6 __vbaStrToAnsi call 402974 __vbaSetSystemError __vbaFreeStr 65->68 69 41ce0c-41ce13 65->69 75 41cf00 68->75 76 41ceb8-41cee8 __vbaFpI4 68->76 71 41ce25-41ce4e __vbaObjVar __vbaObjSetAddref 69->71 72 41ce15-41ce1f __vbaNew2 69->72 77 41ce50-41ce59 __vbaHresultCheckObj 71->77 78 41ce5f-41ce6b __vbaFreeObj 71->78 72->71 79 41cf06-41cf30 call 4029bc __vbaSetSystemError 75->79 76->75 82 41ceea-41cefe __vbaHresultCheckObj 76->82 77->78 78->68 84 41cfa3-41cfc4 call 402a00 __vbaSetSystemError 79->84 85 41cf32-41cf39 79->85 82->79 91 41d073-41d09e call 402a50 __vbaSetSystemError 84->91 92 41cfca-41cfd1 84->92 87 41cf4b-41cf62 85->87 88 41cf3b-41cf45 __vbaNew2 85->88 93 41cf64-41cf6d __vbaHresultCheckObj 87->93 94 41cf6f-41cf8a 87->94 88->87 101 41d143-41d170 call 402a9c __vbaSetSystemError 91->101 102 41d0a4-41d140 __vbaVarDup #595 __vbaFreeVarList 91->102 96 41cfe3-41cffa 92->96 97 41cfd3-41cfdd __vbaNew2 92->97 93->94 105 41cf97-41cf9d __vbaFreeObj 94->105 106 41cf8c-41cf95 __vbaHresultCheckObj 94->106 103 41d007-41d050 96->103 104 41cffc-41d005 __vbaHresultCheckObj 96->104 97->96 110 41d172-41d174 #568 101->110 111 41d17a-41d1d9 __vbaFreeVar * 2 101->111 102->101 113 41d061-41d06d __vbaFreeObj 103->113 114 41d052-41d05b __vbaHresultCheckObj 103->114 104->103 105->84 106->105 110->111 113->91 114->113
      APIs
      • __vbaVarDup.MSVBVM60 ref: 0041C716
      • #557.MSVBVM60(?), ref: 0041C723
      • __vbaFreeVar.MSVBVM60 ref: 0041C73D
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402600,0000071C), ref: 0041C767
      • __vbaStrCopy.MSVBVM60(00401180,?), ref: 0041C77B
      • __vbaStrCopy.MSVBVM60 ref: 0041C792
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402600,000006F8), ref: 0041C7D1
      • __vbaFreeStr.MSVBVM60 ref: 0041C7D9
      • __vbaStrCopy.MSVBVM60 ref: 0041C82D
      • __vbaFreeStr.MSVBVM60 ref: 0041C85B
      • __vbaStrCopy.MSVBVM60 ref: 0041C875
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402600,000006FC), ref: 0041C8B7
      • __vbaFreeStr.MSVBVM60 ref: 0041C8BF
      • __vbaStrCopy.MSVBVM60 ref: 0041C8EF
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402600,00000700), ref: 0041C938
      • __vbaFreeStr.MSVBVM60 ref: 0041C940
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402600,00000704), ref: 0041C98B
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402600,00000708), ref: 0041C9FA
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402600,0000070C), ref: 0041CA30
      • __vbaStrCopy.MSVBVM60 ref: 0041CA3D
      • __vbaFreeStr.MSVBVM60 ref: 0041CA77
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402600,00000710), ref: 0041CADC
      • __vbaStrCopy.MSVBVM60 ref: 0041CB30
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,00402600,00000714), ref: 0041CB65
      • __vbaFreeStr.MSVBVM60 ref: 0041CB6D
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,004025D0,000002B4), ref: 0041CB8E
      • __vbaVarAdd.MSVBVM60(?,00000008,?), ref: 0041CBC2
      • __vbaVarMove.MSVBVM60 ref: 0041CBC9
      • __vbaVarTstLt.MSVBVM60(00000002,?), ref: 0041CBEA
      • #595.MSVBVM60(00008003,00000000,?,?,?), ref: 0041CC5B
      • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 0041CC78
      • __vbaStrToAnsi.MSVBVM60(?,Mobbes6,9666ED25), ref: 0041CC92
      • __vbaSetSystemError.MSVBVM60(00000000), ref: 0041CCAA
      • __vbaFreeStr.MSVBVM60 ref: 0041CCC8
      • _adj_fdiv_m64.MSVBVM60 ref: 0041CCFC
      • __vbaFpI4.MSVBVM60(42280000,?,40C00000), ref: 0041CD2B
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,004025D0,000002C0,?,40C00000), ref: 0041CD5F
      • __vbaSetSystemError.MSVBVM60(0034274C,9666ED25), ref: 0041CD7A
      • #571.MSVBVM60(00000063), ref: 0041CD8A
      • __vbaSetSystemError.MSVBVM60(FE2C7C74), ref: 0041CD9A
      • __vbaSetSystemError.MSVBVM60 ref: 0041CDA7
      • __vbaEnd.MSVBVM60 ref: 0041CDB5
      • __vbaRecUniToAnsi.MSVBVM60(00402728,?,?), ref: 0041CDCE
      • __vbaSetSystemError.MSVBVM60(0031C67A,00000000), ref: 0041CDE5
      • __vbaRecAnsiToUni.MSVBVM60(00402728,?,?), ref: 0041CDFA
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0), ref: 0041CE1F
      • __vbaObjVar.MSVBVM60(?), ref: 0041CE31
      • __vbaObjSetAddref.MSVBVM60(?,00000000), ref: 0041CE3F
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,00000010), ref: 0041CE59
      • __vbaFreeObj.MSVBVM60 ref: 0041CE65
      • __vbaStrToAnsi.MSVBVM60(?,Abhorlagerstyringer8), ref: 0041CE7D
      • __vbaSetSystemError.MSVBVM60(00000000), ref: 0041CE8F
      • __vbaFreeStr.MSVBVM60 ref: 0041CEAD
      • __vbaFpI4.MSVBVM60 ref: 0041CEC0
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401180,004025D0,000002C8), ref: 0041CEFC
      • __vbaSetSystemError.MSVBVM60(001DCB78,?,001AC0B5,9666ED25), ref: 0041CF24
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0), ref: 0041CF45
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,0000001C), ref: 0041CF6D
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CAC,00000064), ref: 0041CF95
      • __vbaFreeObj.MSVBVM60 ref: 0041CF9D
      • __vbaSetSystemError.MSVBVM60(FE2C7C74,FE2C7C74), ref: 0041CFB8
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0), ref: 0041CFDD
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,0000001C), ref: 0041D005
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CAC,00000060), ref: 0041D05B
      • __vbaFreeObj.MSVBVM60 ref: 0041D067
      • __vbaSetSystemError.MSVBVM60(004738FF,FE2C7C74,FE2C7C74,00448DA2), ref: 0041D092
      • __vbaVarDup.MSVBVM60 ref: 0041D0F2
      • #595.MSVBVM60(?,00000000,?,?,?), ref: 0041D116
      • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0041D13A
      • __vbaSetSystemError.MSVBVM60(003EFA1E,9666ED25), ref: 0041D164
      • #568.MSVBVM60(0000001E), ref: 0041D174
      • __vbaFreeVar.MSVBVM60(0041D1DA), ref: 0041D1D2
      • __vbaFreeVar.MSVBVM60 ref: 0041D1D7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$CheckHresult$Free$ErrorSystem$Copy$Ansi$New2$#595List$#557#568#571AddrefMove_adj_fdiv_m64
      • String ID: 7-7-7$Abhorlagerstyringer8$ECHESSTRIKKEGARNERNE$FAGBEVGELSER$Forhindringslbene5$Generablenessbitnivea$MAXILNGDES$Mentation5$Mobbes6$PRg$Rabarbergrdens1$Underlivssygdoms$dddd$i1,$inchamber$j57$n]$stakkequantisesamphi$vd
      • API String ID: 3255940769-2400406674
      • Opcode ID: 2286620ca421027be3d5757f4616a8f7b8a59af013d0e07b865e4e9c96fe17fe
      • Instruction ID: 1c506ac426c7594ec2cc0800950d7c5936de1471703447b537eee888befbfee4
      • Opcode Fuzzy Hash: 2286620ca421027be3d5757f4616a8f7b8a59af013d0e07b865e4e9c96fe17fe
      • Instruction Fuzzy Hash: 175281B0940219AFDB24DF50DD88FDAB7B8EF48705F1041AAF249B7190DBB45A85CF68
      Uniqueness

      Uniqueness Score: -1.00%

      Non-executed Functions

      Control-flow Graph

      APIs
      • __vbaVarDup.MSVBVM60 ref: 0041DF5A
      • #591.MSVBVM60(?), ref: 0041DF64
      • __vbaStrMove.MSVBVM60 ref: 0041DF75
      • __vbaStrCmp.MSVBVM60(String,00000000), ref: 0041DF7D
      • __vbaFreeStr.MSVBVM60 ref: 0041DF90
      • __vbaFreeVar.MSVBVM60 ref: 0041DF99
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0), ref: 0041DFB6
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,0000004C), ref: 0041DFDB
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402D10,00000024), ref: 0041E009
      • __vbaStrMove.MSVBVM60 ref: 0041E018
      • __vbaFreeObj.MSVBVM60 ref: 0041E01D
      • __vbaFreeStr.MSVBVM60(0041E050), ref: 0041E049
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$CheckHresultMove$#591New2
      • String ID: AIRPORT$String$stakkequantisesamphi
      • API String ID: 1960000165-2758877968
      • Opcode ID: 6e6de76e73fc4e516c1b139133c41a352bd416d3a9000c91e3ef47d1af8138dc
      • Instruction ID: 5c53ebd34566d4f060092860e9737ad9c2f736007af54a82bc23b527de218dd1
      • Opcode Fuzzy Hash: 6e6de76e73fc4e516c1b139133c41a352bd416d3a9000c91e3ef47d1af8138dc
      • Instruction Fuzzy Hash: CA314074900219EBCB14DF95DE499EEBBB4FF58704F10412AE901B32A0D7B85945CB58
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041D367
      • __vbaI4Str.MSVBVM60(00402CD0), ref: 0041D372
      • #608.MSVBVM60(?,00000000), ref: 0041D37D
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041D399
      • __vbaFreeVar.MSVBVM60 ref: 0041D3A5
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0), ref: 0041D3C6
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,00000044), ref: 0041D49C
      • __vbaLateIdSt.MSVBVM60(?,00000000), ref: 0041D4D3
      • __vbaFreeVar.MSVBVM60 ref: 0041D4DC
      • __vbaFreeObj.MSVBVM60(0041D520), ref: 0041D510
      • __vbaFreeStr.MSVBVM60 ref: 0041D519
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$#608CheckCopyHresultLateNew2
      • String ID: Abhorlagerstyringer8
      • API String ID: 1142404513-2192159559
      • Opcode ID: 7a0a5e527309c5dab745b373e19e9749e15eb4043a8c7e2ee8ed2e78a6463dc2
      • Instruction ID: 20e86767211a625e44834e2a19053fbe2e53b5e75779c37eac627a63fa1dc932
      • Opcode Fuzzy Hash: 7a0a5e527309c5dab745b373e19e9749e15eb4043a8c7e2ee8ed2e78a6463dc2
      • Instruction Fuzzy Hash: 946105B0D01218DFCB04DFA8DA89A9DBBB4FF48704F20C16AE409AB351D7759946CF94
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041DC58
      • __vbaVarDup.MSVBVM60 ref: 0041DC83
      • #629.MSVBVM60(?,?,00000001,?), ref: 0041DC93
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041DCB8
      • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 0041DCCE
      • __vbaVarDup.MSVBVM60 ref: 0041DCF0
      • #600.MSVBVM60(?,00000002), ref: 0041DCF8
      • __vbaFreeVar.MSVBVM60 ref: 0041DD03
      • __vbaFreeStr.MSVBVM60(0041DD37), ref: 0041DD30
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$#600#629CopyList
      • String ID: Generablenessbitnivea
      • API String ID: 3038482304-1714275343
      • Opcode ID: acddb5484b3e0e7e796480fecba725cec68c465bcebdd560aefad694a3a3b342
      • Instruction ID: 8c5ac99677db49bf3f8db40310f0fcbd83aa9cb25ddf5ef00e12905d69efe1d5
      • Opcode Fuzzy Hash: acddb5484b3e0e7e796480fecba725cec68c465bcebdd560aefad694a3a3b342
      • Instruction Fuzzy Hash: 7731F5B1810228EFCB10DFA4DD88ADDBBB8FB48704F10815AE105A7290DBB45949CFA5
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D7E0
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D7E8
      • __vbaStrToAnsi.MSVBVM60(?,Indtrykker4,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D7F3
      • __vbaSetSystemError.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D801
      • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D81A
      • __vbaFpI4.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D830
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,004025D0,000002C8,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D866
      • __vbaFreeStr.MSVBVM60(0041D896), ref: 0041D88E
      • __vbaFreeStr.MSVBVM60 ref: 0041D893
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$Copy$AnsiCheckErrorHresultSystem
      • String ID: Indtrykker4
      • API String ID: 2456558797-126329048
      • Opcode ID: dc5a99cc17f2c90df6bf25ccec4b5336b2c462be703901eb22e9a9e5c3fa82e6
      • Instruction ID: 88b8aa6b14f7c13a5743bea83aa0e018d727a95f6644cdac54b229180ecd0f83
      • Opcode Fuzzy Hash: dc5a99cc17f2c90df6bf25ccec4b5336b2c462be703901eb22e9a9e5c3fa82e6
      • Instruction Fuzzy Hash: 2421B0B1C40219ABCB14EF61DE499EEBF78EF58790F104026FA01B72A0DB741945CBA8
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 204 41d8c0-41d932 #673 __vbaFpR8 205 41d934-41d939 204->205 206 41d93b 204->206 207 41d93d-41d94f __vbaFreeVar 205->207 206->207 208 41d951-41d983 __vbaVarDup #667 __vbaStrMove __vbaFreeVar 207->208 209 41d985-41d9a0 __vbaFreeStr 207->209 208->209
      APIs
      • #673.MSVBVM60(00000000,40280000,00000000,3FF00000,00000000,3FF00000,00000000,3FF00000,?), ref: 0041D91B
      • __vbaFpR8.MSVBVM60 ref: 0041D921
      • __vbaFreeVar.MSVBVM60 ref: 0041D94A
      • __vbaVarDup.MSVBVM60 ref: 0041D965
      • #667.MSVBVM60(00000002), ref: 0041D96F
      • __vbaStrMove.MSVBVM60 ref: 0041D97A
      • __vbaFreeVar.MSVBVM60 ref: 0041D983
      • __vbaFreeStr.MSVBVM60(0041D9A1), ref: 0041D99A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$#667#673Move
      • String ID: Generablenessbitnivea
      • API String ID: 1795453576-1714275343
      • Opcode ID: 3ae6f8913cd669990ab44c5dd52e77a573c7313df06c385752ffae39b019039c
      • Instruction ID: 899ac447f112ca5ab891a2c2d9295d6589279ea99d41affff6287f21166c1537
      • Opcode Fuzzy Hash: 3ae6f8913cd669990ab44c5dd52e77a573c7313df06c385752ffae39b019039c
      • Instruction Fuzzy Hash: 812151B1C00109ABCB04DFA5DF89BEEB7B8FB08745F204169E541B22A4DB746E45CF69
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • #512.MSVBVM60(00402D00,00000002), ref: 0041D671
      • __vbaStrMove.MSVBVM60 ref: 0041D67C
      • __vbaStrCmp.MSVBVM60(00402D0C,00000000), ref: 0041D688
      • __vbaFreeStr.MSVBVM60 ref: 0041D69B
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0), ref: 0041D6BC
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,0000004C), ref: 0041D6E1
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402D10,0000001C), ref: 0041D725
      • __vbaObjSet.MSVBVM60(?,?), ref: 0041D73A
      • __vbaFreeObj.MSVBVM60 ref: 0041D743
      • __vbaFreeObj.MSVBVM60(0041D77E), ref: 0041D777
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$CheckHresult$#512MoveNew2
      • String ID:
      • API String ID: 2567612295-0
      • Opcode ID: ee2d4821bc1f903b44d6fae543a212fa15949565442d38f0f81a16c4b66a477f
      • Instruction ID: c032454cf80a4b2eda38b0934c3614cbff27b060431469753513e862b3c7607b
      • Opcode Fuzzy Hash: ee2d4821bc1f903b44d6fae543a212fa15949565442d38f0f81a16c4b66a477f
      • Instruction Fuzzy Hash: DF3150B0900218EBDB14DF95DE49ADEBBB8FF48701F20412AE945F72A0D7785945CBA8
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 223 41db00-41db78 __vbaStrCopy #618 __vbaStrMove __vbaStrCmp __vbaFreeStr 224 41dbb4-41dbd6 __vbaFreeStr 223->224 225 41db7a-41db89 223->225 226 41dbf6 225->226 227 41db8b-41dba0 225->227 226->226 227->224 230 41dba2-41dbae __vbaHresultCheckObj 227->230 230->224
      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,004012D6), ref: 0041DB39
      • #618.MSVBVM60(?,00000001,?,?,?,?,?,?,?,?,004012D6), ref: 0041DB45
      • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,004012D6), ref: 0041DB50
      • __vbaStrCmp.MSVBVM60(00402D60,00000000,?,?,?,?,?,?,?,?,004012D6), ref: 0041DB5C
      • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,004012D6), ref: 0041DB6F
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,004025D0,00000084,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DBAE
      • __vbaFreeStr.MSVBVM60(0041DBD7), ref: 0041DBD0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$#618CheckCopyHresultMove
      • String ID: var
      • API String ID: 592353017-1842382598
      • Opcode ID: 33e36e849ec0ca678fe8c027a43b03a3b3c94ea942beb6d4313aae297f06a140
      • Instruction ID: f2abc3237e8a0c19798317378e3d3d2f154e3e6414dcab5d8d05d7927f082734
      • Opcode Fuzzy Hash: 33e36e849ec0ca678fe8c027a43b03a3b3c94ea942beb6d4313aae297f06a140
      • Instruction Fuzzy Hash: C9218174D40105EBCB109F54DE49AEEBB78FF08701F11416AE942B32E0CB781985CB99
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 231 41d550-41d593 __vbaStrCopy 232 41d5a5-41d5b9 231->232 233 41d595-41d59f __vbaNew2 231->233 235 41d5bb-41d5c4 __vbaHresultCheckObj 232->235 236 41d5ca-41d5e3 232->236 233->232 235->236 238 41d5e5-41d5f1 __vbaHresultCheckObj 236->238 239 41d5f7-41d61a __vbaFreeObj __vbaFreeStr 236->239 238->239
      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D587
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D59F
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,00000014,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D5C4
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CBC,00000138,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D5F1
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D5FA
      • __vbaFreeStr.MSVBVM60(0041D61B,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D614
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$CheckFreeHresult$CopyNew2
      • String ID: penetrancy
      • API String ID: 3978771648-2862842630
      • Opcode ID: e67b23dc1a8a4f6aca74fb13f12aae3e40ad280111b9de58c14bf78419b425ff
      • Instruction ID: efc14aa7d3f6c450c66ed766238e6b1322676a3dbb26bb6da62429b6ec9d7e3f
      • Opcode Fuzzy Hash: e67b23dc1a8a4f6aca74fb13f12aae3e40ad280111b9de58c14bf78419b425ff
      • Instruction Fuzzy Hash: 061160B0940205ABDB14DF54CE4AEEEBBB8FB58701F204127F505F31E0D7745585CAA9
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 241 41e110-41e18e __vbaStrCopy __vbaVarDup #557 __vbaFreeVar 242 41e190-41e19e 241->242 243 41e1b2-41e1db __vbaFreeStr 241->243 242->243 246 41e1a0-41e1ac __vbaHresultCheckObj 242->246 246->243
      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E14A
      • __vbaVarDup.MSVBVM60 ref: 0041E164
      • #557.MSVBVM60(?), ref: 0041E16E
      • __vbaFreeVar.MSVBVM60 ref: 0041E185
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402600,0000071C), ref: 0041E1AC
      • __vbaFreeStr.MSVBVM60(0041E1DC), ref: 0041E1D5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$#557CheckCopyHresult
      • String ID: 7-7-7
      • API String ID: 400132357-1053354141
      • Opcode ID: 2f05f71067ded4ddc0b3035411f63e84704510dc57d4280d08d86cb1754a5fbb
      • Instruction ID: e83486beffe51088c9b2ee67b202b40823170cfdd5884b4b70c55a7f866ae462
      • Opcode Fuzzy Hash: 2f05f71067ded4ddc0b3035411f63e84704510dc57d4280d08d86cb1754a5fbb
      • Instruction Fuzzy Hash: 61118774C01209EBCB04DFA5DA49ADEBB74FF14700F10812AE801B75A0D7745945CF69
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$#666BstrMove
      • String ID: Amagermadders3
      • API String ID: 2589103371-518441997
      • Opcode ID: 8547d1a91256089206e3596cb7d4e547dd70d7ab1b86845974af1e9fc0e176f9
      • Instruction ID: 8182846e64e33a909989e2372d58b4c9b024265b326ea5b80334f2e66b35b31c
      • Opcode Fuzzy Hash: 8547d1a91256089206e3596cb7d4e547dd70d7ab1b86845974af1e9fc0e176f9
      • Instruction Fuzzy Hash: B311D7B4C00249EBCB00DF94DA89ACDBFB8FF48705F10815AF401B76A4D7B81989CB99
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaStrCopy.MSVBVM60 ref: 0041DA0F
      • __vbaVarDup.MSVBVM60 ref: 0041DA29
      • #522.MSVBVM60(?,?), ref: 0041DA37
      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041DA53
      • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041DA66
      • __vbaHresultCheckObj.MSVBVM60(00000000,00401208,004025D0,00000084), ref: 0041DAA5
      • __vbaFreeStr.MSVBVM60(0041DAD5), ref: 0041DACE
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$#522CheckCopyHresultList
      • String ID:
      • API String ID: 101959151-0
      • Opcode ID: 0a49b0e6daeb0e4723f4920b6d29c503952f6023fd2793d6be574ec82b8ef3cb
      • Instruction ID: b7b156cd76bafcecbbe3baac2bb129b2862aa39542046b9d3affd1a26464b4da
      • Opcode Fuzzy Hash: 0a49b0e6daeb0e4723f4920b6d29c503952f6023fd2793d6be574ec82b8ef3cb
      • Instruction Fuzzy Hash: 783146B0C00249ABCB00DF94D988AEEFFB8FF58704F10851AE545B72A0D7B45589CF69
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaVarErrI4.MSVBVM60(?,0000648E,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E536
      • #559.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E53D
      • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E554
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E571
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,0000001C), ref: 0041E596
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CAC,00000050), ref: 0041E5B6
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E5BF
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$CheckFreeHresult$#559New2
      • String ID:
      • API String ID: 3171936532-0
      • Opcode ID: 31755a79dc863be21276d05616d63058e39f022dbb771b2537fa65fb3f52c116
      • Instruction ID: 0798f42a38d5d688e458dd4ed7917b7e69d2242546db28fdbd7f1393e821792c
      • Opcode Fuzzy Hash: 31755a79dc863be21276d05616d63058e39f022dbb771b2537fa65fb3f52c116
      • Instruction Fuzzy Hash: 53219078900244EBDB10AFA5CE49AEEBFB9FF48704F10402BF501F31A0D77855828B68
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E41A
      • #516.MSVBVM60(00402CDC,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E425
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E447
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,0000004C), ref: 0041E46C
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402D10,0000002C), ref: 0041E4A9
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E4B2
      • __vbaFreeStr.MSVBVM60(0041E4D3,?,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E4CC
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$CheckFreeHresult$#516CopyNew2
      • String ID:
      • API String ID: 742114213-0
      • Opcode ID: 3a33a085d3c05f40fbe405be33fea8a8e08105136c39eede7eb5bced538454c6
      • Instruction ID: aa0fba7c589133053b453d7b7152c341a6f1b5e33c6f078f8bb56a6e01046427
      • Opcode Fuzzy Hash: 3a33a085d3c05f40fbe405be33fea8a8e08105136c39eede7eb5bced538454c6
      • Instruction Fuzzy Hash: C6219F74900205EFDB04DF95CA49ADEBBB4FF48700F20802BE945F72A0D7785985CBA9
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E244
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,00000014,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E269
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CBC,00000118,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E293
      • __vbaI2I4.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E29C
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041E2A5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$CheckHresult$FreeNew2
      • String ID: *:>K
      • API String ID: 4261391273-1744597861
      • Opcode ID: b1b2aa4e03aefe6bbbec172f20a46d7db6e9d1805fb5a9f366fd3ce2bf14addd
      • Instruction ID: b3482982f9fe15922e01429ad109d1ad9cbf6900ed1ff56ea03b5bf39c95b5e5
      • Opcode Fuzzy Hash: b1b2aa4e03aefe6bbbec172f20a46d7db6e9d1805fb5a9f366fd3ce2bf14addd
      • Instruction Fuzzy Hash: 3B119374940218AFDB04DF96CE49EEEBBBCFB18700F10406BF905F32A0D67855858BA8
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DE7A
      • #539.MSVBVM60(?,00000001,00000001,00000001,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DE8A
      • __vbaStrVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DE94
      • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DE9F
      • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DEA8
      • __vbaFreeStr.MSVBVM60(0041DED7), ref: 0041DECF
      • __vbaFreeStr.MSVBVM60 ref: 0041DED4
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$Move$#539Copy
      • String ID:
      • API String ID: 602717009-0
      • Opcode ID: 60e40e99383cac3c8f0a159078a5a471e48aaaac025b06a6d05fc387bcec4f1d
      • Instruction ID: 211c1ff9f3fa9503c494fab271d7933cba4c939a0907b1826060bee7fe07ab76
      • Opcode Fuzzy Hash: 60e40e99383cac3c8f0a159078a5a471e48aaaac025b06a6d05fc387bcec4f1d
      • Instruction Fuzzy Hash: CD011E71D00249DFCB04DFA4DE49BDEBB74EB18701F10802AE512B75A0EB745945CFA5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DE7A
      • #539.MSVBVM60(?,00000001,00000001,00000001,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DE8A
      • __vbaStrVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DE94
      • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DE9F
      • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DEA8
      • __vbaFreeStr.MSVBVM60(0041DED7), ref: 0041DECF
      • __vbaFreeStr.MSVBVM60 ref: 0041DED4
      Memory Dump Source
      • Source File: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Free$Move$#539Copy
      • String ID:
      • API String ID: 602717009-0
      • Opcode ID: 062a5767022abc8e4cec8aa812fd7015ea7f94117fa93f4adcfcce68afa64b94
      • Instruction ID: a218a64bd59ea96a2749f4da53b0db40172508048fae6a011051069e40661559
      • Opcode Fuzzy Hash: 062a5767022abc8e4cec8aa812fd7015ea7f94117fa93f4adcfcce68afa64b94
      • Instruction Fuzzy Hash: CBF01DB1C40249CBCF04DFA0EE49AED7734EB18302F108029E1527A5B0DB745685CF55
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DDAC
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,00000014,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DDD1
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CBC,00000138,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DDFE
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,004012D6), ref: 0041DE07
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$CheckHresult$FreeNew2
      • String ID: Generablenessbitnivea
      • API String ID: 4261391273-1714275343
      • Opcode ID: 09d1d12dcdc7a890b4f388ff128e6233f0f7815727146e6a8cd0583b9ff3f24d
      • Instruction ID: a9bde41df517a60458a420625a1ab6136d2888d2e7fad34ea439bdf2f43837d4
      • Opcode Fuzzy Hash: 09d1d12dcdc7a890b4f388ff128e6233f0f7815727146e6a8cd0583b9ff3f24d
      • Instruction Fuzzy Hash: 62115EB1A40604ABCB109F95CE49FDABFB8FB58704F104067F541F72E0D7B85982CAA8
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaAryConstruct2.MSVBVM60(?,00402B58,00000011), ref: 0041C5D0
      • __vbaUI1Str.MSVBVM60(00402B30), ref: 0041C5DB
      • __vbaFileOpen.MSVBVM60(00000020,000000FF,00000027,dikteringers), ref: 0041C5F0
      • __vbaAryDestruct.MSVBVM60(00000000,?,0041C611), ref: 0041C60A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$Construct2DestructFileOpen
      • String ID: dikteringers
      • API String ID: 1429767298-700272923
      • Opcode ID: 5ffa5469cc6c6d4234d2e58e8c53087094aa25e3ee39bf47b307da304a6fe653
      • Instruction ID: 2f8f11b67df2d858c9bb2c5e87a26682a655a52952ad5532c7cf96a0f59dba60
      • Opcode Fuzzy Hash: 5ffa5469cc6c6d4234d2e58e8c53087094aa25e3ee39bf47b307da304a6fe653
      • Instruction Fuzzy Hash: 9C012171980248EBCB14DFA8CE4ABCEBF74EB48B50F10812AF555BA2D0C7B86541CB94
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __vbaNew2.MSVBVM60(00402C9C,0041F3C0,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D244
      • __vbaHresultCheckObj.MSVBVM60(00000000,005EEDD4,00402C8C,00000014), ref: 0041D269
      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00402CBC,00000100), ref: 0041D293
      • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D2AE
      • #568.MSVBVM60(000000B3,?,?,?,?,?,?,?,?,?,?,?,?,004012D6), ref: 0041D2BE
      Memory Dump Source
      • Source File: 00000000.00000002.251700693.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.251673652.0000000000400000.00000002.00020000.sdmp Download File
      • Associated: 00000000.00000002.251679250.0000000000401000.00000020.00020000.sdmp Download File
      • Associated: 00000000.00000002.251707431.000000000041F000.00000004.00020000.sdmp Download File
      • Associated: 00000000.00000002.251713582.0000000000421000.00000002.00020000.sdmp Download File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_Facturas Pagadas Al Vencimiento.jbxd
      Similarity
      • API ID: __vba$CheckHresult$#568FreeNew2
      • String ID:
      • API String ID: 575755541-0
      • Opcode ID: 89629db3dca6d6e7bb7afacd9593b11d1788586d592765de329ed5aac03ad74d
      • Instruction ID: dbe345694a245fdaa23d6683cef54c1253d844e3224ed668d2030c6bb47a2c7d
      • Opcode Fuzzy Hash: 89629db3dca6d6e7bb7afacd9593b11d1788586d592765de329ed5aac03ad74d
      • Instruction Fuzzy Hash: 1221C3B4D40614ABDB049B55CD49FEFBBB8FB5C700F144067F815F32A0D37858818AA8
      Uniqueness

      Uniqueness Score: -1.00%