Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
presupuesto urgente.exe

Overview

General Information

Sample name:presupuesto urgente.exe
Analysis ID:1525571
MD5:8ae672783481c0b46780431bfce5a216
SHA1:ace989f4c2a82f48cc3167e531ab13d2999537b2
SHA256:5e279ef4c54dfc525f423b98054f37ee6eb51a71e8c1f76d5438393055442173
Tags:exeuser-threatcat_ch
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • presupuesto urgente.exe (PID: 2612 cmdline: "C:\Users\user\Desktop\presupuesto urgente.exe" MD5: 8AE672783481C0B46780431BFCE5A216)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4503986910.0000000004438000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: presupuesto urgente.exeAvira: detected
    Source: presupuesto urgente.exeReversingLabs: Detection: 18%
    Source: presupuesto urgente.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: presupuesto urgente.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_004066F3 FindFirstFileW,FindClose,0_2_004066F3
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405ABE
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00402862 FindFirstFileW,0_2_00402862
    Source: presupuesto urgente.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00405553 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405553
    Source: C:\Users\user\Desktop\presupuesto urgente.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403489
    Source: C:\Users\user\Desktop\presupuesto urgente.exeFile created: C:\Windows\resources\0809Jump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00404D900_2_00404D90
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00406ABA0_2_00406ABA
    Source: presupuesto urgente.exeStatic PE information: invalid certificate
    Source: presupuesto urgente.exe, 00000000.00000000.2045126216.0000000000457000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameloyaliteters radierne.exeR vs presupuesto urgente.exe
    Source: presupuesto urgente.exeBinary or memory string: OriginalFilenameloyaliteters radierne.exeR vs presupuesto urgente.exe
    Source: presupuesto urgente.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal68.troj.evad.winEXE@1/8@0/0
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403489
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00404814 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404814
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_004020FE CoCreateInstance,0_2_004020FE
    Source: C:\Users\user\Desktop\presupuesto urgente.exeFile created: C:\Users\user\AppData\Local\Temp\nsq6CC2.tmpJump to behavior
    Source: presupuesto urgente.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\presupuesto urgente.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: presupuesto urgente.exeReversingLabs: Detection: 18%
    Source: C:\Users\user\Desktop\presupuesto urgente.exeFile read: C:\Users\user\Desktop\presupuesto urgente.exeJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\presupuesto urgente.exeFile written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Gaulin.iniJump to behavior
    Source: presupuesto urgente.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.4503986910.0000000004438000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
    Source: C:\Users\user\Desktop\presupuesto urgente.exeFile created: C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\presupuesto urgente.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\presupuesto urgente.exeRDTSC instruction interceptor: First address: 4421061 second address: 4421061 instructions: 0x00000000 rdtsc 0x00000002 test al, cl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F4AF8BA4C18h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\presupuesto urgente.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_004066F3 FindFirstFileW,FindClose,0_2_004066F3
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405ABE
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00402862 FindFirstFileW,0_2_00402862
    Source: C:\Users\user\Desktop\presupuesto urgente.exeAPI call chain: ExitProcess graph end nodegraph_0-4671
    Source: C:\Users\user\Desktop\presupuesto urgente.exeAPI call chain: ExitProcess graph end nodegraph_0-4513
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
    Source: C:\Users\user\Desktop\presupuesto urgente.exeCode function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403489
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    presupuesto urgente.exe18%ReversingLabsWin32.Trojan.Generic
    presupuesto urgente.exe100%AviraHEUR/AGEN.1331786
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dll0%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorpresupuesto urgente.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1525571
    Start date and time:2024-10-04 11:47:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 24s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:presupuesto urgente.exe
    Detection:MAL
    Classification:mal68.troj.evad.winEXE@1/8@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 48
    • Number of non-executed functions: 33
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
    • Report size getting too big, too many NtSetInformationFile calls found.
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dllPEDIDO-144797.exeGet hashmaliciousFormBook, GuLoaderBrowse
      PEDIDO-144797.exeGet hashmaliciousGuLoaderBrowse
        rpedido-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
          rpedido-002297.exeGet hashmaliciousGuLoaderBrowse
            FACTURA-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
              FACTURA-002297.exeGet hashmaliciousGuLoaderBrowse
                LisectAVT_2403002A_41.exeGet hashmaliciousGuLoaderBrowse
                  LisectAVT_2403002A_41.exeGet hashmaliciousGuLoaderBrowse
                    Inventory_list.img.exeGet hashmaliciousGuLoaderBrowse
                      Inventory_list.img.exeGet hashmaliciousGuLoaderBrowse
                        Process:C:\Users\user\Desktop\presupuesto urgente.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):11776
                        Entropy (8bit):5.659384359264642
                        Encrypted:false
                        SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                        MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                        SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                        SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                        SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        • Antivirus: Virustotal, Detection: 0%, Browse
                        Joe Sandbox View:
                        • Filename: PEDIDO-144797.exe, Detection: malicious, Browse
                        • Filename: PEDIDO-144797.exe, Detection: malicious, Browse
                        • Filename: rpedido-002297.exe, Detection: malicious, Browse
                        • Filename: rpedido-002297.exe, Detection: malicious, Browse
                        • Filename: FACTURA-002297.exe, Detection: malicious, Browse
                        • Filename: FACTURA-002297.exe, Detection: malicious, Browse
                        • Filename: LisectAVT_2403002A_41.exe, Detection: malicious, Browse
                        • Filename: LisectAVT_2403002A_41.exe, Detection: malicious, Browse
                        • Filename: Inventory_list.img.exe, Detection: malicious, Browse
                        • Filename: Inventory_list.img.exe, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\presupuesto urgente.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1373370
                        Entropy (8bit):3.900890255684548
                        Encrypted:false
                        SSDEEP:12288:Xmz13uukjak7s0jS8vhL91GbgdQZIKfMiaDacDU0A0K:UNuzD+gDUrR
                        MD5:DA817DD2FF7DF00798124C9316B89865
                        SHA1:924BED611E5CA8AE2A767779353A3C50022C4B84
                        SHA-256:C1C4F27D850CCA276D4665B5F5B2254837831EE462009A03B39781E28DDF8CE9
                        SHA-512:ABDDBCDF8FFA41AC84DF645C3B355A3A59C0AA55FFA4C758015D29B73CA7D9411ABFB9FF98422ABE39D4A808287FE236D017330D15B5DAA27CFA1E3B11F83D40
                        Malicious:false
                        Reputation:low
                        Preview:.8......,........................)......t7.......8..........................................................................................................................................................................................................................................G...J...........%...j...............................................................................................................................U...............'...'...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\presupuesto urgente.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):452714
                        Entropy (8bit):2.6437725125591145
                        Encrypted:false
                        SSDEEP:3072:Jxvhq0/c8zEEGKyHdqdqTZIhz+fMikFN905P4:TvhL91GbgdQZIz+fMiaN9ag
                        MD5:31FA6D00190DA55D190F69027CD409CC
                        SHA1:6E40E777863649597448A8A8C4A88B4DEB77D2CE
                        SHA-256:BF04A6E6A09EAD8B83EF15BF34E3D151C5F683D869D02F6DFFCFC632DD130BE7
                        SHA-512:5650B68EC2FE4A0C8F068A9EA27CD9A7BAADC2151BB819C7FB0087807D39F860D4B0AC5402C6FFFBA9AE43C7E07D42E9643A3FD17AB0DCFEE715CCF499CB5CB5
                        Malicious:false
                        Reputation:low
                        Preview:00000000ADAD00000000000000280000D5D5D50081001C0000009D003C3C3C3C3C3C00002300F1F100000043434300003200007676009A9A9A000000D50016161600A500000080808080000000003F0000000000B5B5B5000000F10000000000C700008888880004040000D20000151500CD000000969600E3E3E3000000F6F60000001F1F00E100730000FF00006800A9A9A900F8F8000000AF000084006E0000750076000A0A0A0000A800151500A700969600B3B3B30000000B00EEEE00008D8D0000303000D9D9004545450071000F0F0072720000D3001212005454007C000099000000000000DD000071710000EEEE0000002D2D00AC00D2005800000D00000000000020001313131313130052000026000000000000CCCC0025250000000000000000FDFD002F0000373700007D7D001F0062005A5A000000D600AD0000BD00009100BEBEBEBEBEBE00CECE00006A0000007D7D00000000FFFF0000000046464600000000ED0000F4F400003B009200C3C3C3004E4E4E4E00B4B4B4000000D10000000000828282009E0086000089898900005E000000CA006969000000770000640000B2B2B200005200F2008F0082005D00007B7B7B7B005B0047000000FC0000001515006969000000D9000000E5E5E5E5E5000F005757001A002A000000000000C5C500000C0C0000970000004A00
                        Process:C:\Users\user\Desktop\presupuesto urgente.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):219226
                        Entropy (8bit):7.436492024340276
                        Encrypted:false
                        SSDEEP:3072:132zftwOsH2Pnuw9B01E8qxXPDgs2MdpBw7opajuN5Vs9oY7sTtZXMGa3QGkCCLH:1mz1AWPuCXkslB+yajwk7sxKGsjkhkS
                        MD5:03016A728D29C285C8CBA4EE426ED89D
                        SHA1:776E51BCDEB03EB45E67563C52C8FEC881CC95E1
                        SHA-256:20B21594F8F281C5A47ABBBF0D9FC745DDE6EC535E5E6272FF96D1D2DFB13942
                        SHA-512:0E23540F06D8423BD0E3E3412988D0C820B3EC0BF7E23A4365AFA4FE8994C1D09B4F8D5B7C2BCA38142322F04B617B3239585147DB052295C0F292E34AB46D6D
                        Malicious:false
                        Reputation:low
                        Preview:....uuuuuu..g...s..:::.. ....jjj.SS........OOOO.........}}}....................]]]]]]...................%%.....&&.......8...............s.....................P...tttt........p.....................................qq...I..............##.2.....[[[[..........................'........MMM......]]]......................................................................SSSS..............................................NN..}}}.R............[[......_.........;.yy.>>..........)))....GGGG..nn......qq..!!!..l.(((....|.....................!....@@@@.....w....................J...FF....p......2.......................cc../..............K..............F...v................HHH.}}}.?.^...............VVVV.....^^^^^^^.........N.//.........v...BB..........t.....................Q..PPP............v...777.........LLLLLL...........K.......22..........).........E..........P.....................r...........[[..............E....##.........9..zzzzz.....I................88....cc.......n.,,,,................DDDD.........
                        Process:C:\Users\user\Desktop\presupuesto urgente.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):523
                        Entropy (8bit):4.30492942039079
                        Encrypted:false
                        SSDEEP:12:nGy3qcf5opzE6vCdgLMc/Uqv7FE7KRbqYUH6uN0u8vM:GEpxoy6adY/UqvZEwbql6uNh
                        MD5:B33890A43FB0F38B6DDF18C5BCEFE234
                        SHA1:80ED178A92C2B5CB530AEE4673FFC9011EBF86BB
                        SHA-256:3BF02F982A76A4C896FDA78C1C4B2B730D690DD86475213DC415269D4629407B
                        SHA-512:169E2D067337BF05BA08D615CE61B28CA4FD93D204966B3386FB4B373D9BACD689BEE3DDC5E04A4F19586E585263F62BC40B0944A10E5867C63C9C7236A5CC48
                        Malicious:false
                        Reputation:low
                        Preview:clisiocampa percussing acronyctous petitesses pilgrimsrejser zygosphene miasmology konkyljens..labelable kraftls veneries symbolically duncan sulemadens,logopdisk genuinenesses pseudoinspirational bekenderen.franciscanism krftcellers drylots toksikologiskes rottegiftes impecuniary slisken autokratiets hjertebaandet banegaardsbygningen choenix..adrenocorticotropic mangfoldigheders avisudvikling ekstremitetens skamsloges nrede unpersuasion trachling tvrformatets..negerbolle suppressionen lustful bagels flamenco selrets,
                        Process:C:\Users\user\Desktop\presupuesto urgente.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):276551
                        Entropy (8bit):1.2459972317120458
                        Encrypted:false
                        SSDEEP:768:q5eLWls2nEEvz9mAEPesDf7zRhfRKrtTgtOnumyYJBW+JAILJcqhOzwnasNP2r2J:q86nLDJnJuki2BaFsfRz
                        MD5:0071DC51C79F0655F0BB77074D56B1D7
                        SHA1:9617AE1434B07532BAAF39D69CF720C05B85E8F9
                        SHA-256:0628FA8F44795D79D5B855E8387985E04D134E8B57FE4D57E663FBAED278DF89
                        SHA-512:E2149E9F3B18DCB50E49EC51226D7A6BF3969E119B385410E80E431024B25A938C965C743D80C0C1D8A3820D0DDDA14464CAC75F73AE22F259B447264F8431BA
                        Malicious:false
                        Reputation:low
                        Preview:........................................................#..................................................................................E........R...............................]......................W...\......O.........................................$9......4.............................;..........X........................Z........"..............................................................................;..........U.....................^.....................l.......................3...................~............u.........................................e......P..................................H..............................................................................2.........2.................>....................................................................................................................+.......z....................A..$.........................................................................................]........?..............................
                        Process:C:\Users\user\Desktop\presupuesto urgente.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):398154
                        Entropy (8bit):1.2543435533086644
                        Encrypted:false
                        SSDEEP:1536:8IfJmHKeJzuGrd0myk0Ek5rFnJd62xZ9WEmaslkcO:8omHKAJR0T8axr
                        MD5:7BA8E260D6477B4FD16DAE2D14EA4482
                        SHA1:16873CB5BFBA899D4ED937603AA9980F119695D6
                        SHA-256:C19F7B3F1A20E1529113EE69AA53DB6E124A51F03098E6FB6AF0E76037C85B8B
                        SHA-512:ECAA786515C73B08A44C22FD48B205166611750EC633849823A88BBF95A675CA29FB7F22E652EFCFC055FC92F8381FC6276F4B732F91612A2385BF670131FFF2
                        Malicious:false
                        Reputation:low
                        Preview:...................z...................................................1........................................T.......r...........................'......................O..................|......P.................................0.....................................).......................l.............S..^......Z.........E.................................{.....................................................................................................................................................................$...........*................................................D........y....................................0..........|........m............................G.............Q...........>...s.......C...................................................".....................................................................+.......................L...6.......................................................................`.................................k.....................
                        Process:C:\Users\user\Desktop\presupuesto urgente.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):37
                        Entropy (8bit):4.046762824854522
                        Encrypted:false
                        SSDEEP:3:lgov8fOMy:XHB
                        MD5:CFDA8E6AADE7958F94A959BDB29CB209
                        SHA1:59C459E105A7AF33D13A365F735E3CB7B8E5DDB0
                        SHA-256:B4543E8AB4997934D2EDC7DE8A76A24B7C2CCB641212AE3B9B17FE05B71D3E87
                        SHA-512:EDFDCA00667ED3A5558F7E614373F0B8393763A979154666972C659CB44E75CCD51170E4E2189043046EB4DDB8A68642BBDB6F98A0E494E76E86FAAF14F993B2
                        Malicious:false
                        Preview:[xanthippe]..sikkerhedsgraden=preve..
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.244448418739602
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:presupuesto urgente.exe
                        File size:582'088 bytes
                        MD5:8ae672783481c0b46780431bfce5a216
                        SHA1:ace989f4c2a82f48cc3167e531ab13d2999537b2
                        SHA256:5e279ef4c54dfc525f423b98054f37ee6eb51a71e8c1f76d5438393055442173
                        SHA512:be1f8b04c0ff14dfb85089a1311f6fcffaa26db076d6889f756a077503430d7d7ff2cdfc944ed7ef1a47a7f88ad374834c8b945fb96ab1a82f09573c98a54d83
                        SSDEEP:6144:wIw3/aiZzcfWAnp3NRmqRAV596VJk4PGJ5zkk2vZBKmXSSwrw:Ma/1MVzim5zF2hwymw
                        TLSH:F0C4DF9B6ED2C9EED4530A3099E5B5B0B1F1ADF09B03990767B33AFD2C31E618E05215
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....uY.................d...*.....
                        Icon Hash:5ce633391c1c0601
                        Entrypoint:0x403489
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x5975952E [Mon Jul 24 06:35:26 2017 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
                        Signature Valid:false
                        Signature Issuer:CN="Adusk Mellemhandler ", E=meteoritics@Vacuolate.Je, L=Sanford, S=Michigan, C=US
                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                        Error Number:-2146762487
                        Not Before, Not After
                        • 05/09/2024 11:36:49 05/09/2027 11:36:49
                        Subject Chain
                        • CN="Adusk Mellemhandler ", E=meteoritics@Vacuolate.Je, L=Sanford, S=Michigan, C=US
                        Version:3
                        Thumbprint MD5:B289B9B21F52A17FDC61A0D70D86F1B8
                        Thumbprint SHA-1:DBE4A4D453126B6BF0C2598625BB04CE9CD1C5D5
                        Thumbprint SHA-256:344BFA8915E4912A82E48C85E479AF071690941A2C0E3DAAF3804C3454FDEBBC
                        Serial:247A1D845B68D30CAE805BFEE406FB9766A77266
                        Instruction
                        sub esp, 000002D4h
                        push ebx
                        push esi
                        push edi
                        push 00000020h
                        pop edi
                        xor ebx, ebx
                        push 00008001h
                        mov dword ptr [esp+14h], ebx
                        mov dword ptr [esp+10h], 0040A230h
                        mov dword ptr [esp+1Ch], ebx
                        call dword ptr [004080ACh]
                        call dword ptr [004080A8h]
                        and eax, BFFFFFFFh
                        cmp ax, 00000006h
                        mov dword ptr [0042A24Ch], eax
                        je 00007F4AF8FF5C93h
                        push ebx
                        call 00007F4AF8FF8F41h
                        cmp eax, ebx
                        je 00007F4AF8FF5C89h
                        push 00000C00h
                        call eax
                        mov esi, 004082B0h
                        push esi
                        call 00007F4AF8FF8EBBh
                        push esi
                        call dword ptr [00408150h]
                        lea esi, dword ptr [esi+eax+01h]
                        cmp byte ptr [esi], 00000000h
                        jne 00007F4AF8FF5C6Ch
                        push 0000000Ah
                        call 00007F4AF8FF8F14h
                        push 00000008h
                        call 00007F4AF8FF8F0Dh
                        push 00000006h
                        mov dword ptr [0042A244h], eax
                        call 00007F4AF8FF8F01h
                        cmp eax, ebx
                        je 00007F4AF8FF5C91h
                        push 0000001Eh
                        call eax
                        test eax, eax
                        je 00007F4AF8FF5C89h
                        or byte ptr [0042A24Fh], 00000040h
                        push ebp
                        call dword ptr [00408044h]
                        push ebx
                        call dword ptr [004082A0h]
                        mov dword ptr [0042A318h], eax
                        push ebx
                        lea eax, dword ptr [esp+34h]
                        push 000002B4h
                        push eax
                        push ebx
                        push 004216E8h
                        call dword ptr [00408188h]
                        push 0040A384h
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x570000x220b8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x8cea80x1320
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x63d10x6400139645791b76bd6f7b8c4472edbbdfe5False0.66515625data6.479451209065IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x138e0x1400007eff248f0493620a3fd3f7cadc755bFalse0.45data5.143831732151552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x203580x600ec5bcec782f43a3fb7e8dfbe0d0db4dbFalse0.501953125data4.000739070159718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x2b0000x2c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x570000x220b80x2220030cc4d5ad2d805f600d8d9358a38829aFalse0.1827066163003663data2.9689436080399076IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x572c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.14975452502070272
                        RT_ICON0x67af00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.18344019339920117
                        RT_ICON0x70f980x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.21953235710911667
                        RT_ICON0x751c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.2731327800829875
                        RT_ICON0x777680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.3428705440900563
                        RT_DIALOG0x788100x120dataEnglishUnited States0.5138888888888888
                        RT_DIALOG0x789300x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x78a500xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0x78b180x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x78b780x4cdataEnglishUnited States0.8026315789473685
                        RT_VERSION0x78bc80x1b0dataEnglishUnited States0.5601851851851852
                        RT_MANIFEST0x78d780x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                        DLLImport
                        KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                        USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                        SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                        ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 4, 2024 11:48:42.398380995 CEST5354594162.159.36.2192.168.2.5
                        Oct 4, 2024 11:48:42.897088051 CEST53609551.1.1.1192.168.2.5

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:05:47:56
                        Start date:04/10/2024
                        Path:C:\Users\user\Desktop\presupuesto urgente.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\presupuesto urgente.exe"
                        Imagebase:0x400000
                        File size:582'088 bytes
                        MD5 hash:8AE672783481C0B46780431BFCE5A216
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.4503986910.0000000004438000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:17.1%
                          Dynamic/Decrypted Code Coverage:13.2%
                          Signature Coverage:19.2%
                          Total number of Nodes:1590
                          Total number of Limit Nodes:36
                          execution_graph 5063 10001000 5066 1000101b 5063->5066 5073 10001516 5066->5073 5068 10001020 5069 10001024 5068->5069 5070 10001027 GlobalAlloc 5068->5070 5071 1000153d 3 API calls 5069->5071 5070->5069 5072 10001019 5071->5072 5075 1000151c 5073->5075 5074 10001522 5074->5068 5075->5074 5076 1000152e GlobalFree 5075->5076 5076->5068 4198 401941 4199 401943 4198->4199 4200 402c37 17 API calls 4199->4200 4201 401948 4200->4201 4204 405abe 4201->4204 4243 405d89 4204->4243 4207 405ae6 DeleteFileW 4209 401951 4207->4209 4208 405afd 4211 405c28 4208->4211 4257 4063b0 lstrcpynW 4208->4257 4211->4209 4275 4066f3 FindFirstFileW 4211->4275 4212 405b23 4213 405b36 4212->4213 4214 405b29 lstrcatW 4212->4214 4258 405ccd lstrlenW 4213->4258 4215 405b3c 4214->4215 4218 405b4c lstrcatW 4215->4218 4220 405b57 lstrlenW FindFirstFileW 4215->4220 4218->4220 4222 405c1d 4220->4222 4241 405b79 4220->4241 4221 405c46 4278 405c81 lstrlenW CharPrevW 4221->4278 4222->4211 4225 405c00 FindNextFileW 4228 405c16 FindClose 4225->4228 4225->4241 4226 405a76 5 API calls 4229 405c58 4226->4229 4228->4222 4230 405c72 4229->4230 4231 405c5c 4229->4231 4233 405414 24 API calls 4230->4233 4231->4209 4234 405414 24 API calls 4231->4234 4233->4209 4236 405c69 4234->4236 4235 405abe 60 API calls 4235->4241 4237 406176 36 API calls 4236->4237 4239 405c70 4237->4239 4238 405414 24 API calls 4238->4225 4239->4209 4240 405414 24 API calls 4240->4241 4241->4225 4241->4235 4241->4238 4241->4240 4262 4063b0 lstrcpynW 4241->4262 4263 405a76 4241->4263 4271 406176 MoveFileExW 4241->4271 4281 4063b0 lstrcpynW 4243->4281 4245 405d9a 4282 405d2c CharNextW CharNextW 4245->4282 4248 405ade 4248->4207 4248->4208 4249 406644 5 API calls 4254 405db0 4249->4254 4250 405de1 lstrlenW 4251 405dec 4250->4251 4250->4254 4253 405c81 3 API calls 4251->4253 4252 4066f3 2 API calls 4252->4254 4255 405df1 GetFileAttributesW 4253->4255 4254->4248 4254->4250 4254->4252 4256 405ccd 2 API calls 4254->4256 4255->4248 4256->4250 4257->4212 4259 405cdb 4258->4259 4260 405ce1 CharPrevW 4259->4260 4261 405ced 4259->4261 4260->4259 4260->4261 4261->4215 4262->4241 4288 405e7d GetFileAttributesW 4263->4288 4266 405aa3 4266->4241 4267 405a91 RemoveDirectoryW 4269 405a9f 4267->4269 4268 405a99 DeleteFileW 4268->4269 4269->4266 4270 405aaf SetFileAttributesW 4269->4270 4270->4266 4272 406197 4271->4272 4273 40618a 4271->4273 4272->4241 4291 405ffc 4273->4291 4276 405c42 4275->4276 4277 406709 FindClose 4275->4277 4276->4209 4276->4221 4277->4276 4279 405c4c 4278->4279 4280 405c9d lstrcatW 4278->4280 4279->4226 4280->4279 4281->4245 4283 405d49 4282->4283 4286 405d5b 4282->4286 4285 405d56 CharNextW 4283->4285 4283->4286 4284 405d7f 4284->4248 4284->4249 4285->4284 4286->4284 4287 405cae CharNextW 4286->4287 4287->4286 4289 405a82 4288->4289 4290 405e8f SetFileAttributesW 4288->4290 4289->4266 4289->4267 4289->4268 4290->4289 4292 406052 GetShortPathNameW 4291->4292 4293 40602c 4291->4293 4294 406171 4292->4294 4295 406067 4292->4295 4318 405ea2 GetFileAttributesW CreateFileW 4293->4318 4294->4272 4295->4294 4297 40606f wsprintfA 4295->4297 4299 4063d2 17 API calls 4297->4299 4298 406036 CloseHandle GetShortPathNameW 4298->4294 4300 40604a 4298->4300 4301 406097 4299->4301 4300->4292 4300->4294 4319 405ea2 GetFileAttributesW CreateFileW 4301->4319 4303 4060a4 4303->4294 4304 4060b3 GetFileSize GlobalAlloc 4303->4304 4305 4060d5 4304->4305 4306 40616a CloseHandle 4304->4306 4320 405f25 ReadFile 4305->4320 4306->4294 4311 4060f4 lstrcpyA 4314 406116 4311->4314 4312 406108 4313 405e07 4 API calls 4312->4313 4313->4314 4315 40614d SetFilePointer 4314->4315 4327 405f54 WriteFile 4315->4327 4318->4298 4319->4303 4321 405f43 4320->4321 4321->4306 4322 405e07 lstrlenA 4321->4322 4323 405e48 lstrlenA 4322->4323 4324 405e50 4323->4324 4325 405e21 lstrcmpiA 4323->4325 4324->4311 4324->4312 4325->4324 4326 405e3f CharNextA 4325->4326 4326->4323 4328 405f72 GlobalFree 4327->4328 4328->4306 4329 4015c1 4330 402c37 17 API calls 4329->4330 4331 4015c8 4330->4331 4332 405d2c 4 API calls 4331->4332 4344 4015d1 4332->4344 4333 401631 4335 401663 4333->4335 4336 401636 4333->4336 4334 405cae CharNextW 4334->4344 4339 401423 24 API calls 4335->4339 4356 401423 4336->4356 4346 40165b 4339->4346 4343 40164a SetCurrentDirectoryW 4343->4346 4344->4333 4344->4334 4345 401617 GetFileAttributesW 4344->4345 4348 40597d 4344->4348 4351 4058e3 CreateDirectoryW 4344->4351 4360 405960 CreateDirectoryW 4344->4360 4345->4344 4363 40678a GetModuleHandleA 4348->4363 4352 405930 4351->4352 4353 405934 GetLastError 4351->4353 4352->4344 4353->4352 4354 405943 SetFileSecurityW 4353->4354 4354->4352 4355 405959 GetLastError 4354->4355 4355->4352 4357 405414 24 API calls 4356->4357 4358 401431 4357->4358 4359 4063b0 lstrcpynW 4358->4359 4359->4343 4361 405970 4360->4361 4362 405974 GetLastError 4360->4362 4361->4344 4362->4361 4364 4067b0 GetProcAddress 4363->4364 4365 4067a6 4363->4365 4367 405984 4364->4367 4369 40671a GetSystemDirectoryW 4365->4369 4367->4344 4368 4067ac 4368->4364 4368->4367 4370 40673c wsprintfW LoadLibraryExW 4369->4370 4370->4368 4375 401e43 4383 402c15 4375->4383 4377 401e49 4378 402c15 17 API calls 4377->4378 4379 401e55 4378->4379 4380 401e61 ShowWindow 4379->4380 4381 401e6c EnableWindow 4379->4381 4382 402abf 4380->4382 4381->4382 4384 4063d2 17 API calls 4383->4384 4385 402c2a 4384->4385 4385->4377 4390 402644 4391 402c15 17 API calls 4390->4391 4400 402653 4391->4400 4392 402790 4393 40269d ReadFile 4393->4392 4393->4400 4394 402736 4394->4392 4394->4400 4404 405f83 SetFilePointer 4394->4404 4395 405f25 ReadFile 4395->4400 4397 402792 4413 4062f7 wsprintfW 4397->4413 4398 4026dd MultiByteToWideChar 4398->4400 4400->4392 4400->4393 4400->4394 4400->4395 4400->4397 4400->4398 4401 402703 SetFilePointer MultiByteToWideChar 4400->4401 4402 4027a3 4400->4402 4401->4400 4402->4392 4403 4027c4 SetFilePointer 4402->4403 4403->4392 4405 405f9f 4404->4405 4412 405fbb 4404->4412 4406 405f25 ReadFile 4405->4406 4407 405fab 4406->4407 4408 405fc4 SetFilePointer 4407->4408 4409 405fec SetFilePointer 4407->4409 4407->4412 4408->4409 4410 405fcf 4408->4410 4409->4412 4411 405f54 WriteFile 4410->4411 4411->4412 4412->4394 4413->4392 5084 402348 5085 402c37 17 API calls 5084->5085 5086 402357 5085->5086 5087 402c37 17 API calls 5086->5087 5088 402360 5087->5088 5089 402c37 17 API calls 5088->5089 5090 40236a GetPrivateProfileStringW 5089->5090 5094 4016cc 5095 402c37 17 API calls 5094->5095 5096 4016d2 GetFullPathNameW 5095->5096 5097 4016ec 5096->5097 5103 40170e 5096->5103 5099 4066f3 2 API calls 5097->5099 5097->5103 5098 401723 GetShortPathNameW 5100 402abf 5098->5100 5101 4016fe 5099->5101 5101->5103 5104 4063b0 lstrcpynW 5101->5104 5103->5098 5103->5100 5104->5103 5105 401b4d 5106 402c37 17 API calls 5105->5106 5107 401b54 5106->5107 5108 402c15 17 API calls 5107->5108 5109 401b5d wsprintfW 5108->5109 5110 402abf 5109->5110 5111 4047cd 5112 404803 5111->5112 5113 4047dd 5111->5113 5121 4043ac 5112->5121 5118 404345 5113->5118 5117 4047ea SetDlgItemTextW 5117->5112 5119 4063d2 17 API calls 5118->5119 5120 404350 SetDlgItemTextW 5119->5120 5120->5117 5122 4043c4 GetWindowLongW 5121->5122 5132 40444d 5121->5132 5123 4043d5 5122->5123 5122->5132 5124 4043e4 GetSysColor 5123->5124 5125 4043e7 5123->5125 5124->5125 5126 4043f7 SetBkMode 5125->5126 5127 4043ed SetTextColor 5125->5127 5128 404415 5126->5128 5129 40440f GetSysColor 5126->5129 5127->5126 5130 404426 5128->5130 5131 40441c SetBkColor 5128->5131 5129->5128 5130->5132 5133 404440 CreateBrushIndirect 5130->5133 5134 404439 DeleteObject 5130->5134 5131->5130 5133->5132 5134->5133 5135 401f52 5136 402c37 17 API calls 5135->5136 5137 401f59 5136->5137 5138 4066f3 2 API calls 5137->5138 5139 401f5f 5138->5139 5141 401f70 5139->5141 5142 4062f7 wsprintfW 5139->5142 5142->5141 5143 402253 5144 402c37 17 API calls 5143->5144 5145 402259 5144->5145 5146 402c37 17 API calls 5145->5146 5147 402262 5146->5147 5148 402c37 17 API calls 5147->5148 5149 40226b 5148->5149 5150 4066f3 2 API calls 5149->5150 5151 402274 5150->5151 5152 402285 lstrlenW lstrlenW 5151->5152 5153 402278 5151->5153 5155 405414 24 API calls 5152->5155 5154 405414 24 API calls 5153->5154 5157 402280 5154->5157 5156 4022c3 SHFileOperationW 5155->5156 5156->5153 5156->5157 5158 405553 5159 405574 GetDlgItem GetDlgItem GetDlgItem 5158->5159 5160 4056fd 5158->5160 5203 40437a SendMessageW 5159->5203 5162 405706 GetDlgItem CreateThread CloseHandle 5160->5162 5163 40572e 5160->5163 5162->5163 5165 405759 5163->5165 5166 405745 ShowWindow ShowWindow 5163->5166 5167 40577e 5163->5167 5164 4055e4 5169 4055eb GetClientRect GetSystemMetrics SendMessageW SendMessageW 5164->5169 5168 4057b9 5165->5168 5171 405793 ShowWindow 5165->5171 5172 40576d 5165->5172 5205 40437a SendMessageW 5166->5205 5173 4043ac 8 API calls 5167->5173 5168->5167 5178 4057c7 SendMessageW 5168->5178 5176 405659 5169->5176 5177 40563d SendMessageW SendMessageW 5169->5177 5174 4057b3 5171->5174 5175 4057a5 5171->5175 5206 40431e 5172->5206 5180 40578c 5173->5180 5182 40431e SendMessageW 5174->5182 5181 405414 24 API calls 5175->5181 5183 40566c 5176->5183 5184 40565e SendMessageW 5176->5184 5177->5176 5178->5180 5185 4057e0 CreatePopupMenu 5178->5185 5181->5174 5182->5168 5187 404345 18 API calls 5183->5187 5184->5183 5186 4063d2 17 API calls 5185->5186 5188 4057f0 AppendMenuW 5186->5188 5189 40567c 5187->5189 5190 405820 TrackPopupMenu 5188->5190 5191 40580d GetWindowRect 5188->5191 5192 405685 ShowWindow 5189->5192 5193 4056b9 GetDlgItem SendMessageW 5189->5193 5190->5180 5195 40583b 5190->5195 5191->5190 5196 4056a8 5192->5196 5197 40569b ShowWindow 5192->5197 5193->5180 5194 4056e0 SendMessageW SendMessageW 5193->5194 5194->5180 5198 405857 SendMessageW 5195->5198 5204 40437a SendMessageW 5196->5204 5197->5196 5198->5198 5199 405874 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5198->5199 5201 405899 SendMessageW 5199->5201 5201->5201 5202 4058c2 GlobalUnlock SetClipboardData CloseClipboard 5201->5202 5202->5180 5203->5164 5204->5193 5205->5165 5207 404325 5206->5207 5208 40432b SendMessageW 5206->5208 5207->5208 5208->5167 5209 401956 5210 402c37 17 API calls 5209->5210 5211 40195d lstrlenW 5210->5211 5212 40258c 5211->5212 5015 4014d7 5016 402c15 17 API calls 5015->5016 5017 4014dd Sleep 5016->5017 5019 402abf 5017->5019 5213 401d57 GetDlgItem GetClientRect 5214 402c37 17 API calls 5213->5214 5215 401d89 LoadImageW SendMessageW 5214->5215 5216 401da7 DeleteObject 5215->5216 5217 402abf 5215->5217 5216->5217 5218 4022d7 5219 4022f1 5218->5219 5220 4022de 5218->5220 5221 4063d2 17 API calls 5220->5221 5222 4022eb 5221->5222 5223 405a12 MessageBoxIndirectW 5222->5223 5223->5219 5224 402dd7 5225 402e02 5224->5225 5226 402de9 SetTimer 5224->5226 5227 402e50 5225->5227 5228 402e56 MulDiv 5225->5228 5226->5225 5229 402e10 wsprintfW SetWindowTextW SetDlgItemTextW 5228->5229 5229->5227 5231 404459 lstrcpynW lstrlenW 5020 40175c 5021 402c37 17 API calls 5020->5021 5022 401763 5021->5022 5023 405ed1 2 API calls 5022->5023 5024 40176a 5023->5024 5025 405ed1 2 API calls 5024->5025 5025->5024 5038 4023de 5039 402c37 17 API calls 5038->5039 5040 4023f0 5039->5040 5041 402c37 17 API calls 5040->5041 5042 4023fa 5041->5042 5055 402cc7 5042->5055 5045 402432 5048 402c15 17 API calls 5045->5048 5050 40243e 5045->5050 5046 402885 5047 402c37 17 API calls 5051 402428 lstrlenW 5047->5051 5048->5050 5049 40245d RegSetValueExW 5053 402473 RegCloseKey 5049->5053 5050->5049 5052 4031ba 44 API calls 5050->5052 5051->5045 5052->5049 5053->5046 5056 402ce2 5055->5056 5059 40624b 5056->5059 5060 40625a 5059->5060 5061 40240a 5060->5061 5062 406265 RegCreateKeyExW 5060->5062 5061->5045 5061->5046 5061->5047 5062->5061 5239 402862 5240 402c37 17 API calls 5239->5240 5241 402869 FindFirstFileW 5240->5241 5242 402891 5241->5242 5246 40287c 5241->5246 5247 4062f7 wsprintfW 5242->5247 5244 40289a 5248 4063b0 lstrcpynW 5244->5248 5247->5244 5248->5246 5249 4044e2 5250 4044fa 5249->5250 5257 404614 5249->5257 5254 404345 18 API calls 5250->5254 5251 40467e 5252 404748 5251->5252 5253 404688 GetDlgItem 5251->5253 5259 4043ac 8 API calls 5252->5259 5255 4046a2 5253->5255 5256 404709 5253->5256 5258 404561 5254->5258 5255->5256 5263 4046c8 SendMessageW LoadCursorW SetCursor 5255->5263 5256->5252 5264 40471b 5256->5264 5257->5251 5257->5252 5260 40464f GetDlgItem SendMessageW 5257->5260 5262 404345 18 API calls 5258->5262 5273 404743 5259->5273 5282 404367 EnableWindow 5260->5282 5266 40456e CheckDlgButton 5262->5266 5286 404791 5263->5286 5268 404731 5264->5268 5269 404721 SendMessageW 5264->5269 5265 404679 5283 40476d 5265->5283 5280 404367 EnableWindow 5266->5280 5268->5273 5274 404737 SendMessageW 5268->5274 5269->5268 5274->5273 5275 40458c GetDlgItem 5281 40437a SendMessageW 5275->5281 5277 4045a2 SendMessageW 5278 4045c8 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5277->5278 5279 4045bf GetSysColor 5277->5279 5278->5273 5279->5278 5280->5275 5281->5277 5282->5265 5284 404780 SendMessageW 5283->5284 5285 40477b 5283->5285 5284->5251 5285->5284 5289 4059d8 ShellExecuteExW 5286->5289 5288 4046f7 LoadCursorW SetCursor 5288->5256 5289->5288 5290 401563 5291 402a65 5290->5291 5294 4062f7 wsprintfW 5291->5294 5293 402a6a 5294->5293 5295 401968 5296 402c15 17 API calls 5295->5296 5297 40196f 5296->5297 5298 402c15 17 API calls 5297->5298 5299 40197c 5298->5299 5300 402c37 17 API calls 5299->5300 5301 401993 lstrlenW 5300->5301 5302 4019a4 5301->5302 5303 4019e5 5302->5303 5307 4063b0 lstrcpynW 5302->5307 5305 4019d5 5305->5303 5306 4019da lstrlenW 5305->5306 5306->5303 5307->5305 4458 4027e9 4459 4027f0 4458->4459 4461 402a6a 4458->4461 4460 402c15 17 API calls 4459->4460 4462 4027f7 4460->4462 4463 402806 SetFilePointer 4462->4463 4463->4461 4464 402816 4463->4464 4466 4062f7 wsprintfW 4464->4466 4466->4461 5308 100018a9 5310 100018cc 5308->5310 5309 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5312 10001272 2 API calls 5309->5312 5310->5309 5311 100018ff GlobalFree 5310->5311 5311->5309 5313 10001a87 GlobalFree GlobalFree 5312->5313 5314 40166a 5315 402c37 17 API calls 5314->5315 5316 401670 5315->5316 5317 4066f3 2 API calls 5316->5317 5318 401676 5317->5318 5319 404b6a 5320 404b96 5319->5320 5321 404b7a 5319->5321 5323 404bc9 5320->5323 5324 404b9c SHGetPathFromIDListW 5320->5324 5330 4059f6 GetDlgItemTextW 5321->5330 5326 404bac 5324->5326 5329 404bb3 SendMessageW 5324->5329 5325 404b87 SendMessageW 5325->5320 5328 40140b 2 API calls 5326->5328 5328->5329 5329->5323 5330->5325 5331 403e6c 5332 403e84 5331->5332 5333 403fbf 5331->5333 5332->5333 5334 403e90 5332->5334 5335 403fd0 GetDlgItem GetDlgItem 5333->5335 5336 404010 5333->5336 5337 403e9b SetWindowPos 5334->5337 5338 403eae 5334->5338 5339 404345 18 API calls 5335->5339 5340 40406a 5336->5340 5348 401389 2 API calls 5336->5348 5337->5338 5342 403eb3 ShowWindow 5338->5342 5343 403ecb 5338->5343 5344 403ffa SetClassLongW 5339->5344 5341 404391 SendMessageW 5340->5341 5361 403fba 5340->5361 5358 40407c 5341->5358 5342->5343 5345 403ed3 DestroyWindow 5343->5345 5346 403eed 5343->5346 5347 40140b 2 API calls 5344->5347 5399 4042ce 5345->5399 5349 403ef2 SetWindowLongW 5346->5349 5350 403f03 5346->5350 5347->5336 5351 404042 5348->5351 5349->5361 5354 403f0f GetDlgItem 5350->5354 5369 403f7a 5350->5369 5351->5340 5355 404046 SendMessageW 5351->5355 5352 40140b 2 API calls 5352->5358 5353 4042d0 DestroyWindow EndDialog 5353->5399 5359 403f22 SendMessageW IsWindowEnabled 5354->5359 5360 403f3f 5354->5360 5355->5361 5356 4043ac 8 API calls 5356->5361 5357 4042ff ShowWindow 5357->5361 5358->5352 5358->5353 5358->5361 5362 4063d2 17 API calls 5358->5362 5372 404345 18 API calls 5358->5372 5374 404345 18 API calls 5358->5374 5390 404210 DestroyWindow 5358->5390 5359->5360 5359->5361 5363 403f4c 5360->5363 5364 403f93 SendMessageW 5360->5364 5365 403f5f 5360->5365 5373 403f44 5360->5373 5362->5358 5363->5364 5363->5373 5364->5369 5367 403f67 5365->5367 5368 403f7c 5365->5368 5366 40431e SendMessageW 5366->5369 5370 40140b 2 API calls 5367->5370 5371 40140b 2 API calls 5368->5371 5369->5356 5370->5373 5371->5373 5372->5358 5373->5366 5373->5369 5375 4040f7 GetDlgItem 5374->5375 5376 404114 ShowWindow EnableWindow 5375->5376 5377 40410c 5375->5377 5400 404367 EnableWindow 5376->5400 5377->5376 5379 40413e EnableWindow 5384 404152 5379->5384 5380 404157 GetSystemMenu EnableMenuItem SendMessageW 5381 404187 SendMessageW 5380->5381 5380->5384 5381->5384 5383 403e4d 18 API calls 5383->5384 5384->5380 5384->5383 5401 40437a SendMessageW 5384->5401 5402 4063b0 lstrcpynW 5384->5402 5386 4041b6 lstrlenW 5387 4063d2 17 API calls 5386->5387 5388 4041cc SetWindowTextW 5387->5388 5389 401389 2 API calls 5388->5389 5389->5358 5391 40422a CreateDialogParamW 5390->5391 5390->5399 5392 40425d 5391->5392 5391->5399 5393 404345 18 API calls 5392->5393 5394 404268 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5393->5394 5395 401389 2 API calls 5394->5395 5396 4042ae 5395->5396 5396->5361 5397 4042b6 ShowWindow 5396->5397 5398 404391 SendMessageW 5397->5398 5398->5399 5399->5357 5399->5361 5400->5379 5401->5384 5402->5386 5403 401ced 5404 402c15 17 API calls 5403->5404 5405 401cf3 IsWindow 5404->5405 5406 401a20 5405->5406 4962 40176f 4963 402c37 17 API calls 4962->4963 4964 401776 4963->4964 4965 401796 4964->4965 4966 40179e 4964->4966 5002 4063b0 lstrcpynW 4965->5002 5003 4063b0 lstrcpynW 4966->5003 4969 40179c 4973 406644 5 API calls 4969->4973 4970 4017a9 4971 405c81 3 API calls 4970->4971 4972 4017af lstrcatW 4971->4972 4972->4969 4978 4017bb 4973->4978 4974 4066f3 2 API calls 4974->4978 4975 4017f7 4976 405e7d 2 API calls 4975->4976 4976->4978 4978->4974 4978->4975 4979 4017cd CompareFileTime 4978->4979 4980 40188d 4978->4980 4987 4063d2 17 API calls 4978->4987 4992 4063b0 lstrcpynW 4978->4992 4997 405a12 MessageBoxIndirectW 4978->4997 4998 401864 4978->4998 5001 405ea2 GetFileAttributesW CreateFileW 4978->5001 4979->4978 4981 405414 24 API calls 4980->4981 4983 401897 4981->4983 4982 405414 24 API calls 5000 401879 4982->5000 4984 4031ba 44 API calls 4983->4984 4985 4018aa 4984->4985 4986 4018be SetFileTime 4985->4986 4988 4018d0 CloseHandle 4985->4988 4986->4988 4987->4978 4989 4018e1 4988->4989 4988->5000 4990 4018e6 4989->4990 4991 4018f9 4989->4991 4993 4063d2 17 API calls 4990->4993 4994 4063d2 17 API calls 4991->4994 4992->4978 4995 4018ee lstrcatW 4993->4995 4996 401901 4994->4996 4995->4996 4999 405a12 MessageBoxIndirectW 4996->4999 4997->4978 4998->4982 4998->5000 4999->5000 5001->4978 5002->4969 5003->4970 5414 402570 5415 402c37 17 API calls 5414->5415 5416 402577 5415->5416 5419 405ea2 GetFileAttributesW CreateFileW 5416->5419 5418 402583 5419->5418 5427 401b71 5428 401bc2 5427->5428 5429 401b7e 5427->5429 5431 401bc7 5428->5431 5432 401bec GlobalAlloc 5428->5432 5430 401c07 5429->5430 5435 401b95 5429->5435 5433 4063d2 17 API calls 5430->5433 5445 4022f1 5430->5445 5431->5445 5448 4063b0 lstrcpynW 5431->5448 5434 4063d2 17 API calls 5432->5434 5437 4022eb 5433->5437 5434->5430 5446 4063b0 lstrcpynW 5435->5446 5441 405a12 MessageBoxIndirectW 5437->5441 5439 401bd9 GlobalFree 5439->5445 5440 401ba4 5447 4063b0 lstrcpynW 5440->5447 5441->5445 5443 401bb3 5449 4063b0 lstrcpynW 5443->5449 5446->5440 5447->5443 5448->5439 5449->5445 5004 4024f2 5005 402c77 17 API calls 5004->5005 5006 4024fc 5005->5006 5007 402c15 17 API calls 5006->5007 5008 402505 5007->5008 5009 402521 RegEnumKeyW 5008->5009 5010 40252d RegEnumValueW 5008->5010 5013 402885 5008->5013 5011 402549 RegCloseKey 5009->5011 5010->5011 5012 402542 5010->5012 5011->5013 5012->5011 5450 401a72 5451 402c15 17 API calls 5450->5451 5452 401a78 5451->5452 5453 402c15 17 API calls 5452->5453 5454 401a20 5453->5454 5455 401573 5456 401583 ShowWindow 5455->5456 5457 40158c 5455->5457 5456->5457 5458 40159a ShowWindow 5457->5458 5459 402abf 5457->5459 5458->5459 5460 4014f5 SetForegroundWindow 5461 402abf 5460->5461 5462 100016b6 5463 100016e5 5462->5463 5464 10001b18 22 API calls 5463->5464 5465 100016ec 5464->5465 5466 100016f3 5465->5466 5467 100016ff 5465->5467 5468 10001272 2 API calls 5466->5468 5469 10001726 5467->5469 5470 10001709 5467->5470 5478 100016fd 5468->5478 5472 10001750 5469->5472 5473 1000172c 5469->5473 5471 1000153d 3 API calls 5470->5471 5475 1000170e 5471->5475 5474 1000153d 3 API calls 5472->5474 5476 100015b4 3 API calls 5473->5476 5474->5478 5479 100015b4 3 API calls 5475->5479 5477 10001731 5476->5477 5480 10001272 2 API calls 5477->5480 5481 10001714 5479->5481 5482 10001737 GlobalFree 5480->5482 5483 10001272 2 API calls 5481->5483 5482->5478 5484 1000174b GlobalFree 5482->5484 5485 1000171a GlobalFree 5483->5485 5484->5478 5485->5478 5486 401e77 5487 402c37 17 API calls 5486->5487 5488 401e7d 5487->5488 5489 402c37 17 API calls 5488->5489 5490 401e86 5489->5490 5491 402c37 17 API calls 5490->5491 5492 401e8f 5491->5492 5493 402c37 17 API calls 5492->5493 5494 401e98 5493->5494 5495 401423 24 API calls 5494->5495 5496 401e9f 5495->5496 5503 4059d8 ShellExecuteExW 5496->5503 5498 401ee1 5499 40683b 5 API calls 5498->5499 5501 402885 5498->5501 5500 401efb CloseHandle 5499->5500 5500->5501 5503->5498 5504 406e77 5508 40693e 5504->5508 5505 4072a9 5506 4069c8 GlobalAlloc 5506->5505 5506->5508 5507 4069bf GlobalFree 5507->5506 5508->5505 5508->5506 5508->5507 5508->5508 5509 406a36 GlobalFree 5508->5509 5510 406a3f GlobalAlloc 5508->5510 5509->5510 5510->5505 5510->5508 5511 10002238 5512 10002296 5511->5512 5513 100022cc 5511->5513 5512->5513 5514 100022a8 GlobalAlloc 5512->5514 5514->5512 5515 40167b 5516 402c37 17 API calls 5515->5516 5517 401682 5516->5517 5518 402c37 17 API calls 5517->5518 5519 40168b 5518->5519 5520 402c37 17 API calls 5519->5520 5521 401694 MoveFileW 5520->5521 5522 4016a7 5521->5522 5528 4016a0 5521->5528 5523 40224a 5522->5523 5524 4066f3 2 API calls 5522->5524 5526 4016b6 5524->5526 5525 401423 24 API calls 5525->5523 5526->5523 5527 406176 36 API calls 5526->5527 5527->5528 5528->5525 5529 403a7c 5530 403a87 5529->5530 5531 403a8b 5530->5531 5532 403a8e GlobalAlloc 5530->5532 5532->5531 5533 1000103d 5534 1000101b 5 API calls 5533->5534 5535 10001056 5534->5535 5026 40247e 5027 402c77 17 API calls 5026->5027 5028 402488 5027->5028 5029 402c37 17 API calls 5028->5029 5030 402491 5029->5030 5031 40249c RegQueryValueExW 5030->5031 5035 402885 5030->5035 5032 4024c2 RegCloseKey 5031->5032 5033 4024bc 5031->5033 5032->5035 5033->5032 5037 4062f7 wsprintfW 5033->5037 5037->5032 5536 4020fe 5537 402c37 17 API calls 5536->5537 5538 402105 5537->5538 5539 402c37 17 API calls 5538->5539 5540 40210f 5539->5540 5541 402c37 17 API calls 5540->5541 5542 402119 5541->5542 5543 402c37 17 API calls 5542->5543 5544 402123 5543->5544 5545 402c37 17 API calls 5544->5545 5546 40212d 5545->5546 5547 40216c CoCreateInstance 5546->5547 5548 402c37 17 API calls 5546->5548 5551 40218b 5547->5551 5548->5547 5549 401423 24 API calls 5550 40224a 5549->5550 5551->5549 5551->5550 5552 4019ff 5553 402c37 17 API calls 5552->5553 5554 401a06 5553->5554 5555 402c37 17 API calls 5554->5555 5556 401a0f 5555->5556 5557 401a16 lstrcmpiW 5556->5557 5558 401a28 lstrcmpW 5556->5558 5559 401a1c 5557->5559 5558->5559 4111 401f00 4126 402c37 4111->4126 4120 401f2b 4122 401f30 4120->4122 4123 401f3b 4120->4123 4121 402885 4151 4062f7 wsprintfW 4122->4151 4125 401f39 CloseHandle 4123->4125 4125->4121 4127 402c43 4126->4127 4152 4063d2 4127->4152 4130 401f06 4132 405414 4130->4132 4133 40542f 4132->4133 4141 401f10 4132->4141 4134 40544b lstrlenW 4133->4134 4135 4063d2 17 API calls 4133->4135 4136 405474 4134->4136 4137 405459 lstrlenW 4134->4137 4135->4134 4139 405487 4136->4139 4140 40547a SetWindowTextW 4136->4140 4138 40546b lstrcatW 4137->4138 4137->4141 4138->4136 4139->4141 4142 40548d SendMessageW SendMessageW SendMessageW 4139->4142 4140->4139 4143 405995 CreateProcessW 4141->4143 4142->4141 4144 401f16 4143->4144 4145 4059c8 CloseHandle 4143->4145 4144->4121 4144->4125 4146 40683b WaitForSingleObject 4144->4146 4145->4144 4147 406855 4146->4147 4148 406867 GetExitCodeProcess 4147->4148 4194 4067c6 4147->4194 4148->4120 4151->4125 4153 4063df 4152->4153 4154 40662a 4153->4154 4157 4065f8 lstrlenW 4153->4157 4158 4063d2 10 API calls 4153->4158 4161 40650d GetSystemDirectoryW 4153->4161 4163 406520 GetWindowsDirectoryW 4153->4163 4164 406644 5 API calls 4153->4164 4165 4063d2 10 API calls 4153->4165 4166 40659b lstrcatW 4153->4166 4167 406554 SHGetSpecialFolderLocation 4153->4167 4178 40627e 4153->4178 4183 4062f7 wsprintfW 4153->4183 4184 4063b0 lstrcpynW 4153->4184 4155 402c64 4154->4155 4185 4063b0 lstrcpynW 4154->4185 4155->4130 4169 406644 4155->4169 4157->4153 4158->4157 4161->4153 4163->4153 4164->4153 4165->4153 4166->4153 4167->4153 4168 40656c SHGetPathFromIDListW CoTaskMemFree 4167->4168 4168->4153 4175 406651 4169->4175 4170 4066c7 4171 4066cc CharPrevW 4170->4171 4173 4066ed 4170->4173 4171->4170 4172 4066ba CharNextW 4172->4170 4172->4175 4173->4130 4175->4170 4175->4172 4176 4066a6 CharNextW 4175->4176 4177 4066b5 CharNextW 4175->4177 4190 405cae 4175->4190 4176->4175 4177->4172 4186 40621d 4178->4186 4181 4062b2 RegQueryValueExW RegCloseKey 4182 4062e2 4181->4182 4182->4153 4183->4153 4184->4153 4185->4155 4187 40622c 4186->4187 4188 406230 4187->4188 4189 406235 RegOpenKeyExW 4187->4189 4188->4181 4188->4182 4189->4188 4191 405cb4 4190->4191 4192 405cca 4191->4192 4193 405cbb CharNextW 4191->4193 4192->4175 4193->4191 4195 4067e3 PeekMessageW 4194->4195 4196 4067f3 WaitForSingleObject 4195->4196 4197 4067d9 DispatchMessageW 4195->4197 4196->4147 4197->4195 5560 401000 5561 401037 BeginPaint GetClientRect 5560->5561 5562 40100c DefWindowProcW 5560->5562 5564 4010f3 5561->5564 5565 401179 5562->5565 5566 401073 CreateBrushIndirect FillRect DeleteObject 5564->5566 5567 4010fc 5564->5567 5566->5564 5568 401102 CreateFontIndirectW 5567->5568 5569 401167 EndPaint 5567->5569 5568->5569 5570 401112 6 API calls 5568->5570 5569->5565 5570->5569 4372 100027c2 4373 10002812 4372->4373 4374 100027d2 VirtualProtect 4372->4374 4374->4373 5571 401503 5572 40150b 5571->5572 5574 40151e 5571->5574 5573 402c15 17 API calls 5572->5573 5573->5574 4414 402306 4415 40230e 4414->4415 4418 402314 4414->4418 4416 402c37 17 API calls 4415->4416 4416->4418 4417 402322 4420 402c37 17 API calls 4417->4420 4422 402330 4417->4422 4418->4417 4419 402c37 17 API calls 4418->4419 4419->4417 4420->4422 4421 402c37 17 API calls 4423 402339 WritePrivateProfileStringW 4421->4423 4422->4421 5582 401f86 5583 402c37 17 API calls 5582->5583 5584 401f8d 5583->5584 5585 40678a 5 API calls 5584->5585 5586 401f9c 5585->5586 5587 401fb8 GlobalAlloc 5586->5587 5588 402020 5586->5588 5587->5588 5589 401fcc 5587->5589 5590 40678a 5 API calls 5589->5590 5591 401fd3 5590->5591 5592 40678a 5 API calls 5591->5592 5593 401fdd 5592->5593 5593->5588 5597 4062f7 wsprintfW 5593->5597 5595 402012 5598 4062f7 wsprintfW 5595->5598 5597->5595 5598->5588 4424 402388 4425 402390 4424->4425 4426 4023bb 4424->4426 4440 402c77 4425->4440 4428 402c37 17 API calls 4426->4428 4430 4023c2 4428->4430 4436 402cf5 4430->4436 4431 4023a1 4433 402c37 17 API calls 4431->4433 4435 4023a8 RegDeleteValueW RegCloseKey 4433->4435 4434 4023cf 4435->4434 4437 402d0b 4436->4437 4438 402d21 4437->4438 4445 402d2a 4437->4445 4438->4434 4441 402c37 17 API calls 4440->4441 4442 402c8e 4441->4442 4443 40621d RegOpenKeyExW 4442->4443 4444 402397 4443->4444 4444->4431 4444->4434 4446 40621d RegOpenKeyExW 4445->4446 4447 402d58 4446->4447 4448 402dd0 4447->4448 4453 402d5c 4447->4453 4448->4438 4449 402d7e RegEnumKeyW 4450 402d95 RegCloseKey 4449->4450 4449->4453 4451 40678a 5 API calls 4450->4451 4454 402da5 4451->4454 4452 402db6 RegCloseKey 4452->4448 4453->4449 4453->4450 4453->4452 4455 402d2a 6 API calls 4453->4455 4456 402dc4 RegDeleteKeyW 4454->4456 4457 402da9 4454->4457 4455->4453 4456->4448 4457->4448 5599 405388 5600 405398 5599->5600 5601 4053ac 5599->5601 5602 4053f5 5600->5602 5603 40539e 5600->5603 5604 4053b4 IsWindowVisible 5601->5604 5610 4053cb 5601->5610 5605 4053fa CallWindowProcW 5602->5605 5606 404391 SendMessageW 5603->5606 5604->5602 5607 4053c1 5604->5607 5608 4053a8 5605->5608 5606->5608 5612 404cde SendMessageW 5607->5612 5610->5605 5617 404d5e 5610->5617 5613 404d01 GetMessagePos ScreenToClient SendMessageW 5612->5613 5614 404d3d SendMessageW 5612->5614 5615 404d35 5613->5615 5616 404d3a 5613->5616 5614->5615 5615->5610 5616->5614 5626 4063b0 lstrcpynW 5617->5626 5619 404d71 5627 4062f7 wsprintfW 5619->5627 5621 404d7b 5622 40140b 2 API calls 5621->5622 5623 404d84 5622->5623 5628 4063b0 lstrcpynW 5623->5628 5625 404d8b 5625->5602 5626->5619 5627->5621 5628->5625 4467 403489 SetErrorMode GetVersion 4468 4034c8 4467->4468 4469 4034ce 4467->4469 4470 40678a 5 API calls 4468->4470 4471 40671a 3 API calls 4469->4471 4470->4469 4472 4034e4 lstrlenA 4471->4472 4472->4469 4473 4034f4 4472->4473 4474 40678a 5 API calls 4473->4474 4475 4034fb 4474->4475 4476 40678a 5 API calls 4475->4476 4477 403502 4476->4477 4478 40678a 5 API calls 4477->4478 4479 40350e #17 OleInitialize SHGetFileInfoW 4478->4479 4558 4063b0 lstrcpynW 4479->4558 4482 40355a GetCommandLineW 4559 4063b0 lstrcpynW 4482->4559 4484 40356c GetModuleHandleW 4485 403584 4484->4485 4486 405cae CharNextW 4485->4486 4487 403593 CharNextW 4486->4487 4488 4036bd GetTempPathW 4487->4488 4498 4035ac 4487->4498 4560 403458 4488->4560 4490 4036d5 4491 4036d9 GetWindowsDirectoryW lstrcatW 4490->4491 4492 40372f DeleteFileW 4490->4492 4493 403458 12 API calls 4491->4493 4570 402f14 GetTickCount GetModuleFileNameW 4492->4570 4496 4036f5 4493->4496 4494 405cae CharNextW 4494->4498 4496->4492 4499 4036f9 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4496->4499 4497 403743 4504 4037e6 4497->4504 4508 405cae CharNextW 4497->4508 4553 4037f6 4497->4553 4498->4494 4501 4036a8 4498->4501 4503 4036a6 4498->4503 4502 403458 12 API calls 4499->4502 4657 4063b0 lstrcpynW 4501->4657 4506 403727 4502->4506 4503->4488 4600 403abe 4504->4600 4506->4492 4506->4553 4521 403762 4508->4521 4510 403930 4513 4039b4 ExitProcess 4510->4513 4514 403938 GetCurrentProcess OpenProcessToken 4510->4514 4511 403810 4669 405a12 4511->4669 4519 403950 LookupPrivilegeValueW AdjustTokenPrivileges 4514->4519 4520 403984 4514->4520 4516 4037c0 4522 405d89 18 API calls 4516->4522 4517 403826 4523 40597d 5 API calls 4517->4523 4519->4520 4524 40678a 5 API calls 4520->4524 4521->4516 4521->4517 4525 4037cc 4522->4525 4526 40382b lstrcatW 4523->4526 4527 40398b 4524->4527 4525->4553 4658 4063b0 lstrcpynW 4525->4658 4528 403847 lstrcatW lstrcmpiW 4526->4528 4529 40383c lstrcatW 4526->4529 4530 4039a0 ExitWindowsEx 4527->4530 4531 4039ad 4527->4531 4533 403863 4528->4533 4528->4553 4529->4528 4530->4513 4530->4531 4675 40140b 4531->4675 4536 403868 4533->4536 4537 40386f 4533->4537 4535 4037db 4659 4063b0 lstrcpynW 4535->4659 4540 4058e3 4 API calls 4536->4540 4538 405960 2 API calls 4537->4538 4541 403874 SetCurrentDirectoryW 4538->4541 4542 40386d 4540->4542 4543 403884 4541->4543 4544 40388f 4541->4544 4542->4541 4673 4063b0 lstrcpynW 4543->4673 4674 4063b0 lstrcpynW 4544->4674 4547 4063d2 17 API calls 4548 4038ce DeleteFileW 4547->4548 4549 4038db CopyFileW 4548->4549 4554 40389d 4548->4554 4549->4554 4550 403924 4551 406176 36 API calls 4550->4551 4551->4553 4552 406176 36 API calls 4552->4554 4660 4039cc 4553->4660 4554->4547 4554->4550 4554->4552 4555 4063d2 17 API calls 4554->4555 4556 405995 2 API calls 4554->4556 4557 40390f CloseHandle 4554->4557 4555->4554 4556->4554 4557->4554 4558->4482 4559->4484 4561 406644 5 API calls 4560->4561 4562 403464 4561->4562 4563 40346e 4562->4563 4564 405c81 3 API calls 4562->4564 4563->4490 4565 403476 4564->4565 4566 405960 2 API calls 4565->4566 4567 40347c 4566->4567 4678 405ed1 4567->4678 4682 405ea2 GetFileAttributesW CreateFileW 4570->4682 4572 402f57 4599 402f64 4572->4599 4683 4063b0 lstrcpynW 4572->4683 4574 402f7a 4575 405ccd 2 API calls 4574->4575 4576 402f80 4575->4576 4684 4063b0 lstrcpynW 4576->4684 4578 402f8b GetFileSize 4579 40308c 4578->4579 4597 402fa2 4578->4597 4685 402e72 4579->4685 4583 403127 4586 402e72 32 API calls 4583->4586 4584 4030cf GlobalAlloc 4585 4030e6 4584->4585 4590 405ed1 2 API calls 4585->4590 4586->4599 4588 4030b0 4591 40342b ReadFile 4588->4591 4589 402e72 32 API calls 4589->4597 4593 4030f7 CreateFileW 4590->4593 4592 4030bb 4591->4592 4592->4584 4592->4599 4594 403131 4593->4594 4593->4599 4700 403441 SetFilePointer 4594->4700 4596 40313f 4701 4031ba 4596->4701 4597->4579 4597->4583 4597->4589 4597->4599 4716 40342b 4597->4716 4599->4497 4601 40678a 5 API calls 4600->4601 4602 403ad2 4601->4602 4603 403ad8 4602->4603 4604 403aea 4602->4604 4752 4062f7 wsprintfW 4603->4752 4605 40627e 3 API calls 4604->4605 4606 403b1a 4605->4606 4607 403b39 lstrcatW 4606->4607 4609 40627e 3 API calls 4606->4609 4610 403ae8 4607->4610 4609->4607 4744 403d94 4610->4744 4613 405d89 18 API calls 4614 403b6b 4613->4614 4615 403bff 4614->4615 4617 40627e 3 API calls 4614->4617 4616 405d89 18 API calls 4615->4616 4618 403c05 4616->4618 4620 403b9d 4617->4620 4619 403c15 LoadImageW 4618->4619 4621 4063d2 17 API calls 4618->4621 4622 403cbb 4619->4622 4623 403c3c RegisterClassW 4619->4623 4620->4615 4624 403bbe lstrlenW 4620->4624 4627 405cae CharNextW 4620->4627 4621->4619 4626 40140b 2 API calls 4622->4626 4625 403c72 SystemParametersInfoW CreateWindowExW 4623->4625 4656 403cc5 4623->4656 4628 403bf2 4624->4628 4629 403bcc lstrcmpiW 4624->4629 4625->4622 4630 403cc1 4626->4630 4631 403bbb 4627->4631 4633 405c81 3 API calls 4628->4633 4629->4628 4632 403bdc GetFileAttributesW 4629->4632 4635 403d94 18 API calls 4630->4635 4630->4656 4631->4624 4634 403be8 4632->4634 4636 403bf8 4633->4636 4634->4628 4637 405ccd 2 API calls 4634->4637 4638 403cd2 4635->4638 4753 4063b0 lstrcpynW 4636->4753 4637->4628 4640 403d61 4638->4640 4641 403cde ShowWindow 4638->4641 4754 4054e7 OleInitialize 4640->4754 4643 40671a 3 API calls 4641->4643 4645 403cf6 4643->4645 4644 403d67 4646 403d83 4644->4646 4647 403d6b 4644->4647 4648 403d04 GetClassInfoW 4645->4648 4650 40671a 3 API calls 4645->4650 4649 40140b 2 API calls 4646->4649 4654 40140b 2 API calls 4647->4654 4647->4656 4651 403d18 GetClassInfoW RegisterClassW 4648->4651 4652 403d2e DialogBoxParamW 4648->4652 4649->4656 4650->4648 4651->4652 4653 40140b 2 API calls 4652->4653 4655 403d56 4653->4655 4654->4656 4655->4656 4656->4553 4657->4503 4658->4535 4659->4504 4661 4039e7 4660->4661 4662 4039dd CloseHandle 4660->4662 4663 4039f1 CloseHandle 4661->4663 4664 4039fb 4661->4664 4662->4661 4663->4664 4772 403a29 4664->4772 4667 405abe 67 API calls 4668 4037ff OleUninitialize 4667->4668 4668->4510 4668->4511 4670 405a27 4669->4670 4671 40381e ExitProcess 4670->4671 4672 405a3b MessageBoxIndirectW 4670->4672 4672->4671 4673->4544 4674->4554 4676 401389 2 API calls 4675->4676 4677 401420 4676->4677 4677->4513 4679 405ede GetTickCount GetTempFileNameW 4678->4679 4680 405f14 4679->4680 4681 403487 4679->4681 4680->4679 4680->4681 4681->4490 4682->4572 4683->4574 4684->4578 4686 402e83 4685->4686 4687 402e9b 4685->4687 4688 402e93 4686->4688 4689 402e8c DestroyWindow 4686->4689 4690 402ea3 4687->4690 4691 402eab GetTickCount 4687->4691 4688->4584 4688->4599 4719 403441 SetFilePointer 4688->4719 4689->4688 4693 4067c6 2 API calls 4690->4693 4691->4688 4692 402eb9 4691->4692 4694 402ec1 4692->4694 4695 402eee CreateDialogParamW ShowWindow 4692->4695 4693->4688 4694->4688 4720 402e56 4694->4720 4695->4688 4697 402ecf wsprintfW 4698 405414 24 API calls 4697->4698 4699 402eec 4698->4699 4699->4688 4700->4596 4702 4031e5 4701->4702 4703 4031c9 SetFilePointer 4701->4703 4723 4032c2 GetTickCount 4702->4723 4703->4702 4706 405f25 ReadFile 4707 403205 4706->4707 4708 4032c2 42 API calls 4707->4708 4715 403282 4707->4715 4709 40321c 4708->4709 4710 403288 ReadFile 4709->4710 4713 40322b 4709->4713 4709->4715 4710->4715 4712 405f25 ReadFile 4712->4713 4713->4712 4714 405f54 WriteFile 4713->4714 4713->4715 4714->4713 4715->4599 4717 405f25 ReadFile 4716->4717 4718 40343e 4717->4718 4718->4597 4719->4588 4721 402e65 4720->4721 4722 402e67 MulDiv 4720->4722 4721->4722 4722->4697 4724 4032f0 4723->4724 4725 40341a 4723->4725 4736 403441 SetFilePointer 4724->4736 4726 402e72 32 API calls 4725->4726 4732 4031ec 4726->4732 4728 4032fb SetFilePointer 4734 403320 4728->4734 4729 40342b ReadFile 4729->4734 4731 402e72 32 API calls 4731->4734 4732->4706 4732->4715 4733 405f54 WriteFile 4733->4734 4734->4729 4734->4731 4734->4732 4734->4733 4735 4033fb SetFilePointer 4734->4735 4737 40690b 4734->4737 4735->4725 4736->4728 4738 406930 4737->4738 4741 406938 4737->4741 4738->4734 4739 4069c8 GlobalAlloc 4739->4738 4739->4741 4740 4069bf GlobalFree 4740->4739 4741->4738 4741->4739 4741->4740 4742 406a36 GlobalFree 4741->4742 4743 406a3f GlobalAlloc 4741->4743 4742->4743 4743->4738 4743->4741 4745 403da8 4744->4745 4761 4062f7 wsprintfW 4745->4761 4747 403e19 4762 403e4d 4747->4762 4749 403b49 4749->4613 4750 403e1e 4750->4749 4751 4063d2 17 API calls 4750->4751 4751->4750 4752->4610 4753->4615 4765 404391 4754->4765 4756 40550a 4760 405531 4756->4760 4768 401389 4756->4768 4757 404391 SendMessageW 4758 405543 OleUninitialize 4757->4758 4758->4644 4760->4757 4761->4747 4763 4063d2 17 API calls 4762->4763 4764 403e5b SetWindowTextW 4763->4764 4764->4750 4766 4043a9 4765->4766 4767 40439a SendMessageW 4765->4767 4766->4756 4767->4766 4770 401390 4768->4770 4769 4013fe 4769->4756 4770->4769 4771 4013cb MulDiv SendMessageW 4770->4771 4771->4770 4773 403a37 4772->4773 4774 403a00 4773->4774 4775 403a3c FreeLibrary GlobalFree 4773->4775 4774->4667 4775->4774 4775->4775 4776 401389 4778 401390 4776->4778 4777 4013fe 4778->4777 4779 4013cb MulDiv SendMessageW 4778->4779 4779->4778 5629 40190c 5630 401943 5629->5630 5631 402c37 17 API calls 5630->5631 5632 401948 5631->5632 5633 405abe 67 API calls 5632->5633 5634 401951 5633->5634 5635 401d0e 5636 402c15 17 API calls 5635->5636 5637 401d15 5636->5637 5638 402c15 17 API calls 5637->5638 5639 401d21 GetDlgItem 5638->5639 5640 40258c 5639->5640 5641 1000164f 5642 10001516 GlobalFree 5641->5642 5644 10001667 5642->5644 5643 100016ad GlobalFree 5644->5643 5645 10001682 5644->5645 5646 10001699 VirtualFree 5644->5646 5645->5643 5646->5643 5647 40190f 5648 402c37 17 API calls 5647->5648 5649 401916 5648->5649 5650 405a12 MessageBoxIndirectW 5649->5650 5651 40191f 5650->5651 5652 404d90 GetDlgItem GetDlgItem 5653 404de2 7 API calls 5652->5653 5661 404ffb 5652->5661 5654 404e85 DeleteObject 5653->5654 5655 404e78 SendMessageW 5653->5655 5656 404e8e 5654->5656 5655->5654 5658 404ec5 5656->5658 5660 4063d2 17 API calls 5656->5660 5657 4050df 5659 40518b 5657->5659 5668 405138 SendMessageW 5657->5668 5695 404fee 5657->5695 5662 404345 18 API calls 5658->5662 5664 405195 SendMessageW 5659->5664 5665 40519d 5659->5665 5666 404ea7 SendMessageW SendMessageW 5660->5666 5661->5657 5663 40506c 5661->5663 5671 404cde 5 API calls 5661->5671 5667 404ed9 5662->5667 5663->5657 5670 4050d1 SendMessageW 5663->5670 5664->5665 5676 4051b6 5665->5676 5677 4051af ImageList_Destroy 5665->5677 5688 4051c6 5665->5688 5666->5656 5672 404345 18 API calls 5667->5672 5674 40514d SendMessageW 5668->5674 5668->5695 5669 4043ac 8 API calls 5675 405381 5669->5675 5670->5657 5671->5663 5683 404ee7 5672->5683 5673 405335 5681 405347 ShowWindow GetDlgItem ShowWindow 5673->5681 5673->5695 5679 405160 5674->5679 5680 4051bf GlobalFree 5676->5680 5676->5688 5677->5676 5678 404fbc GetWindowLongW SetWindowLongW 5682 404fd5 5678->5682 5689 405171 SendMessageW 5679->5689 5680->5688 5681->5695 5684 404ff3 5682->5684 5685 404fdb ShowWindow 5682->5685 5683->5678 5687 404f37 SendMessageW 5683->5687 5690 404fb6 5683->5690 5692 404f73 SendMessageW 5683->5692 5693 404f84 SendMessageW 5683->5693 5704 40437a SendMessageW 5684->5704 5703 40437a SendMessageW 5685->5703 5687->5683 5688->5673 5694 404d5e 4 API calls 5688->5694 5699 405201 5688->5699 5689->5659 5690->5678 5690->5682 5692->5683 5693->5683 5694->5699 5695->5669 5696 40530b InvalidateRect 5696->5673 5697 405321 5696->5697 5705 404c99 5697->5705 5698 40522f SendMessageW 5702 405245 5698->5702 5699->5698 5699->5702 5701 4052b9 SendMessageW SendMessageW 5701->5702 5702->5696 5702->5701 5703->5695 5704->5661 5708 404bd0 5705->5708 5707 404cae 5707->5673 5709 404be9 5708->5709 5710 4063d2 17 API calls 5709->5710 5711 404c4d 5710->5711 5712 4063d2 17 API calls 5711->5712 5713 404c58 5712->5713 5714 4063d2 17 API calls 5713->5714 5715 404c6e lstrlenW wsprintfW SetDlgItemTextW 5714->5715 5715->5707 5716 401491 5717 405414 24 API calls 5716->5717 5718 401498 5717->5718 5719 402592 5720 4025c1 5719->5720 5721 4025a6 5719->5721 5723 4025f5 5720->5723 5724 4025c6 5720->5724 5722 402c15 17 API calls 5721->5722 5729 4025ad 5722->5729 5726 402c37 17 API calls 5723->5726 5725 402c37 17 API calls 5724->5725 5727 4025cd WideCharToMultiByte lstrlenA 5725->5727 5728 4025fc lstrlenW 5726->5728 5727->5729 5728->5729 5731 405f83 5 API calls 5729->5731 5732 40263f 5729->5732 5733 402629 5729->5733 5730 405f54 WriteFile 5730->5732 5731->5733 5733->5730 5733->5732 5734 404493 lstrlenW 5735 4044b2 5734->5735 5736 4044b4 WideCharToMultiByte 5734->5736 5735->5736 5737 404814 5738 404840 5737->5738 5739 404851 5737->5739 5798 4059f6 GetDlgItemTextW 5738->5798 5741 40485d GetDlgItem 5739->5741 5746 4048bc 5739->5746 5743 404871 5741->5743 5742 40484b 5745 406644 5 API calls 5742->5745 5749 404885 SetWindowTextW 5743->5749 5754 405d2c 4 API calls 5743->5754 5744 4049a0 5747 404b4f 5744->5747 5800 4059f6 GetDlgItemTextW 5744->5800 5745->5739 5746->5744 5746->5747 5751 4063d2 17 API calls 5746->5751 5753 4043ac 8 API calls 5747->5753 5752 404345 18 API calls 5749->5752 5750 4049d0 5755 405d89 18 API calls 5750->5755 5756 404930 SHBrowseForFolderW 5751->5756 5757 4048a1 5752->5757 5758 404b63 5753->5758 5759 40487b 5754->5759 5760 4049d6 5755->5760 5756->5744 5761 404948 CoTaskMemFree 5756->5761 5762 404345 18 API calls 5757->5762 5759->5749 5763 405c81 3 API calls 5759->5763 5801 4063b0 lstrcpynW 5760->5801 5764 405c81 3 API calls 5761->5764 5765 4048af 5762->5765 5763->5749 5766 404955 5764->5766 5799 40437a SendMessageW 5765->5799 5769 40498c SetDlgItemTextW 5766->5769 5774 4063d2 17 API calls 5766->5774 5769->5744 5770 4048b5 5772 40678a 5 API calls 5770->5772 5771 4049ed 5773 40678a 5 API calls 5771->5773 5772->5746 5781 4049f4 5773->5781 5775 404974 lstrcmpiW 5774->5775 5775->5769 5778 404985 lstrcatW 5775->5778 5776 404a35 5802 4063b0 lstrcpynW 5776->5802 5778->5769 5779 404a3c 5780 405d2c 4 API calls 5779->5780 5782 404a42 GetDiskFreeSpaceW 5780->5782 5781->5776 5784 405ccd 2 API calls 5781->5784 5786 404a8d 5781->5786 5785 404a66 MulDiv 5782->5785 5782->5786 5784->5781 5785->5786 5787 404afe 5786->5787 5788 404c99 20 API calls 5786->5788 5789 404b21 5787->5789 5790 40140b 2 API calls 5787->5790 5791 404aeb 5788->5791 5803 404367 EnableWindow 5789->5803 5790->5789 5793 404b00 SetDlgItemTextW 5791->5793 5794 404af0 5791->5794 5793->5787 5796 404bd0 20 API calls 5794->5796 5795 404b3d 5795->5747 5797 40476d SendMessageW 5795->5797 5796->5787 5797->5747 5798->5742 5799->5770 5800->5750 5801->5771 5802->5779 5803->5795 5804 10001058 5806 10001074 5804->5806 5805 100010dd 5806->5805 5807 10001516 GlobalFree 5806->5807 5808 10001092 5806->5808 5807->5808 5809 10001516 GlobalFree 5808->5809 5810 100010a2 5809->5810 5811 100010b2 5810->5811 5812 100010a9 GlobalSize 5810->5812 5813 100010b6 GlobalAlloc 5811->5813 5814 100010c7 5811->5814 5812->5811 5815 1000153d 3 API calls 5813->5815 5816 100010d2 GlobalFree 5814->5816 5815->5814 5816->5805 5817 401c19 5818 402c15 17 API calls 5817->5818 5819 401c20 5818->5819 5820 402c15 17 API calls 5819->5820 5821 401c2d 5820->5821 5822 402c37 17 API calls 5821->5822 5824 401c42 5821->5824 5822->5824 5823 401c52 5826 401ca9 5823->5826 5827 401c5d 5823->5827 5824->5823 5825 402c37 17 API calls 5824->5825 5825->5823 5828 402c37 17 API calls 5826->5828 5829 402c15 17 API calls 5827->5829 5830 401cae 5828->5830 5831 401c62 5829->5831 5832 402c37 17 API calls 5830->5832 5833 402c15 17 API calls 5831->5833 5834 401cb7 FindWindowExW 5832->5834 5835 401c6e 5833->5835 5838 401cd9 5834->5838 5836 401c99 SendMessageW 5835->5836 5837 401c7b SendMessageTimeoutW 5835->5837 5836->5838 5837->5838 5839 402a9a SendMessageW 5840 402ab4 InvalidateRect 5839->5840 5841 402abf 5839->5841 5840->5841 5842 40281b 5843 402821 5842->5843 5844 402829 FindClose 5843->5844 5845 402abf 5843->5845 5844->5845 5846 40149e 5847 4022f1 5846->5847 5848 4014ac PostQuitMessage 5846->5848 5848->5847 5856 100010e1 5859 10001111 5856->5859 5857 100011d8 GlobalFree 5858 100012ba 2 API calls 5858->5859 5859->5857 5859->5858 5860 100011d3 5859->5860 5861 10001272 2 API calls 5859->5861 5862 10001164 GlobalAlloc 5859->5862 5863 100011f8 GlobalFree 5859->5863 5864 100011c4 GlobalFree 5859->5864 5865 100012e1 lstrcpyW 5859->5865 5860->5857 5861->5864 5862->5859 5863->5859 5864->5859 5865->5859 5866 4029a2 5867 402c15 17 API calls 5866->5867 5868 4029a8 5867->5868 5869 4029e8 5868->5869 5870 4029cf 5868->5870 5877 402885 5868->5877 5872 402a02 5869->5872 5873 4029f2 5869->5873 5871 4029d4 5870->5871 5879 4029e5 5870->5879 5880 4063b0 lstrcpynW 5871->5880 5875 4063d2 17 API calls 5872->5875 5874 402c15 17 API calls 5873->5874 5874->5879 5875->5879 5879->5877 5881 4062f7 wsprintfW 5879->5881 5880->5877 5881->5877 4386 4015a3 4387 402c37 17 API calls 4386->4387 4388 4015aa SetFileAttributesW 4387->4388 4389 4015bc 4388->4389 5882 4028a7 5883 402c37 17 API calls 5882->5883 5884 4028b5 5883->5884 5885 4028cb 5884->5885 5886 402c37 17 API calls 5884->5886 5887 405e7d 2 API calls 5885->5887 5886->5885 5888 4028d1 5887->5888 5910 405ea2 GetFileAttributesW CreateFileW 5888->5910 5890 4028de 5891 402981 5890->5891 5892 4028ea GlobalAlloc 5890->5892 5895 402989 DeleteFileW 5891->5895 5896 40299c 5891->5896 5893 402903 5892->5893 5894 402978 CloseHandle 5892->5894 5911 403441 SetFilePointer 5893->5911 5894->5891 5895->5896 5898 402909 5899 40342b ReadFile 5898->5899 5900 402912 GlobalAlloc 5899->5900 5901 402922 5900->5901 5902 402956 5900->5902 5904 4031ba 44 API calls 5901->5904 5903 405f54 WriteFile 5902->5903 5905 402962 GlobalFree 5903->5905 5909 40292f 5904->5909 5906 4031ba 44 API calls 5905->5906 5907 402975 5906->5907 5907->5894 5908 40294d GlobalFree 5908->5902 5909->5908 5910->5890 5911->5898 4780 40202c 4781 4020f0 4780->4781 4782 40203e 4780->4782 4784 401423 24 API calls 4781->4784 4783 402c37 17 API calls 4782->4783 4785 402045 4783->4785 4791 40224a 4784->4791 4786 402c37 17 API calls 4785->4786 4787 40204e 4786->4787 4788 402064 LoadLibraryExW 4787->4788 4789 402056 GetModuleHandleW 4787->4789 4788->4781 4790 402075 4788->4790 4789->4788 4789->4790 4803 4067f9 WideCharToMultiByte 4790->4803 4794 402086 4797 4020a5 4794->4797 4798 40208e 4794->4798 4795 4020bf 4796 405414 24 API calls 4795->4796 4799 402096 4796->4799 4806 10001759 4797->4806 4800 401423 24 API calls 4798->4800 4799->4791 4801 4020e2 FreeLibrary 4799->4801 4800->4799 4801->4791 4804 406823 GetProcAddress 4803->4804 4805 402080 4803->4805 4804->4805 4805->4794 4805->4795 4807 10001789 4806->4807 4848 10001b18 4807->4848 4809 10001790 4810 100018a6 4809->4810 4811 100017a1 4809->4811 4812 100017a8 4809->4812 4810->4799 4896 10002286 4811->4896 4880 100022d0 4812->4880 4817 1000180c 4823 10001812 4817->4823 4824 1000184e 4817->4824 4818 100017ee 4909 100024a4 4818->4909 4819 100017d7 4833 100017cd 4819->4833 4906 10002b57 4819->4906 4820 100017be 4822 100017c4 4820->4822 4828 100017cf 4820->4828 4822->4833 4890 1000289c 4822->4890 4830 100015b4 3 API calls 4823->4830 4826 100024a4 10 API calls 4824->4826 4831 10001840 4826->4831 4827 100017f4 4920 100015b4 4827->4920 4900 10002640 4828->4900 4835 10001828 4830->4835 4847 10001895 4831->4847 4931 10002467 4831->4931 4833->4817 4833->4818 4838 100024a4 10 API calls 4835->4838 4837 100017d5 4837->4833 4838->4831 4840 1000189f GlobalFree 4840->4810 4844 10001881 4844->4847 4935 1000153d wsprintfW 4844->4935 4845 1000187a FreeLibrary 4845->4844 4847->4810 4847->4840 4938 1000121b GlobalAlloc 4848->4938 4850 10001b3c 4939 1000121b GlobalAlloc 4850->4939 4852 10001d7a GlobalFree GlobalFree GlobalFree 4853 10001d97 4852->4853 4859 10001de1 4852->4859 4855 10001dac 4853->4855 4856 100020ee 4853->4856 4853->4859 4854 10001b47 4854->4852 4857 10001c1d GlobalAlloc 4854->4857 4854->4859 4862 10001c68 lstrcpyW 4854->4862 4863 10001c86 GlobalFree 4854->4863 4865 10001c72 lstrcpyW 4854->4865 4870 10002048 4854->4870 4874 10001cc4 4854->4874 4875 10001f37 GlobalFree 4854->4875 4878 1000122c 2 API calls 4854->4878 4945 1000121b GlobalAlloc 4854->4945 4855->4859 4942 1000122c 4855->4942 4858 10002110 GetModuleHandleW 4856->4858 4856->4859 4857->4854 4860 10002121 LoadLibraryW 4858->4860 4861 10002136 4858->4861 4859->4809 4860->4859 4860->4861 4946 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4861->4946 4862->4865 4863->4854 4865->4854 4866 10002148 4867 10002188 4866->4867 4879 10002172 GetProcAddress 4866->4879 4867->4859 4868 10002195 lstrlenW 4867->4868 4947 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4868->4947 4870->4859 4873 10002090 lstrcpyW 4870->4873 4873->4859 4874->4854 4940 1000158f GlobalSize GlobalAlloc 4874->4940 4875->4854 4876 100021af 4876->4859 4878->4854 4879->4867 4887 100022e8 4880->4887 4881 1000122c GlobalAlloc lstrcpynW 4881->4887 4883 10002410 GlobalFree 4884 100017ae 4883->4884 4883->4887 4884->4819 4884->4820 4884->4833 4885 100023ba GlobalAlloc CLSIDFromString 4885->4883 4886 1000238f GlobalAlloc WideCharToMultiByte 4886->4883 4887->4881 4887->4883 4887->4885 4887->4886 4889 100023d9 4887->4889 4949 100012ba 4887->4949 4889->4883 4953 100025d4 4889->4953 4892 100028ae 4890->4892 4891 10002953 VirtualAllocEx 4893 10002971 4891->4893 4892->4891 4894 10002a62 GetLastError 4893->4894 4895 10002a6d 4893->4895 4894->4895 4895->4833 4897 10002296 4896->4897 4898 100017a7 4896->4898 4897->4898 4899 100022a8 GlobalAlloc 4897->4899 4898->4812 4899->4897 4904 1000265c 4900->4904 4901 100026c0 4903 100026c5 GlobalSize 4901->4903 4905 100026cf 4901->4905 4902 100026ad GlobalAlloc 4902->4905 4903->4905 4904->4901 4904->4902 4905->4837 4908 10002b62 4906->4908 4907 10002ba2 GlobalFree 4908->4907 4956 1000121b GlobalAlloc 4909->4956 4911 10002506 MultiByteToWideChar 4916 100024ae 4911->4916 4912 1000252b StringFromGUID2 4912->4916 4913 1000253c lstrcpynW 4913->4916 4914 1000256c GlobalFree 4914->4916 4915 1000254f wsprintfW 4915->4916 4916->4911 4916->4912 4916->4913 4916->4914 4916->4915 4917 100025a7 GlobalFree 4916->4917 4918 10001272 2 API calls 4916->4918 4957 100012e1 4916->4957 4917->4827 4918->4916 4961 1000121b GlobalAlloc 4920->4961 4922 100015ba 4923 100015c7 lstrcpyW 4922->4923 4925 100015e1 4922->4925 4926 100015fb 4923->4926 4925->4926 4927 100015e6 wsprintfW 4925->4927 4928 10001272 4926->4928 4927->4926 4929 100012b5 GlobalFree 4928->4929 4930 1000127b GlobalAlloc lstrcpynW 4928->4930 4929->4831 4930->4929 4932 10002475 4931->4932 4934 10001861 4931->4934 4933 10002491 GlobalFree 4932->4933 4932->4934 4933->4932 4934->4844 4934->4845 4936 10001272 2 API calls 4935->4936 4937 1000155e 4936->4937 4937->4847 4938->4850 4939->4854 4941 100015ad 4940->4941 4941->4874 4948 1000121b GlobalAlloc 4942->4948 4944 1000123b lstrcpynW 4944->4859 4945->4854 4946->4866 4947->4876 4948->4944 4950 100012c1 4949->4950 4951 1000122c 2 API calls 4950->4951 4952 100012df 4951->4952 4952->4887 4954 100025e2 VirtualAlloc 4953->4954 4955 10002638 4953->4955 4954->4955 4955->4889 4956->4916 4958 100012ea 4957->4958 4959 1000130c 4957->4959 4958->4959 4960 100012f0 lstrcpyW 4958->4960 4959->4916 4960->4959 4961->4922 5919 402a2f 5920 402c15 17 API calls 5919->5920 5921 402a35 5920->5921 5922 402a6c 5921->5922 5923 402885 5921->5923 5925 402a47 5921->5925 5922->5923 5924 4063d2 17 API calls 5922->5924 5924->5923 5925->5923 5927 4062f7 wsprintfW 5925->5927 5927->5923 5928 401a30 5929 402c37 17 API calls 5928->5929 5930 401a39 ExpandEnvironmentStringsW 5929->5930 5931 401a4d 5930->5931 5933 401a60 5930->5933 5932 401a52 lstrcmpW 5931->5932 5931->5933 5932->5933 5939 401db3 GetDC 5940 402c15 17 API calls 5939->5940 5941 401dc5 GetDeviceCaps MulDiv ReleaseDC 5940->5941 5942 402c15 17 API calls 5941->5942 5943 401df6 5942->5943 5944 4063d2 17 API calls 5943->5944 5945 401e33 CreateFontIndirectW 5944->5945 5946 40258c 5945->5946 5947 402835 5948 40283d 5947->5948 5949 402841 FindNextFileW 5948->5949 5950 402853 5948->5950 5949->5950 5951 4029e0 5950->5951 5953 4063b0 lstrcpynW 5950->5953 5953->5951 5954 401735 5955 402c37 17 API calls 5954->5955 5956 40173c SearchPathW 5955->5956 5957 4029e0 5956->5957 5958 401757 5956->5958 5958->5957 5960 4063b0 lstrcpynW 5958->5960 5960->5957 5961 10002a77 5962 10002a8f 5961->5962 5963 1000158f 2 API calls 5962->5963 5964 10002aaa 5963->5964 5965 4014b8 5966 4014be 5965->5966 5967 401389 2 API calls 5966->5967 5968 4014c6 5967->5968 5969 406aba 5973 40693e 5969->5973 5970 4072a9 5971 4069c8 GlobalAlloc 5971->5970 5971->5973 5972 4069bf GlobalFree 5972->5971 5973->5970 5973->5971 5973->5972 5974 406a36 GlobalFree 5973->5974 5975 406a3f GlobalAlloc 5973->5975 5974->5975 5975->5970 5975->5973

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 403489-4034c6 SetErrorMode GetVersion 1 4034c8-4034d0 call 40678a 0->1 2 4034d9 0->2 1->2 8 4034d2 1->8 3 4034de-4034f2 call 40671a lstrlenA 2->3 9 4034f4-403510 call 40678a * 3 3->9 8->2 16 403521-403582 #17 OleInitialize SHGetFileInfoW call 4063b0 GetCommandLineW call 4063b0 GetModuleHandleW 9->16 17 403512-403518 9->17 24 403584-40358b 16->24 25 40358c-4035a6 call 405cae CharNextW 16->25 17->16 22 40351a 17->22 22->16 24->25 28 4035ac-4035b2 25->28 29 4036bd-4036d7 GetTempPathW call 403458 25->29 31 4035b4-4035b9 28->31 32 4035bb-4035bf 28->32 36 4036d9-4036f7 GetWindowsDirectoryW lstrcatW call 403458 29->36 37 40372f-403749 DeleteFileW call 402f14 29->37 31->31 31->32 34 4035c1-4035c5 32->34 35 4035c6-4035ca 32->35 34->35 38 4035d0-4035d6 35->38 39 403689-403696 call 405cae 35->39 36->37 54 4036f9-403729 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403458 36->54 57 4037fa-40380a call 4039cc OleUninitialize 37->57 58 40374f-403755 37->58 43 4035f1-40362a 38->43 44 4035d8-4035e0 38->44 55 403698-403699 39->55 56 40369a-4036a0 39->56 45 403647-403681 43->45 46 40362c-403631 43->46 50 4035e2-4035e5 44->50 51 4035e7 44->51 45->39 53 403683-403687 45->53 46->45 52 403633-40363b 46->52 50->43 50->51 51->43 60 403642 52->60 61 40363d-403640 52->61 53->39 62 4036a8-4036b6 call 4063b0 53->62 54->37 54->57 55->56 56->28 64 4036a6 56->64 74 403930-403936 57->74 75 403810-403820 call 405a12 ExitProcess 57->75 65 4037ea-4037f1 call 403abe 58->65 66 40375b-403766 call 405cae 58->66 60->45 61->45 61->60 69 4036bb 62->69 64->69 73 4037f6 65->73 77 4037b4-4037be 66->77 78 403768-40379d 66->78 69->29 73->57 80 4039b4-4039bc 74->80 81 403938-40394e GetCurrentProcess OpenProcessToken 74->81 85 4037c0-4037ce call 405d89 77->85 86 403826-40383a call 40597d lstrcatW 77->86 82 40379f-4037a3 78->82 83 4039c2-4039c6 ExitProcess 80->83 84 4039be 80->84 88 403950-40397e LookupPrivilegeValueW AdjustTokenPrivileges 81->88 89 403984-403992 call 40678a 81->89 90 4037a5-4037aa 82->90 91 4037ac-4037b0 82->91 84->83 85->57 99 4037d0-4037e6 call 4063b0 * 2 85->99 100 403847-403861 lstrcatW lstrcmpiW 86->100 101 40383c-403842 lstrcatW 86->101 88->89 102 4039a0-4039ab ExitWindowsEx 89->102 103 403994-40399e 89->103 90->91 95 4037b2 90->95 91->82 91->95 95->77 99->65 100->57 106 403863-403866 100->106 101->100 102->80 104 4039ad-4039af call 40140b 102->104 103->102 103->104 104->80 110 403868-40386d call 4058e3 106->110 111 40386f call 405960 106->111 115 403874-403882 SetCurrentDirectoryW 110->115 111->115 118 403884-40388a call 4063b0 115->118 119 40388f-4038b8 call 4063b0 115->119 118->119 123 4038bd-4038d9 call 4063d2 DeleteFileW 119->123 126 40391a-403922 123->126 127 4038db-4038eb CopyFileW 123->127 126->123 128 403924-40392b call 406176 126->128 127->126 129 4038ed-40390d call 406176 call 4063d2 call 405995 127->129 128->57 129->126 138 40390f-403916 CloseHandle 129->138 138->126
                          APIs
                          • SetErrorMode.KERNELBASE ref: 004034AC
                          • GetVersion.KERNEL32 ref: 004034B2
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034E5
                          • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403522
                          • OleInitialize.OLE32(00000000), ref: 00403529
                          • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403545
                          • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 0040355A
                          • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\presupuesto urgente.exe",00000000,?,00000006,00000008,0000000A), ref: 0040356D
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\presupuesto urgente.exe",00000020,?,00000006,00000008,0000000A), ref: 00403594
                            • Part of subcall function 0040678A: GetModuleHandleA.KERNEL32(?,00000020,?,004034FB,0000000A), ref: 0040679C
                            • Part of subcall function 0040678A: GetProcAddress.KERNEL32(00000000,?), ref: 004067B7
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004036CE
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004036DF
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004036EB
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004036FF
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403707
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403718
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403720
                          • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403734
                            • Part of subcall function 004063B0: lstrcpynW.KERNEL32(?,?,00000400,0040355A,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063BD
                          • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 004037FF
                          • ExitProcess.KERNEL32 ref: 00403820
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\presupuesto urgente.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403833
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\presupuesto urgente.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403842
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\presupuesto urgente.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\presupuesto urgente.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403859
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403875
                          • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038CF
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\presupuesto urgente.exe,00420EE8,00000001,?,00000006,00000008,0000000A), ref: 004038E3
                          • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 00403910
                          • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 0040393F
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00403946
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040395B
                          • AdjustTokenPrivileges.ADVAPI32 ref: 0040397E
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 004039A3
                          • ExitProcess.KERNEL32 ref: 004039C6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                          • String ID: "C:\Users\user\Desktop\presupuesto urgente.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet$C:\Users\user\Desktop$C:\Users\user\Desktop\presupuesto urgente.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                          • API String ID: 2488574733-2944726535
                          • Opcode ID: 0c5ed391fea6fa0d6bec001cb8bac7c1b86e8aed39806b07c52da4fce73069a4
                          • Instruction ID: aa49a9b5ba718b736b7abce3970f6df4d0a927ceef10040f9259c4205047f8e0
                          • Opcode Fuzzy Hash: 0c5ed391fea6fa0d6bec001cb8bac7c1b86e8aed39806b07c52da4fce73069a4
                          • Instruction Fuzzy Hash: 3DD103B1600311ABD3206F759D45B3B3AACEB4070AF10443FF981B62D2DBBD8D558A6E
                          APIs
                            • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C24
                          • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                          • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                          • GlobalFree.KERNEL32(00000000), ref: 10001C89
                          • GlobalFree.KERNEL32(?), ref: 10001D83
                          • GlobalFree.KERNEL32(?), ref: 10001D88
                          • GlobalFree.KERNEL32(?), ref: 10001D8D
                          • GlobalFree.KERNEL32(00000000), ref: 10001F38
                          • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4505515296.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4505502087.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505526475.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505538713.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$Alloc
                          • String ID:
                          • API String ID: 4227406936-0
                          • Opcode ID: 5a24c136153c29b9d98a91a4f463aeb2504b823c6cdae7135cdbbdb8769d9cc1
                          • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                          • Opcode Fuzzy Hash: 5a24c136153c29b9d98a91a4f463aeb2504b823c6cdae7135cdbbdb8769d9cc1
                          • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 484 405abe-405ae4 call 405d89 487 405ae6-405af8 DeleteFileW 484->487 488 405afd-405b04 484->488 489 405c7a-405c7e 487->489 490 405b06-405b08 488->490 491 405b17-405b27 call 4063b0 488->491 493 405c28-405c2d 490->493 494 405b0e-405b11 490->494 497 405b36-405b37 call 405ccd 491->497 498 405b29-405b34 lstrcatW 491->498 493->489 496 405c2f-405c32 493->496 494->491 494->493 499 405c34-405c3a 496->499 500 405c3c-405c44 call 4066f3 496->500 501 405b3c-405b40 497->501 498->501 499->489 500->489 508 405c46-405c5a call 405c81 call 405a76 500->508 504 405b42-405b4a 501->504 505 405b4c-405b52 lstrcatW 501->505 504->505 507 405b57-405b73 lstrlenW FindFirstFileW 504->507 505->507 509 405b79-405b81 507->509 510 405c1d-405c21 507->510 526 405c72-405c75 call 405414 508->526 527 405c5c-405c5f 508->527 513 405ba1-405bb5 call 4063b0 509->513 514 405b83-405b8b 509->514 510->493 512 405c23 510->512 512->493 524 405bb7-405bbf 513->524 525 405bcc-405bd7 call 405a76 513->525 516 405c00-405c10 FindNextFileW 514->516 517 405b8d-405b95 514->517 516->509 520 405c16-405c17 FindClose 516->520 517->513 521 405b97-405b9f 517->521 520->510 521->513 521->516 524->516 529 405bc1-405bca call 405abe 524->529 537 405bf8-405bfb call 405414 525->537 538 405bd9-405bdc 525->538 526->489 527->499 528 405c61-405c70 call 405414 call 406176 527->528 528->489 529->516 537->516 540 405bf0-405bf6 538->540 541 405bde-405bee call 405414 call 406176 538->541 540->516 541->516
                          APIs
                          • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405AE7
                          • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405B2F
                          • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405B52
                          • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405B58
                          • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405B68
                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C08
                          • FindClose.KERNEL32(00000000), ref: 00405C17
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\presupuesto urgente.exe"$0WB$C:\Users\user\AppData\Local\Temp\$\*.*
                          • API String ID: 2035342205-741248912
                          • Opcode ID: 6a659da8d5721ce07b89c17eb76fa4599111a2d920b673130fc03b7c63125bad
                          • Instruction ID: 07f17dd178ac6d8b62b8dc139a3c49ba2dacd8a3a96bf447fe2624e5f5ce8b98
                          • Opcode Fuzzy Hash: 6a659da8d5721ce07b89c17eb76fa4599111a2d920b673130fc03b7c63125bad
                          • Instruction Fuzzy Hash: 1741D030904A18A6DB21AB618D89FBF7678EF42719F50813BF801B11D1D77C5982DEAE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 842 406aba-406abf 843 406b30-406b4e 842->843 844 406ac1-406af0 842->844 845 407126-40713b 843->845 846 406af2-406af5 844->846 847 406af7-406afb 844->847 848 407155-40716b 845->848 849 40713d-407153 845->849 850 406b07-406b0a 846->850 851 406b03 847->851 852 406afd-406b01 847->852 855 40716e-407175 848->855 849->855 853 406b28-406b2b 850->853 854 406b0c-406b15 850->854 851->850 852->850 858 406cfd-406d1b 853->858 856 406b17 854->856 857 406b1a-406b26 854->857 859 407177-40717b 855->859 860 40719c-4071a8 855->860 856->857 862 406b90-406bbe 857->862 865 406d33-406d45 858->865 866 406d1d-406d31 858->866 863 407181-407199 859->863 864 40732a-407334 859->864 869 40693e-406947 860->869 870 406bc0-406bd8 862->870 871 406bda-406bf4 862->871 863->860 867 407340-407353 864->867 868 406d48-406d52 865->868 866->868 877 407358-40735c 867->877 872 406d54 868->872 873 406cf5-406cfb 868->873 874 407355 869->874 875 40694d 869->875 876 406bf7-406c01 870->876 871->876 878 406cd0-406cd4 872->878 879 406e65-406e72 872->879 873->858 880 406c99-406ca3 873->880 874->877 881 406954-406958 875->881 882 406a94-406ab5 875->882 883 4069f9-4069fd 875->883 884 406a69-406a6d 875->884 885 406c07 876->885 886 406b78-406b7e 876->886 897 406cda-406cf2 878->897 898 4072dc-4072e6 878->898 879->869 890 406ec1-406ed0 879->890 893 4072e8-4072f2 880->893 894 406ca9-406ccb 880->894 881->867 899 40695e-40696b 881->899 882->845 891 406a03-406a1c 883->891 892 4072a9-4072b3 883->892 888 406a73-406a87 884->888 889 4072b8-4072c2 884->889 901 4072c4-4072ce 885->901 902 406b5d-406b75 885->902 895 406c31-406c37 886->895 896 406b84-406b8a 886->896 900 406a8a-406a92 888->900 889->867 890->845 906 406a1f-406a23 891->906 892->867 893->867 894->879 903 406c95 895->903 905 406c39-406c57 895->905 896->862 896->903 897->873 898->867 899->874 904 406971-4069b7 899->904 900->882 900->884 901->867 902->886 903->880 907 4069b9-4069bd 904->907 908 4069df-4069e1 904->908 909 406c59-406c6d 905->909 910 406c6f-406c81 905->910 906->883 911 406a25-406a2b 906->911 912 4069c8-4069d6 GlobalAlloc 907->912 913 4069bf-4069c2 GlobalFree 907->913 915 4069e3-4069ed 908->915 916 4069ef-4069f7 908->916 914 406c84-406c8e 909->914 910->914 917 406a55-406a67 911->917 918 406a2d-406a34 911->918 912->874 919 4069dc 912->919 913->912 914->895 920 406c90 914->920 915->915 915->916 916->906 917->900 921 406a36-406a39 GlobalFree 918->921 922 406a3f-406a4f GlobalAlloc 918->922 919->908 924 4072d0-4072da 920->924 925 406c16-406c2e 920->925 921->922 922->874 922->917 924->867 925->895
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3c070ca994c387dc491d90c6da3338e95d076c4c889754936ff9c01511acbaf1
                          • Instruction ID: 906bff5cfe4bf8fc25f5c52b70697fc94252e662920e9b50785524ea690ef068
                          • Opcode Fuzzy Hash: 3c070ca994c387dc491d90c6da3338e95d076c4c889754936ff9c01511acbaf1
                          • Instruction Fuzzy Hash: EBF17870D04229CBDF18CFA8C8946ADBBB1FF44305F15816ED856BB281D7386A86DF45
                          APIs
                          • FindFirstFileW.KERNELBASE(?,00426778,00425F30,00405DD2,00425F30,00425F30,00000000,00425F30,00425F30,?,?,75922EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 004066FE
                          • FindClose.KERNELBASE(00000000), ref: 0040670A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: xgB
                          • API String ID: 2295610775-399326502
                          • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                          • Instruction ID: 551d457f2096baf6d1028c2489454c6ec1272a262abf728b5c7319079dd029a3
                          • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                          • Instruction Fuzzy Hash: DBD012315090209BC201173CBE4C85B7A989F953397128B37B466F71E0C7348C638AE8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 139 403abe-403ad6 call 40678a 142 403ad8-403ae8 call 4062f7 139->142 143 403aea-403b21 call 40627e 139->143 151 403b44-403b6d call 403d94 call 405d89 142->151 147 403b23-403b34 call 40627e 143->147 148 403b39-403b3f lstrcatW 143->148 147->148 148->151 157 403b73-403b78 151->157 158 403bff-403c07 call 405d89 151->158 157->158 159 403b7e-403ba6 call 40627e 157->159 163 403c15-403c3a LoadImageW 158->163 164 403c09-403c10 call 4063d2 158->164 159->158 169 403ba8-403bac 159->169 167 403cbb-403cc3 call 40140b 163->167 168 403c3c-403c6c RegisterClassW 163->168 164->163 182 403cc5-403cc8 167->182 183 403ccd-403cd8 call 403d94 167->183 172 403c72-403cb6 SystemParametersInfoW CreateWindowExW 168->172 173 403d8a 168->173 170 403bbe-403bca lstrlenW 169->170 171 403bae-403bbb call 405cae 169->171 177 403bf2-403bfa call 405c81 call 4063b0 170->177 178 403bcc-403bda lstrcmpiW 170->178 171->170 172->167 176 403d8c-403d93 173->176 177->158 178->177 181 403bdc-403be6 GetFileAttributesW 178->181 185 403be8-403bea 181->185 186 403bec-403bed call 405ccd 181->186 182->176 192 403d61-403d69 call 4054e7 183->192 193 403cde-403cf8 ShowWindow call 40671a 183->193 185->177 185->186 186->177 198 403d83-403d85 call 40140b 192->198 199 403d6b-403d71 192->199 200 403d04-403d16 GetClassInfoW 193->200 201 403cfa-403cff call 40671a 193->201 198->173 199->182 206 403d77-403d7e call 40140b 199->206 204 403d18-403d28 GetClassInfoW RegisterClassW 200->204 205 403d2e-403d5f DialogBoxParamW call 40140b call 403a0e 200->205 201->200 204->205 205->176 206->182
                          APIs
                            • Part of subcall function 0040678A: GetModuleHandleA.KERNEL32(?,00000020,?,004034FB,0000000A), ref: 0040679C
                            • Part of subcall function 0040678A: GetProcAddress.KERNEL32(00000000,?), ref: 004067B7
                          • lstrcatW.KERNEL32(1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75923420,"C:\Users\user\Desktop\presupuesto urgente.exe",00000000), ref: 00403B3F
                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403BBF
                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BD2
                          • GetFileAttributesW.KERNEL32(Call), ref: 00403BDD
                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet), ref: 00403C26
                            • Part of subcall function 004062F7: wsprintfW.USER32 ref: 00406304
                          • RegisterClassW.USER32(004291E0), ref: 00403C63
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C7B
                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CB0
                          • ShowWindow.USER32(00000005,00000000), ref: 00403CE6
                          • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D12
                          • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D1F
                          • RegisterClassW.USER32(004291E0), ref: 00403D28
                          • DialogBoxParamW.USER32(?,00000000,00403E6C,00000000), ref: 00403D47
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\presupuesto urgente.exe"$(7B$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 1975747703-667676935
                          • Opcode ID: ee5fd85ec343bc094daa65e3c13ef1cff60d12f5a08356af1ceed260609d9923
                          • Instruction ID: afe91a4761cf59ebc4b7da6c1f2e4a45d87dcf75ce704844472433b73fc63153
                          • Opcode Fuzzy Hash: ee5fd85ec343bc094daa65e3c13ef1cff60d12f5a08356af1ceed260609d9923
                          • Instruction Fuzzy Hash: 81619370200601BED720AF669D46E2B3A7CEB84B49F40447FFD45B62E2DB7D9912862D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 213 402f14-402f62 GetTickCount GetModuleFileNameW call 405ea2 216 402f64-402f69 213->216 217 402f6e-402f9c call 4063b0 call 405ccd call 4063b0 GetFileSize 213->217 218 4031b3-4031b7 216->218 225 402fa2-402fb9 217->225 226 40308c-40309a call 402e72 217->226 228 402fbb 225->228 229 402fbd-402fca call 40342b 225->229 233 4030a0-4030a3 226->233 234 40316b-403170 226->234 228->229 235 402fd0-402fd6 229->235 236 403127-40312f call 402e72 229->236 237 4030a5-4030bd call 403441 call 40342b 233->237 238 4030cf-40311b GlobalAlloc call 4068eb call 405ed1 CreateFileW 233->238 234->218 239 403056-40305a 235->239 240 402fd8-402ff0 call 405e5d 235->240 236->234 237->234 261 4030c3-4030c9 237->261 264 403131-403161 call 403441 call 4031ba 238->264 265 40311d-403122 238->265 244 403063-403069 239->244 245 40305c-403062 call 402e72 239->245 240->244 259 402ff2-402ff9 240->259 251 40306b-403079 call 40687d 244->251 252 40307c-403086 244->252 245->244 251->252 252->225 252->226 259->244 263 402ffb-403002 259->263 261->234 261->238 263->244 266 403004-40300b 263->266 273 403166-403169 264->273 265->218 266->244 268 40300d-403014 266->268 268->244 270 403016-403036 268->270 270->234 272 40303c-403040 270->272 275 403042-403046 272->275 276 403048-403050 272->276 273->234 274 403172-403183 273->274 277 403185 274->277 278 40318b-403190 274->278 275->226 275->276 276->244 279 403052-403054 276->279 277->278 280 403191-403197 278->280 279->244 280->280 281 403199-4031b1 call 405e5d 280->281 281->218
                          APIs
                          • GetTickCount.KERNEL32 ref: 00402F28
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\presupuesto urgente.exe,00000400), ref: 00402F44
                            • Part of subcall function 00405EA2: GetFileAttributesW.KERNELBASE(00000003,00402F57,C:\Users\user\Desktop\presupuesto urgente.exe,80000000,00000003), ref: 00405EA6
                            • Part of subcall function 00405EA2: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405EC8
                          • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\presupuesto urgente.exe,C:\Users\user\Desktop\presupuesto urgente.exe,80000000,00000003), ref: 00402F8D
                          • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 004030D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\presupuesto urgente.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\presupuesto urgente.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 2803837635-106735223
                          • Opcode ID: 4aa3185e2732ea1d92bd2938039fdcb50ab67e449d873de13479ee0b69e06266
                          • Instruction ID: 409c8f22eebac3ceeba7cf51205c68f93d68dba00e9ec32c8e3ebc1c19b8881b
                          • Opcode Fuzzy Hash: 4aa3185e2732ea1d92bd2938039fdcb50ab67e449d873de13479ee0b69e06266
                          • Instruction Fuzzy Hash: 8D61E031A00204ABDB20EF65DD85A9A7BA8EB04355F20817FF901F72D0C77C9A418BAD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 548 4063d2-4063dd 549 4063f0-406406 548->549 550 4063df-4063ee 548->550 551 40640c-406419 549->551 552 40661e-406624 549->552 550->549 551->552 555 40641f-406426 551->555 553 40662a-406635 552->553 554 40642b-406438 552->554 557 406640-406641 553->557 558 406637-40663b call 4063b0 553->558 554->553 556 40643e-40644a 554->556 555->552 559 406450-40648e 556->559 560 40660b 556->560 558->557 562 406494-40649f 559->562 563 4065ae-4065b2 559->563 564 406619-40661c 560->564 565 40660d-406617 560->565 566 4064a1-4064a6 562->566 567 4064b8 562->567 568 4065b4-4065ba 563->568 569 4065e5-4065e9 563->569 564->552 565->552 566->567 572 4064a8-4064ab 566->572 575 4064bf-4064c6 567->575 573 4065ca-4065d6 call 4063b0 568->573 574 4065bc-4065c8 call 4062f7 568->574 570 4065f8-406609 lstrlenW 569->570 571 4065eb-4065f3 call 4063d2 569->571 570->552 571->570 572->567 577 4064ad-4064b0 572->577 586 4065db-4065e1 573->586 574->586 579 4064c8-4064ca 575->579 580 4064cb-4064cd 575->580 577->567 582 4064b2-4064b6 577->582 579->580 584 406508-40650b 580->584 585 4064cf-4064f6 call 40627e 580->585 582->575 587 40651b-40651e 584->587 588 40650d-406519 GetSystemDirectoryW 584->588 599 406596-406599 585->599 600 4064fc-406503 call 4063d2 585->600 586->570 590 4065e3 586->590 592 406520-40652e GetWindowsDirectoryW 587->592 593 406589-40658b 587->593 591 40658d-406591 588->591 595 4065a6-4065ac call 406644 590->595 591->595 596 406593 591->596 592->593 593->591 598 406530-40653a 593->598 595->570 596->599 604 406554-40656a SHGetSpecialFolderLocation 598->604 605 40653c-40653f 598->605 599->595 602 40659b-4065a1 lstrcatW 599->602 600->591 602->595 608 406585 604->608 609 40656c-406583 SHGetPathFromIDListW CoTaskMemFree 604->609 605->604 607 406541-406548 605->607 610 406550-406552 607->610 608->593 609->591 609->608 610->591 610->604
                          APIs
                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406513
                          • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00422708,?,0040544B,00422708,00000000), ref: 00406526
                          • SHGetSpecialFolderLocation.SHELL32(0040544B,00000000,00000000,00422708,?,0040544B,00422708,00000000), ref: 00406562
                          • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406570
                          • CoTaskMemFree.OLE32(00000000), ref: 0040657B
                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065A1
                          • lstrlenW.KERNEL32(Call,00000000,00422708,?,0040544B,00422708,00000000), ref: 004065F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                          • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 717251189-1230650788
                          • Opcode ID: 15e8cba43a00d1251787e7505a7f0100c69544ffb4eb695e889bacc90eff1716
                          • Instruction ID: 781aa6555cb08bc9a39a1310e2b7c8a7a94b670d8f790df7948cd7d686d0a9f3
                          • Opcode Fuzzy Hash: 15e8cba43a00d1251787e7505a7f0100c69544ffb4eb695e889bacc90eff1716
                          • Instruction Fuzzy Hash: 52611771600101ABDF209F54ED40ABE37A5AF40314F56453FE947B62D4D73D8AA2CB5D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 611 40176f-401794 call 402c37 call 405cf8 616 401796-40179c call 4063b0 611->616 617 40179e-4017b0 call 4063b0 call 405c81 lstrcatW 611->617 622 4017b5-4017b6 call 406644 616->622 617->622 626 4017bb-4017bf 622->626 627 4017c1-4017cb call 4066f3 626->627 628 4017f2-4017f5 626->628 636 4017dd-4017ef 627->636 637 4017cd-4017db CompareFileTime 627->637 630 4017f7-4017f8 call 405e7d 628->630 631 4017fd-401819 call 405ea2 628->631 630->631 638 40181b-40181e 631->638 639 40188d-4018b6 call 405414 call 4031ba 631->639 636->628 637->636 640 401820-40185e call 4063b0 * 2 call 4063d2 call 4063b0 call 405a12 638->640 641 40186f-401879 call 405414 638->641 653 4018b8-4018bc 639->653 654 4018be-4018ca SetFileTime 639->654 640->626 673 401864-401865 640->673 651 401882-401888 641->651 655 402ac8 651->655 653->654 657 4018d0-4018db CloseHandle 653->657 654->657 661 402aca-402ace 655->661 658 4018e1-4018e4 657->658 659 402abf-402ac2 657->659 662 4018e6-4018f7 call 4063d2 lstrcatW 658->662 663 4018f9-4018fc call 4063d2 658->663 659->655 669 401901-4022f6 call 405a12 662->669 663->669 669->661 673->651 675 401867-401868 673->675 675->641
                          APIs
                          • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet,?,?,00000031), ref: 004017B0
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet,?,?,00000031), ref: 004017D5
                            • Part of subcall function 004063B0: lstrcpynW.KERNEL32(?,?,00000400,0040355A,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063BD
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                            • Part of subcall function 00405414: lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                            • Part of subcall function 00405414: SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                            • Part of subcall function 00405414: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Temp\nsj72EF.tmp$C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet$Call
                          • API String ID: 1941528284-267157193
                          • Opcode ID: c80200c29ca938d3f9be0bc76a293d962ee4304018d07197e4f76f8e1ca0c2de
                          • Instruction ID: 6d789f9af123ab0f865e5502c846d56d3cd3544f1fa5f1ae7e054fd30d3333f6
                          • Opcode Fuzzy Hash: c80200c29ca938d3f9be0bc76a293d962ee4304018d07197e4f76f8e1ca0c2de
                          • Instruction Fuzzy Hash: E741D871510115BACF117BA5CD45EAF3679EF01328B20423FF922F10E1DB3C8A519AAE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 677 402644-40265d call 402c15 680 402663-40266a 677->680 681 402abf-402ac2 677->681 682 40266c 680->682 683 40266f-402672 680->683 684 402ac8-402ace 681->684 682->683 685 4027d6-4027de 683->685 686 402678-402687 call 406310 683->686 685->681 686->685 690 40268d 686->690 691 402693-402697 690->691 692 40272c-40272f 691->692 693 40269d-4026b8 ReadFile 691->693 694 402731-402734 692->694 695 402747-402757 call 405f25 692->695 693->685 696 4026be-4026c3 693->696 694->695 697 402736-402741 call 405f83 694->697 695->685 706 402759 695->706 696->685 699 4026c9-4026d7 696->699 697->685 697->695 702 402792-40279e call 4062f7 699->702 703 4026dd-4026ef MultiByteToWideChar 699->703 702->684 703->706 707 4026f1-4026f4 703->707 709 40275c-40275f 706->709 710 4026f6-402701 707->710 709->702 711 402761-402766 709->711 710->709 712 402703-402728 SetFilePointer MultiByteToWideChar 710->712 713 4027a3-4027a7 711->713 714 402768-40276d 711->714 712->710 715 40272a 712->715 716 4027c4-4027d0 SetFilePointer 713->716 717 4027a9-4027ad 713->717 714->713 718 40276f-402782 714->718 715->706 716->685 719 4027b5-4027c2 717->719 720 4027af-4027b3 717->720 718->685 721 402784-40278a 718->721 719->685 720->716 720->719 721->691 722 402790 721->722 722->685
                          APIs
                          • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B0
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026EB
                          • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 0040270E
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 00402724
                            • Part of subcall function 00405F83: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405F99
                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: File$Pointer$ByteCharMultiWide$Read
                          • String ID: 9
                          • API String ID: 163830602-2366072709
                          • Opcode ID: 87cfad3e31df379bf1329a0d53b4cb21fa96f1686d8734dbec1fa7beea93af1a
                          • Instruction ID: c360ee4afea2d2749c5a2d2d3cba589ababf6fe072d155cbc4f623872b1d9462
                          • Opcode Fuzzy Hash: 87cfad3e31df379bf1329a0d53b4cb21fa96f1686d8734dbec1fa7beea93af1a
                          • Instruction Fuzzy Hash: 2E51F874D0021AAADF20DFA5DA88AAEB779FF04304F50443BE511B72D0D7B899828B58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 723 40671a-40673a GetSystemDirectoryW 724 40673c 723->724 725 40673e-406740 723->725 724->725 726 406751-406753 725->726 727 406742-40674b 725->727 729 406754-406787 wsprintfW LoadLibraryExW 726->729 727->726 728 40674d-40674f 727->728 728->729
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406731
                          • wsprintfW.USER32 ref: 0040676C
                          • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406780
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME$\
                          • API String ID: 2200240437-1946221925
                          • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                          • Instruction ID: 212fe184e71725d5a8014c1118872f5233ada1a9ecb6260670121aae60094f83
                          • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                          • Instruction Fuzzy Hash: BBF02170510119ABCF10BB64DD0DF9B375CAB00305F50447AA546F20D1EBBCDA78C798

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 730 4058e3-40592e CreateDirectoryW 731 405930-405932 730->731 732 405934-405941 GetLastError 730->732 733 40595b-40595d 731->733 732->733 734 405943-405957 SetFileSecurityW 732->734 734->731 735 405959 GetLastError 734->735 735->733
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405926
                          • GetLastError.KERNEL32 ref: 0040593A
                          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040594F
                          • GetLastError.KERNEL32 ref: 00405959
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 3449924974-1246513382
                          • Opcode ID: 4e538d1c76d2fdfb7cd0fd00a6572ed9e7029d57e55293966324597acc96cb40
                          • Instruction ID: c49c088e9ba2396d105a9c54abfe353073567d613583196498a7e7de041cdc41
                          • Opcode Fuzzy Hash: 4e538d1c76d2fdfb7cd0fd00a6572ed9e7029d57e55293966324597acc96cb40
                          • Instruction Fuzzy Hash: C8011AB1C10619DADF009FA1C9487EFBFB4EF14354F00403AD545B6291D7789618CFA9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 736 405ed1-405edd 737 405ede-405f12 GetTickCount GetTempFileNameW 736->737 738 405f21-405f23 737->738 739 405f14-405f16 737->739 741 405f1b-405f1e 738->741 739->737 740 405f18 739->740 740->741
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405EEF
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\presupuesto urgente.exe",00403487,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004036D5), ref: 00405F0A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: "C:\Users\user\Desktop\presupuesto urgente.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-3243705145
                          • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                          • Instruction ID: 6418149b7de8853f47a359c443b4445f7a51012143164c36937b703eba88611a
                          • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                          • Instruction Fuzzy Hash: 51F03076A00204FBEB009F59ED05E9BB7ACEB95750F10803AED41F7250E6B49A54CB69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 742 10001759-10001795 call 10001b18 746 100018a6-100018a8 742->746 747 1000179b-1000179f 742->747 748 100017a1-100017a7 call 10002286 747->748 749 100017a8-100017b5 call 100022d0 747->749 748->749 754 100017e5-100017ec 749->754 755 100017b7-100017bc 749->755 756 1000180c-10001810 754->756 757 100017ee-1000180a call 100024a4 call 100015b4 call 10001272 GlobalFree 754->757 758 100017d7-100017da 755->758 759 100017be-100017bf 755->759 763 10001812-1000184c call 100015b4 call 100024a4 756->763 764 1000184e-10001854 call 100024a4 756->764 780 10001855-10001859 757->780 758->754 765 100017dc-100017dd call 10002b57 758->765 761 100017c1-100017c2 759->761 762 100017c7-100017c8 call 1000289c 759->762 769 100017c4-100017c5 761->769 770 100017cf-100017d5 call 10002640 761->770 776 100017cd 762->776 763->780 764->780 773 100017e2 765->773 769->754 769->762 779 100017e4 770->779 773->779 776->773 779->754 785 10001896-1000189d 780->785 786 1000185b-10001869 call 10002467 780->786 785->746 788 1000189f-100018a0 GlobalFree 785->788 792 10001881-10001888 786->792 793 1000186b-1000186e 786->793 788->746 792->785 795 1000188a-10001895 call 1000153d 792->795 793->792 794 10001870-10001878 793->794 794->792 796 1000187a-1000187b FreeLibrary 794->796 795->785 796->792
                          APIs
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                          • GlobalFree.KERNEL32(00000000), ref: 10001804
                          • FreeLibrary.KERNEL32(?), ref: 1000187B
                          • GlobalFree.KERNEL32(00000000), ref: 100018A0
                            • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,8BC3C95B), ref: 100022B8
                            • Part of subcall function 10002640: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B2
                            • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4505515296.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4505502087.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505526475.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505538713.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarylstrcpy
                          • String ID:
                          • API String ID: 1791698881-3916222277
                          • Opcode ID: 80a71440bbdc6676df6433b68331a89e098fd0a61e7fd3645cfd834030fcbe9d
                          • Instruction ID: 65685ba44f5e0dd4e22f20931bb662b0f8110762eb821eef9687284fed8b6370
                          • Opcode Fuzzy Hash: 80a71440bbdc6676df6433b68331a89e098fd0a61e7fd3645cfd834030fcbe9d
                          • Instruction Fuzzy Hash: 4A31AC75804241AAFB14DF649CC9BDA37E8FF043D4F158065FA0AAA08FDFB4A984C761

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 799 4023de-40240f call 402c37 * 2 call 402cc7 806 402415-40241f 799->806 807 402abf-402ace 799->807 809 402421-40242e call 402c37 lstrlenW 806->809 810 402432-402435 806->810 809->810 811 402437-402448 call 402c15 810->811 812 402449-40244c 810->812 811->812 816 40245d-402471 RegSetValueExW 812->816 817 40244e-402458 call 4031ba 812->817 821 402473 816->821 822 402476-402557 RegCloseKey 816->822 817->816 821->822 822->807 824 402885-40288c 822->824 824->807
                          APIs
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj72EF.tmp,00000023,00000011,00000002), ref: 00402429
                          • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsj72EF.tmp,00000000,00000011,00000002), ref: 00402469
                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsj72EF.tmp,00000000,00000011,00000002), ref: 00402551
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CloseValuelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsj72EF.tmp
                          • API String ID: 2655323295-4242380532
                          • Opcode ID: e48b1e85c28757713ab227aa479e2b9ceb42c74d784ae5642fab68139845f862
                          • Instruction ID: 1eab41df84c6b24c6b923ea001d17cdc0cfdc7d4c8a499a75fdfc4da8179f3fa
                          • Opcode Fuzzy Hash: e48b1e85c28757713ab227aa479e2b9ceb42c74d784ae5642fab68139845f862
                          • Instruction Fuzzy Hash: A1118171E00108AFEB10AFA5DE49EAEBAB4EB54354F11803AF504F71D1DBB84D459B58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 825 402d2a-402d53 call 40621d 827 402d58-402d5a 825->827 828 402dd0-402dd4 827->828 829 402d5c-402d62 827->829 830 402d7e-402d93 RegEnumKeyW 829->830 831 402d64-402d66 830->831 832 402d95-402da7 RegCloseKey call 40678a 830->832 834 402db6-402dc2 RegCloseKey 831->834 835 402d68-402d7c call 402d2a 831->835 839 402dc4-402dca RegDeleteKeyW 832->839 840 402da9-402db4 832->840 834->828 835->830 835->832 839->828 840->828
                          APIs
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402D8F
                          • RegCloseKey.ADVAPI32(?), ref: 00402D98
                          • RegCloseKey.ADVAPI32(?), ref: 00402DB9
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Close$Enum
                          • String ID:
                          • API String ID: 464197530-0
                          • Opcode ID: df4bd2222173038e22a6f7143f63260fc380016edffd80d7804df4238b5218be
                          • Instruction ID: 0f4b1bf7762f76a333ccd5711aab570045f86c75fcf3a50f9e11fcc9d843940a
                          • Opcode Fuzzy Hash: df4bd2222173038e22a6f7143f63260fc380016edffd80d7804df4238b5218be
                          • Instruction Fuzzy Hash: 21116A32540509FBDF129F90CE09BEE7B69EF58344F110076B905B50E0E7B5DE21AB68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 926 4015c1-4015d5 call 402c37 call 405d2c 931 401631-401634 926->931 932 4015d7-4015ea call 405cae 926->932 934 401663-40224a call 401423 931->934 935 401636-401655 call 401423 call 4063b0 SetCurrentDirectoryW 931->935 939 401604-401607 call 405960 932->939 940 4015ec-4015ef 932->940 949 402885-40288c 934->949 950 402abf-402ace 934->950 935->950 955 40165b-40165e 935->955 951 40160c-40160e 939->951 940->939 943 4015f1-4015f8 call 40597d 940->943 943->939 959 4015fa-4015fd call 4058e3 943->959 949->950 952 401610-401615 951->952 953 401627-40162f 951->953 957 401624 952->957 958 401617-401622 GetFileAttributesW 952->958 953->931 953->932 955->950 957->953 958->953 958->957 962 401602 959->962 962->951
                          APIs
                            • Part of subcall function 00405D2C: CharNextW.USER32(?,?,00425F30,?,00405DA0,00425F30,00425F30,?,?,75922EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405D3A
                            • Part of subcall function 00405D2C: CharNextW.USER32(00000000), ref: 00405D3F
                            • Part of subcall function 00405D2C: CharNextW.USER32(00000000), ref: 00405D57
                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                            • Part of subcall function 004058E3: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405926
                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet,?,00000000,000000F0), ref: 0040164D
                          Strings
                          • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet, xrefs: 00401640
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                          • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet
                          • API String ID: 1892508949-91662111
                          • Opcode ID: 63e3afcb8f518b8f961fa91b0460bec2abaa85340c93af8d37e8798651ac2648
                          • Instruction ID: a4cb8c34a70438e14e420fb04ab38ad532f12a03bdfc5322accc4ce246dd33dc
                          • Opcode Fuzzy Hash: 63e3afcb8f518b8f961fa91b0460bec2abaa85340c93af8d37e8798651ac2648
                          • Instruction Fuzzy Hash: 9011BE31504104EBCF31AFA0CD0199F36A0EF14368B28493BEA45B22F1DB3E4D51DA4E
                          APIs
                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059BE
                          • CloseHandle.KERNEL32(?), ref: 004059CB
                          Strings
                          • Error launching installer, xrefs: 004059A8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                          • Instruction ID: 7702c274cdf70951028335e9b96fa9876c0cc9a795fc840707e03dbfe60e7272
                          • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                          • Instruction Fuzzy Hash: B4E046F0A00209BFEB009BA4ED09F7BBAACFB04208F418431BD00F6190D774A8208A78
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 86ce5b7836e8efc76d9880a3b815598044ae852516a7a266a4593ffa0bd4c046
                          • Instruction ID: 1a1db7b112f5c349f32c040b215ce8adb2231ea54f988815808aa67dfaaa6b76
                          • Opcode Fuzzy Hash: 86ce5b7836e8efc76d9880a3b815598044ae852516a7a266a4593ffa0bd4c046
                          • Instruction Fuzzy Hash: 6AA15271E04228CBDF28CFA8C8446ADBBB1FF44305F14816ED856BB281D7786A86DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f289ec4eae441b973c5cf469eb2209b78d92787f90c2f70d8ea77383fdb072af
                          • Instruction ID: 81ced8d75bd8cd674d530aa485ef516b0f39a629971cfce93107e9c84bdcedbb
                          • Opcode Fuzzy Hash: f289ec4eae441b973c5cf469eb2209b78d92787f90c2f70d8ea77383fdb072af
                          • Instruction Fuzzy Hash: 4E912170E04228CBDF28CFA8C8547ADBBB1FB44305F14816ED856BB281D778A986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 36b8550c79165f3bd8438b4b7b77fc639822643401bcc62ffa2a7152ccecd571
                          • Instruction ID: 6e186065c07e551db02da0b657444ed8a40fac9cbefa0218a87430385e41b7b0
                          • Opcode Fuzzy Hash: 36b8550c79165f3bd8438b4b7b77fc639822643401bcc62ffa2a7152ccecd571
                          • Instruction Fuzzy Hash: F7814571E04228CFDF24CFA8C8447ADBBB1FB45305F24816AD856BB281C778A996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fd90919654d861d793b9259fd4ddd35531221e69384e43b7f209bc021a7cca94
                          • Instruction ID: 1a645af2666a8cd9619cdf871bd9e2c738fb6a6c353dc56c4864b2e7a25bf22b
                          • Opcode Fuzzy Hash: fd90919654d861d793b9259fd4ddd35531221e69384e43b7f209bc021a7cca94
                          • Instruction Fuzzy Hash: 71816771E04228DBEF28CFA8C8447ADBBB1FB44301F14816AD956BB2C1C7786986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7afd307a57d874939e6d1f07c4a81c11abd2b71d61e18d684fba0f23c35f734a
                          • Instruction ID: b0583babc1dad824d13d86abae56a1a356e3ceb45be48e511182641c275db258
                          • Opcode Fuzzy Hash: 7afd307a57d874939e6d1f07c4a81c11abd2b71d61e18d684fba0f23c35f734a
                          • Instruction Fuzzy Hash: 8C712471E04228CFDF28CFA8C9447ADBBB1FB44305F15806AD856BB281D7386996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c52b64c4cba7ecf1fb5e1bb59396999cb3f4df188a1ab73f316032be63138ba7
                          • Instruction ID: 968097f9e37e498ed83c4652799cdf8e1ebeb5c7fee57b8dc09d96684c556b9e
                          • Opcode Fuzzy Hash: c52b64c4cba7ecf1fb5e1bb59396999cb3f4df188a1ab73f316032be63138ba7
                          • Instruction Fuzzy Hash: 27712471E04228CFDF28CFA8C854BADBBB1FB44305F15806AD856BB281C7786996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c741c7bc90f3712fe41ea972859e43f39dd565e03f7b0e7aa23f6ef9dcbd7f18
                          • Instruction ID: 737cb098acab11621bc79b115fd6dc57f162d32c21417d2b0fd17844244e9397
                          • Opcode Fuzzy Hash: c741c7bc90f3712fe41ea972859e43f39dd565e03f7b0e7aa23f6ef9dcbd7f18
                          • Instruction Fuzzy Hash: 5A714571E04228CFEF28CF98C8447ADBBB1FB44305F14806AD956BB281C778A996DF45
                          APIs
                          • GetTickCount.KERNEL32 ref: 004032D6
                            • Part of subcall function 00403441: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040313F,?), ref: 0040344F
                          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004031EC,00000004,00000000,00000000,?,?,00403166,000000FF,00000000,00000000,0040A230,?), ref: 00403309
                          • SetFilePointer.KERNELBASE(0014F4B2,00000000,00000000,00414ED0,00004000,?,00000000,004031EC,00000004,00000000,00000000,?,?,00403166,000000FF,00000000), ref: 00403404
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: FilePointer$CountTick
                          • String ID:
                          • API String ID: 1092082344-0
                          • Opcode ID: 63f894617870b8b9b6b4d0f35ad55c68ae2789ba15d09fbc75adc17a06edb544
                          • Instruction ID: 8a5bf560653b24f1bd3cd60389d49066fb51751ebaffca469d7b7cf87711dc5f
                          • Opcode Fuzzy Hash: 63f894617870b8b9b6b4d0f35ad55c68ae2789ba15d09fbc75adc17a06edb544
                          • Instruction Fuzzy Hash: 10316C72610211DBD711DF29EEC49A63BA9F78439A714823FE900B62E0CBB95D058B9D
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402057
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                            • Part of subcall function 00405414: lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                            • Part of subcall function 00405414: SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                            • Part of subcall function 00405414: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                          • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402068
                          • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004020E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                          • String ID:
                          • API String ID: 334405425-0
                          • Opcode ID: 44d570d4ef42a6af9798bac81a48d6e43403590213f26621d83d999ce1ed40c7
                          • Instruction ID: efb744b1bbbaa1f1e58e2693dd3ff93cd36a27706c6aad24c330354b17a2434d
                          • Opcode Fuzzy Hash: 44d570d4ef42a6af9798bac81a48d6e43403590213f26621d83d999ce1ed40c7
                          • Instruction Fuzzy Hash: 6F21C531900218EBCF20AFA5CE4CA9E7A70AF04354F60413BF610B61E1DBBD4991DA6E
                          APIs
                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402525
                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402538
                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsj72EF.tmp,00000000,00000011,00000002), ref: 00402551
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Enum$CloseValue
                          • String ID:
                          • API String ID: 397863658-0
                          • Opcode ID: 297b237e24fbbf63aa7ca08728d7b3950c3333922afcc1c5b6d3d1192ed08725
                          • Instruction ID: 4fa2f3c06f6248971957712acf2942ced6ba336c37b2851dfbda8b2cd28c17b0
                          • Opcode Fuzzy Hash: 297b237e24fbbf63aa7ca08728d7b3950c3333922afcc1c5b6d3d1192ed08725
                          • Instruction Fuzzy Hash: 6D017171904104EFE7159FA5DE89ABFB6B8EF44348F10403EF105A62D0DAB84E459B69
                          APIs
                          • VirtualAllocEx.KERNELBASE(00000000), ref: 1000295B
                          • GetLastError.KERNEL32 ref: 10002A62
                          Memory Dump Source
                          • Source File: 00000000.00000002.4505515296.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4505502087.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505526475.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505538713.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: AllocErrorLastVirtual
                          • String ID:
                          • API String ID: 497505419-0
                          • Opcode ID: 34874d5dbfeecf70d049f007544d8fe97316615c6b6b2225bbceacac8e3d04ae
                          • Instruction ID: 6dfa44c8e371a7ac1a486a55eff0af4ad814c9ea0d06d7514663fdd8c294557a
                          • Opcode Fuzzy Hash: 34874d5dbfeecf70d049f007544d8fe97316615c6b6b2225bbceacac8e3d04ae
                          • Instruction Fuzzy Hash: 4E51B4B9905211DFFB20DFA4DCC675937A8EB443D4F22C42AEA04E726DCE34A990CB55
                          APIs
                          • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403166,000000FF,00000000,00000000,0040A230,?), ref: 004031DF
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: af526002166308cc95fa76d49654f36d838bd7a13899b6376ccfe278c881acad
                          • Instruction ID: 4c6ae7a0626839fce45d877b24888c0af913333af22313e68c4d1644c71cb298
                          • Opcode Fuzzy Hash: af526002166308cc95fa76d49654f36d838bd7a13899b6376ccfe278c881acad
                          • Instruction Fuzzy Hash: 3B319C3020021AFFDB109F95ED84ADB3F68EB04359B1085BEF904E6190D778CE509BA9
                          APIs
                          • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024AF
                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsj72EF.tmp,00000000,00000011,00000002), ref: 00402551
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID:
                          • API String ID: 3356406503-0
                          • Opcode ID: a3b88ef37a04c447d509aafcd647c8bb55f7a85eb83bcf9e8b78a58130226466
                          • Instruction ID: 2d27e3624369fee7c217219a4e344138e42523264533ea489648bddc6477d6d2
                          • Opcode Fuzzy Hash: a3b88ef37a04c447d509aafcd647c8bb55f7a85eb83bcf9e8b78a58130226466
                          • Instruction Fuzzy Hash: 53119171900209EBEB24DFA4CA585AEB6B4EF04344F20843FE046A62C0D7B84A45DB5A
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                          • Instruction ID: 4945fb4554c9d48a14a82d28c5fc4c127f2c3d85d8aa5c2a63fae023cf5e702c
                          • Opcode Fuzzy Hash: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                          • Instruction Fuzzy Hash: AB01F431724210EBEB199B789D04B2A3698E710714F104A7FF855F62F1DA78CC529B5D
                          APIs
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023AA
                          • RegCloseKey.ADVAPI32(00000000), ref: 004023B3
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CloseDeleteValue
                          • String ID:
                          • API String ID: 2831762973-0
                          • Opcode ID: 3500e27f67e3657d3f13e648c5a4e4955d4a6b8459d35a1d73aadda57e6becb1
                          • Instruction ID: eeebe11236d86b478005370e27fb04b66889edd8f93d7ff1d49de92df4b57ee5
                          • Opcode Fuzzy Hash: 3500e27f67e3657d3f13e648c5a4e4955d4a6b8459d35a1d73aadda57e6becb1
                          • Instruction Fuzzy Hash: 58F09632A04114DBE711BBA49B4EABEB2A59B44354F16053FFA02F71C1DEFC4D41866D
                          APIs
                          • ShowWindow.USER32(00000000,00000000), ref: 00401E61
                          • EnableWindow.USER32(00000000,00000000), ref: 00401E6C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Window$EnableShow
                          • String ID:
                          • API String ID: 1136574915-0
                          • Opcode ID: 611feb8e2eb8574bcf65ce6e82aff3c902186df27cfe016bcc5f4eefe149f0e3
                          • Instruction ID: 353457a250eeab47012712e359045a90ae935b3a48e85cb5936bf3a8ff6902a1
                          • Opcode Fuzzy Hash: 611feb8e2eb8574bcf65ce6e82aff3c902186df27cfe016bcc5f4eefe149f0e3
                          • Instruction Fuzzy Hash: 40E09232E08200CFD724DBA5AA4946D77B0EB84354720407FE112F11D1DA784881CF6D
                          APIs
                          • GetModuleHandleA.KERNEL32(?,00000020,?,004034FB,0000000A), ref: 0040679C
                          • GetProcAddress.KERNEL32(00000000,?), ref: 004067B7
                            • Part of subcall function 0040671A: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406731
                            • Part of subcall function 0040671A: wsprintfW.USER32 ref: 0040676C
                            • Part of subcall function 0040671A: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406780
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID:
                          • API String ID: 2547128583-0
                          • Opcode ID: 1fd694bbbc018e5f81eae6ff46d5e7dd0c39e86c0a2cf65890550c3579ed631a
                          • Instruction ID: 6fedc38abd16d04710e8a636fd16f84820eabe090bba127bd882252d3fb3e83b
                          • Opcode Fuzzy Hash: 1fd694bbbc018e5f81eae6ff46d5e7dd0c39e86c0a2cf65890550c3579ed631a
                          • Instruction Fuzzy Hash: 21E0863250421156D21096745E4893772AC9AC4718307843EF956F3041DB389C35A76D
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,00402F57,C:\Users\user\Desktop\presupuesto urgente.exe,80000000,00000003), ref: 00405EA6
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405EC8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                          • Instruction ID: 5201df1ff3c0a0bd0294a98706b79309786c42e99614e685d4e3591f63f4d9e2
                          • Opcode Fuzzy Hash: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                          • Instruction Fuzzy Hash: D5D09E31254601AFEF098F20DE16F2E7AA2EB84B04F11552CB7C2940E0DA7158199B15
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,0040347C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004036D5,?,00000006,00000008,0000000A), ref: 00405966
                          • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405974
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                          • Instruction ID: a0b70af09676f49ae35af12b400ff138e6ea5c47fed9fef2c083bef2843b0e9d
                          • Opcode Fuzzy Hash: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                          • Instruction Fuzzy Hash: 97C04C71255506DADB105F31DE08F1B7A50AB60751F11843AA18AE51B0DA348455DD2D
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402807
                            • Part of subcall function 004062F7: wsprintfW.USER32 ref: 00406304
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: df39207a0041021f90c9c5904dee6126a22bdfdf8dd6c18872903947b59110e0
                          • Instruction ID: 55fb61e46e544c01c8f838511187bb9fe83791c0a23b57862087ec8cac53259a
                          • Opcode Fuzzy Hash: df39207a0041021f90c9c5904dee6126a22bdfdf8dd6c18872903947b59110e0
                          • Instruction Fuzzy Hash: EDE09271A00104AFDB11EBA5AF499AE7779DB80304B14407FF501F11D2CB790D52DE2E
                          APIs
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040233D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: 611604a497d22fd9b22a7666efc1e18301a5eb9844a24c96cea5756000cc0278
                          • Instruction ID: f718b570c03cd879152723008abd35f840e0595a9afadee28286a7759bd10add
                          • Opcode Fuzzy Hash: 611604a497d22fd9b22a7666efc1e18301a5eb9844a24c96cea5756000cc0278
                          • Instruction Fuzzy Hash: A1E086719042686EE7303AF10F8EDBF50989B44348B55093FBA01B61C2D9FC0D46826D
                          APIs
                          • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CE8,00000000,?,?), ref: 00406274
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                          • Instruction ID: 479e159ceda2cb7b50184963f42fe168e38793edbf0b306f3e9e40cefa011f94
                          • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                          • Instruction Fuzzy Hash: F5E0E672010109BEEF195F50DD0AD7B371DE704314F01452EFA07E4051E6B5A9305734
                          APIs
                          • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,0040D022,0040CED0,004033C2,0040CED0,0040D022,00414ED0,00004000,?,00000000,004031EC,00000004), ref: 00405F68
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                          • Instruction ID: 6078229a914e39b74a0c5ece066be2a5834b756046c3aff4b734283800ecbe33
                          • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                          • Instruction Fuzzy Hash: 2DE0EC3221065EABDF109EA59C00EEB7B6CFB053A0F004437FD25E3150D775E9219BA8
                          APIs
                          • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414ED0,0040CED0,0040343E,0040A230,0040A230,00403342,00414ED0,00004000,?,00000000,004031EC), ref: 00405F39
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                          • Instruction ID: 9b2ea83f702eb3fffeb4c264c614e4c5cb206e28bf88f3110778221d7db1fef5
                          • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                          • Instruction Fuzzy Hash: D7E08C3220021AEBCF109F508C00EEB3B6CEB04360F004472F925E2180E234E8219FA8
                          APIs
                          • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E0
                          Memory Dump Source
                          • Source File: 00000000.00000002.4505515296.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4505502087.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505526475.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505538713.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction ID: 43a77b614ff4017466e57d7f63f0e44ab05d53355a3bca00642047650885b550
                          • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction Fuzzy Hash: C5F0A5F15057A0DEF350DF688C847063BE4E3583C4B03852AE368F6269EB344454DF19
                          APIs
                          • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,00422708,?,?,004062AB,00422708,00000000,?,?,Call,?), ref: 00406241
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                          • Instruction ID: 3024dc78f91217c8ac754af2bee00b96045fdb9f0f4599777b3fb0e88d8c22ab
                          • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                          • Instruction Fuzzy Hash: 8AD0123200020DBBDF116E919D05FAB371DEB04310F014426FE16A4091D775D530AB15
                          APIs
                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 29d25e4036f002882842ff2abbc33b1b61682e4b1f0e1c41cb6674e83b655918
                          • Instruction ID: 608ef69ca2b13f27eda1cfcd16162797e0d7c1effb02ba883df1ee114d760796
                          • Opcode Fuzzy Hash: 29d25e4036f002882842ff2abbc33b1b61682e4b1f0e1c41cb6674e83b655918
                          • Instruction Fuzzy Hash: 44D01272B04104DBDB21DBA4AF0859D73A59B10364B204677E101F11D1DAB989559A1D
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040313F,?), ref: 0040344F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                          • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                          • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                          • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                          APIs
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                            • Part of subcall function 00405414: lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                            • Part of subcall function 00405414: SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                            • Part of subcall function 00405414: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                            • Part of subcall function 00405995: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059BE
                            • Part of subcall function 00405995: CloseHandle.KERNEL32(?), ref: 004059CB
                          • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401F47
                            • Part of subcall function 0040683B: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040684C
                            • Part of subcall function 0040683B: GetExitCodeProcess.KERNEL32(?,?), ref: 0040686E
                            • Part of subcall function 004062F7: wsprintfW.USER32 ref: 00406304
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                          • String ID:
                          • API String ID: 2972824698-0
                          • Opcode ID: b4474b7c365b70f9dc7c58f3b4c8f6c607978000052ce3e09dedc8896c81aea9
                          • Instruction ID: 78872c6594437c8f6fb94a475087433cb7c5ddb6828dda6eb17a8edff69df0b5
                          • Opcode Fuzzy Hash: b4474b7c365b70f9dc7c58f3b4c8f6c607978000052ce3e09dedc8896c81aea9
                          • Instruction Fuzzy Hash: 93F0F072905021DBCB20FBA58E848DE72B09F01328B2101BFF101F21D1C77C0E418AAE
                          APIs
                          • Sleep.KERNELBASE(00000000), ref: 004014EA
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: cb92cf7ccb1965bdce3badc7d49dd673c55c158fa478f1f9cab94f81649d65d9
                          • Instruction ID: adf76bd272608bb1b99769d9a9b05885636640fbfa2c3f91bbd7a8ebdab0685d
                          • Opcode Fuzzy Hash: cb92cf7ccb1965bdce3badc7d49dd673c55c158fa478f1f9cab94f81649d65d9
                          • Instruction Fuzzy Hash: 45D0A773F141008BD720EBB8BE8945E73F8E7803193208837E102F11D1E578C8928A2D
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 004055B1
                          • GetDlgItem.USER32(?,000003EE), ref: 004055C0
                          • GetClientRect.USER32(?,?), ref: 004055FD
                          • GetSystemMetrics.USER32(00000002), ref: 00405604
                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405625
                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405636
                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405649
                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405657
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040566A
                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040568C
                          • ShowWindow.USER32(?,00000008), ref: 004056A0
                          • GetDlgItem.USER32(?,000003EC), ref: 004056C1
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004056D1
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004056EA
                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004056F6
                          • GetDlgItem.USER32(?,000003F8), ref: 004055CF
                            • Part of subcall function 0040437A: SendMessageW.USER32(00000028,?,00000001,004041A5), ref: 00404388
                          • GetDlgItem.USER32(?,000003EC), ref: 00405713
                          • CreateThread.KERNEL32(00000000,00000000,Function_000054E7,00000000), ref: 00405721
                          • CloseHandle.KERNEL32(00000000), ref: 00405728
                          • ShowWindow.USER32(00000000), ref: 0040574C
                          • ShowWindow.USER32(?,00000008), ref: 00405751
                          • ShowWindow.USER32(00000008), ref: 0040579B
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057CF
                          • CreatePopupMenu.USER32 ref: 004057E0
                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004057F4
                          • GetWindowRect.USER32(?,?), ref: 00405814
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040582D
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405865
                          • OpenClipboard.USER32(00000000), ref: 00405875
                          • EmptyClipboard.USER32 ref: 0040587B
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405887
                          • GlobalLock.KERNEL32(00000000), ref: 00405891
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A5
                          • GlobalUnlock.KERNEL32(00000000), ref: 004058C5
                          • SetClipboardData.USER32(0000000D,00000000), ref: 004058D0
                          • CloseClipboard.USER32 ref: 004058D6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                          • String ID: (7B${
                          • API String ID: 590372296-525222780
                          • Opcode ID: f086514403ad079958e05c79f9398a2ee239ec86c73215fd307c521ee98444fa
                          • Instruction ID: f8c5fe522ebc9739dae7df13929d3a15495bf3740f19f89270c8c50aa4207807
                          • Opcode Fuzzy Hash: f086514403ad079958e05c79f9398a2ee239ec86c73215fd307c521ee98444fa
                          • Instruction Fuzzy Hash: AFB15870900608FFDB11AFA0DD85AAE7B79FB44354F00847AFA45B61A0CB754E51DF68
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00404DA8
                          • GetDlgItem.USER32(?,00000408), ref: 00404DB3
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404DFD
                          • LoadBitmapW.USER32(0000006E), ref: 00404E10
                          • SetWindowLongW.USER32(?,000000FC,00405388), ref: 00404E29
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E3D
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E4F
                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404E65
                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404E71
                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404E83
                          • DeleteObject.GDI32(00000000), ref: 00404E86
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EB1
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EBD
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F53
                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404F7E
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F92
                          • GetWindowLongW.USER32(?,000000F0), ref: 00404FC1
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404FCF
                          • ShowWindow.USER32(?,00000005), ref: 00404FE0
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 004050DD
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405142
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405157
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 0040517B
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040519B
                          • ImageList_Destroy.COMCTL32(?), ref: 004051B0
                          • GlobalFree.KERNEL32(?), ref: 004051C0
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405239
                          • SendMessageW.USER32(?,00001102,?,?), ref: 004052E2
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004052F1
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00405311
                          • ShowWindow.USER32(?,00000000), ref: 0040535F
                          • GetDlgItem.USER32(?,000003FE), ref: 0040536A
                          • ShowWindow.USER32(00000000), ref: 00405371
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 1638840714-813528018
                          • Opcode ID: dd7e303e7a082920acbddfa323b9c1fe09c51fd00b8ac91a0555c01a181f07cb
                          • Instruction ID: 31ae2990ecb9e768136dc40aca02b7f59ce629e1f3cadc681249b7cbd6abf0de
                          • Opcode Fuzzy Hash: dd7e303e7a082920acbddfa323b9c1fe09c51fd00b8ac91a0555c01a181f07cb
                          • Instruction Fuzzy Hash: 09027DB0A00609EFDB209F54DC45AAE7BB5FB44354F10817AE610BA2E0C7798E52CF58
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 00404863
                          • SetWindowTextW.USER32(00000000,?), ref: 0040488D
                          • SHBrowseForFolderW.SHELL32(?), ref: 0040493E
                          • CoTaskMemFree.OLE32(00000000), ref: 00404949
                          • lstrcmpiW.KERNEL32(Call,00423728,00000000,?,?), ref: 0040497B
                          • lstrcatW.KERNEL32(?,Call), ref: 00404987
                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404999
                            • Part of subcall function 004059F6: GetDlgItemTextW.USER32(?,?,00000400,004049D0), ref: 00405A09
                            • Part of subcall function 00406644: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\presupuesto urgente.exe",00403464,C:\Users\user\AppData\Local\Temp\,75923420,004036D5,?,00000006,00000008,0000000A), ref: 004066A7
                            • Part of subcall function 00406644: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066B6
                            • Part of subcall function 00406644: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\presupuesto urgente.exe",00403464,C:\Users\user\AppData\Local\Temp\,75923420,004036D5,?,00000006,00000008,0000000A), ref: 004066BB
                            • Part of subcall function 00406644: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\presupuesto urgente.exe",00403464,C:\Users\user\AppData\Local\Temp\,75923420,004036D5,?,00000006,00000008,0000000A), ref: 004066CE
                          • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,00000001,004216F8,?,?,000003FB,?), ref: 00404A5C
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A77
                            • Part of subcall function 00404BD0: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404C71
                            • Part of subcall function 00404BD0: wsprintfW.USER32 ref: 00404C7A
                            • Part of subcall function 00404BD0: SetDlgItemTextW.USER32(?,00423728), ref: 00404C8D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: (7B$A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet$Call
                          • API String ID: 2624150263-3384855386
                          • Opcode ID: f04caca690f49e87266c44fb9cab88c370668c693f36f0659ef379fd8dc31e70
                          • Instruction ID: 8d8d1438250e4d518a9e2371570913b63a9457987511b3c3302aefac7d34506d
                          • Opcode Fuzzy Hash: f04caca690f49e87266c44fb9cab88c370668c693f36f0659ef379fd8dc31e70
                          • Instruction Fuzzy Hash: B3A184F1A00209ABDB119FA5CD45AAF77B8EF84314F14843BFA01B62D1D77C99418B6D
                          APIs
                          • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040217D
                          Strings
                          • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet, xrefs: 004021BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet
                          • API String ID: 542301482-91662111
                          • Opcode ID: d21109b947604d2aeedf4ad2c9da0992de00d0e594a19d7853b024dfbf8c0e49
                          • Instruction ID: fcf7de762e0310186ccf97c85ab7d5ba58e988de4da68cff16f28a22b081737a
                          • Opcode Fuzzy Hash: d21109b947604d2aeedf4ad2c9da0992de00d0e594a19d7853b024dfbf8c0e49
                          • Instruction Fuzzy Hash: EE414A75A00208AFCB10DFE4C988AAEBBB5FF48314F20457AF515EB2D1DB799941CB44
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402871
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: d93f1720afb55d10142a5d85e05fc16c00c53f1b0b53f4af4ae9949186ca55c3
                          • Instruction ID: 1506565ccd7b679c7f55cec76d0c208d7a3b57e4c41f2eb52868ec6bdbdc004a
                          • Opcode Fuzzy Hash: d93f1720afb55d10142a5d85e05fc16c00c53f1b0b53f4af4ae9949186ca55c3
                          • Instruction Fuzzy Hash: 38F05E71A04104ABD710EBA4DA499ADB368EF00314F2005BBF541F21D1D7B84D919B2A
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EA8
                          • ShowWindow.USER32(?), ref: 00403EC5
                          • DestroyWindow.USER32 ref: 00403ED9
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EF5
                          • GetDlgItem.USER32(?,?), ref: 00403F16
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F2A
                          • IsWindowEnabled.USER32(00000000), ref: 00403F31
                          • GetDlgItem.USER32(?,00000001), ref: 00403FDF
                          • GetDlgItem.USER32(?,00000002), ref: 00403FE9
                          • SetClassLongW.USER32(?,000000F2,?), ref: 00404003
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404054
                          • GetDlgItem.USER32(?,00000003), ref: 004040FA
                          • ShowWindow.USER32(00000000,?), ref: 0040411B
                          • EnableWindow.USER32(?,?), ref: 0040412D
                          • EnableWindow.USER32(?,?), ref: 00404148
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040415E
                          • EnableMenuItem.USER32(00000000), ref: 00404165
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040417D
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404190
                          • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041BA
                          • SetWindowTextW.USER32(?,00423728), ref: 004041CE
                          • ShowWindow.USER32(?,0000000A), ref: 00404302
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                          • String ID: (7B
                          • API String ID: 184305955-3251261122
                          • Opcode ID: a59e4a4ec43d7d40c0b393105adb60ca25607e9856a65bb271622870994d4568
                          • Instruction ID: 85a8b1cb5875a9f0130709c86f20b78f231723f1bf47f2e7597622744019d293
                          • Opcode Fuzzy Hash: a59e4a4ec43d7d40c0b393105adb60ca25607e9856a65bb271622870994d4568
                          • Instruction Fuzzy Hash: 88C1A1B1640200FFDB216F61EE85D2B3BA8EB95305F40053EFA41B21F0CB7959529B6E
                          APIs
                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404580
                          • GetDlgItem.USER32(?,000003E8), ref: 00404594
                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045B1
                          • GetSysColor.USER32(?), ref: 004045C2
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004045D0
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004045DE
                          • lstrlenW.KERNEL32(?), ref: 004045E3
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004045F0
                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404605
                          • GetDlgItem.USER32(?,0000040A), ref: 0040465E
                          • SendMessageW.USER32(00000000), ref: 00404665
                          • GetDlgItem.USER32(?,000003E8), ref: 00404690
                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004046D3
                          • LoadCursorW.USER32(00000000,00007F02), ref: 004046E1
                          • SetCursor.USER32(00000000), ref: 004046E4
                          • LoadCursorW.USER32(00000000,00007F00), ref: 004046FD
                          • SetCursor.USER32(00000000), ref: 00404700
                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040472F
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404741
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                          • String ID: Call$N$YD@
                          • API String ID: 3103080414-3276248472
                          • Opcode ID: 777072e4300f85645cf7ffde5545d8883defabb32dd208014d98b1e23baa6229
                          • Instruction ID: b733f22c3e4a4344af423a89e947fb2470a434e6d87e1c723dfed1fecd84da00
                          • Opcode Fuzzy Hash: 777072e4300f85645cf7ffde5545d8883defabb32dd208014d98b1e23baa6229
                          • Instruction Fuzzy Hash: E16172B1A00209BFDB109F60DD85AAA7B69FB85354F00813AFB05BB1E0D7789951CF58
                          APIs
                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                          • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                          • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                          • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                          APIs
                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406197,?,?), ref: 00406037
                          • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406040
                            • Part of subcall function 00405E07: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E17
                            • Part of subcall function 00405E07: lstrlenA.KERNEL32(00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E49
                          • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 0040605D
                          • wsprintfA.USER32 ref: 0040607B
                          • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060B6
                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060C5
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FD
                          • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 00406153
                          • GlobalFree.KERNEL32(00000000), ref: 00406164
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040616B
                            • Part of subcall function 00405EA2: GetFileAttributesW.KERNELBASE(00000003,00402F57,C:\Users\user\Desktop\presupuesto urgente.exe,80000000,00000003), ref: 00405EA6
                            • Part of subcall function 00405EA2: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405EC8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                          • String ID: %ls=%ls$[Rename]
                          • API String ID: 2171350718-461813615
                          • Opcode ID: cc1e011b744674eb6045294d1f1ba8016b3cffab7c6b3a5cc0e4edd922729f6b
                          • Instruction ID: 7a97944e4ecdd21f919348e7cfc29446421eaa6be6f71a8f5a2bdcac5b6ce208
                          • Opcode Fuzzy Hash: cc1e011b744674eb6045294d1f1ba8016b3cffab7c6b3a5cc0e4edd922729f6b
                          • Instruction Fuzzy Hash: 953139703007157BC2206B259D49F673A6CEF45714F15003AFA42FA2D2DE7C992586AD
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\presupuesto urgente.exe",00403464,C:\Users\user\AppData\Local\Temp\,75923420,004036D5,?,00000006,00000008,0000000A), ref: 004066A7
                          • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066B6
                          • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\presupuesto urgente.exe",00403464,C:\Users\user\AppData\Local\Temp\,75923420,004036D5,?,00000006,00000008,0000000A), ref: 004066BB
                          • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\presupuesto urgente.exe",00403464,C:\Users\user\AppData\Local\Temp\,75923420,004036D5,?,00000006,00000008,0000000A), ref: 004066CE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\presupuesto urgente.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-1327597434
                          • Opcode ID: 77b224228f8c57f44dbd024cb25da7c2d773c522f2af8fdd1da9e6af7933f215
                          • Instruction ID: 91382b34e261ab6a6b837a41ec70345278d3faa82d58aea2d88f3062b19e38b1
                          • Opcode Fuzzy Hash: 77b224228f8c57f44dbd024cb25da7c2d773c522f2af8fdd1da9e6af7933f215
                          • Instruction Fuzzy Hash: 8C11E61580070295DB302B149C40E7766B8EF587A4F12483FED86B32C0E77E4CD286AD
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 004043C9
                          • GetSysColor.USER32(00000000), ref: 004043E5
                          • SetTextColor.GDI32(?,00000000), ref: 004043F1
                          • SetBkMode.GDI32(?,?), ref: 004043FD
                          • GetSysColor.USER32(?), ref: 00404410
                          • SetBkColor.GDI32(?,?), ref: 00404420
                          • DeleteObject.GDI32(?), ref: 0040443A
                          • CreateBrushIndirect.GDI32(?), ref: 00404444
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: d93bb5df8f2b76ccefaad0a5d1bb7d3eec77da1dbbaa67d130298efb7d8eee66
                          • Instruction ID: 701ae6dfa2b2a9365c03cf2c9b1b76f0db24f0feb35c46e7544c905291b2d973
                          • Opcode Fuzzy Hash: d93bb5df8f2b76ccefaad0a5d1bb7d3eec77da1dbbaa67d130298efb7d8eee66
                          • Instruction Fuzzy Hash: 4B216671500704AFCB219F68DE48B5BBBF8AF81714F04893EED95E22A1D774E944CB54
                          APIs
                          • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                          • lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                          • lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                          • SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID:
                          • API String ID: 2531174081-0
                          • Opcode ID: ae6ed24060c0e1e5203a454600f337dd8354be9e28b06d37a059070ec5477373
                          • Instruction ID: b4c9d1203d7b93b364d12d55a96473d81469f1a16e33619bfa53f57c996d0385
                          • Opcode Fuzzy Hash: ae6ed24060c0e1e5203a454600f337dd8354be9e28b06d37a059070ec5477373
                          • Instruction Fuzzy Hash: 0E219071900518BACF119FA5DD85ADFBFB4EF45364F10803AF904B62A0C3794A90CFA8
                          APIs
                          • DestroyWindow.USER32(00000000,00000000), ref: 00402E8D
                          • GetTickCount.KERNEL32 ref: 00402EAB
                          • wsprintfW.USER32 ref: 00402ED9
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                            • Part of subcall function 00405414: lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                            • Part of subcall function 00405414: SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                            • Part of subcall function 00405414: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                          • CreateDialogParamW.USER32(0000006F,00000000,00402DD7,00000000), ref: 00402EFD
                          • ShowWindow.USER32(00000000,00000005), ref: 00402F0B
                            • Part of subcall function 00402E56: MulDiv.KERNEL32(00000000,00000064,0005D5FB), ref: 00402E6B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                          • String ID: ... %d%%
                          • API String ID: 722711167-2449383134
                          • Opcode ID: 9d96e1b775b00f8f1aa504ccf668d13eff31e418fbd4a6343fc61565dbea9545
                          • Instruction ID: c2ec4548d439a14d597b05689786213ff5532ac021c242b5895b0761ec4a5705
                          • Opcode Fuzzy Hash: 9d96e1b775b00f8f1aa504ccf668d13eff31e418fbd4a6343fc61565dbea9545
                          • Instruction Fuzzy Hash: 0501C430440724EBCB31AB60EF4CB9B7B68AB00B44B50417FF945F12E0CAB844558BEE
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404CF9
                          • GetMessagePos.USER32 ref: 00404D01
                          • ScreenToClient.USER32(?,?), ref: 00404D1B
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D2D
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D53
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                          • Instruction ID: b067d4b0ecc7c77c1c3f0caef97ada8ed48413e9bef28a1d47140c0a876cf8aa
                          • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                          • Instruction Fuzzy Hash: AD015E71A0021DBADB00DB94DD85BFEBBBCAF95715F10412BBA50B62D0C7B899018BA4
                          APIs
                          • GetDC.USER32(?), ref: 00401DB6
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD0
                          • MulDiv.KERNEL32(00000000,00000000), ref: 00401DD8
                          • ReleaseDC.USER32(?,00000000), ref: 00401DE9
                          • CreateFontIndirectW.GDI32(0040CDE0), ref: 00401E38
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID: Tahoma
                          • API String ID: 3808545654-3580928618
                          • Opcode ID: dd5e8fa4d463f4addcea7a8cc9fa64d55b0ecfa5d277173ec9cca7ca7d10c693
                          • Instruction ID: c2f05a2c3ba2ec5405c4fe8fe652dd8f1d703414ee124caa90b8b383e79e86eb
                          • Opcode Fuzzy Hash: dd5e8fa4d463f4addcea7a8cc9fa64d55b0ecfa5d277173ec9cca7ca7d10c693
                          • Instruction Fuzzy Hash: 3201B171904241EFE7006BB0AF4AB9A7FB0BF55301F10493EF242B71E2CAB800469B2D
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DF5
                          • wsprintfW.USER32 ref: 00402E29
                          • SetWindowTextW.USER32(?,?), ref: 00402E39
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E4B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                          • API String ID: 1451636040-1158693248
                          • Opcode ID: 5563c221c1669b5fd2184c8b70bdefae7b5ad080d5cf5862aa05c867891839d9
                          • Instruction ID: 0bc749b122006b2f9f6abad3e9991ed6065550717762caf8ffdc158a825a6066
                          • Opcode Fuzzy Hash: 5563c221c1669b5fd2184c8b70bdefae7b5ad080d5cf5862aa05c867891839d9
                          • Instruction Fuzzy Hash: 69F0367154020DABDF206F50DD4ABEA3B69FB00714F00803AFA06B51D0DBFD55598F99
                          APIs
                            • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          • GlobalFree.KERNEL32(?), ref: 1000256D
                          • GlobalFree.KERNEL32(00000000), ref: 100025A8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4505515296.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4505502087.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505526475.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505538713.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: e72053471c67904cbc9fe51406c75cdd0d1e7ae72e07fb5691a107031e3f1593
                          • Instruction ID: 149f0ffe7112dafd64944f245e56057b96fa329c468151baa91e3d773918aa42
                          • Opcode Fuzzy Hash: e72053471c67904cbc9fe51406c75cdd0d1e7ae72e07fb5691a107031e3f1593
                          • Instruction Fuzzy Hash: 1031AF71504651EFF721CF14CCA8E2B7BB8FB853D2F114119F940961A8C7719851DB69
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 004028FB
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402917
                          • GlobalFree.KERNEL32(?), ref: 00402950
                          • GlobalFree.KERNEL32(00000000), ref: 00402963
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040297B
                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 0040298F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                          • String ID:
                          • API String ID: 2667972263-0
                          • Opcode ID: 71fa0d7f1f6972b2f5f4a603ea8383ed055fcf66cbac6c56c0d77bb029e8dc11
                          • Instruction ID: c824e8dfb1c84b3956194132b72a9c46ff30f807773af65f81dcebc4e122496d
                          • Opcode Fuzzy Hash: 71fa0d7f1f6972b2f5f4a603ea8383ed055fcf66cbac6c56c0d77bb029e8dc11
                          • Instruction Fuzzy Hash: 6521BFB1800128BBDF216FA5DE49D9E7E79EF09364F10023AF960762E0CB7949418B98
                          APIs
                          • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404C71
                          • wsprintfW.USER32 ref: 00404C7A
                          • SetDlgItemTextW.USER32(?,00423728), ref: 00404C8D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s$(7B
                          • API String ID: 3540041739-1320723960
                          • Opcode ID: 58f77135636fcca40ac9b9d1b3b9f97977a6748d84aaa2f98ffb75d2f2ac1724
                          • Instruction ID: 703546cccce40a16f7c4e0327b319c47dc4604cc2262111db7ea86f65ec4581c
                          • Opcode Fuzzy Hash: 58f77135636fcca40ac9b9d1b3b9f97977a6748d84aaa2f98ffb75d2f2ac1724
                          • Instruction Fuzzy Hash: 0911E7736041287BEB00556DAD46EAF329CDB85374F254237FA66F31D1DA79CC2182E8
                          APIs
                          • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsj72EF.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dll,00000400,?,?,00000021), ref: 004025E2
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsj72EF.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dll,00000400,?,?,00000021), ref: 004025ED
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: ByteCharMultiWidelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsj72EF.tmp$C:\Users\user\AppData\Local\Temp\nsj72EF.tmp\System.dll
                          • API String ID: 3109718747-1293460741
                          • Opcode ID: 04c8a0be0a3c8b5bca7af342d1437c7cd7f7eafe97cd42d6f17c4336303185e8
                          • Instruction ID: 778b7e41730bacb68cbd472b7e3a637cf80abcfea8faeb2db308f16ae4ae4a1c
                          • Opcode Fuzzy Hash: 04c8a0be0a3c8b5bca7af342d1437c7cd7f7eafe97cd42d6f17c4336303185e8
                          • Instruction Fuzzy Hash: 35112E72A00204BBDB146FB18F8D99F76649F55394F20443BF502F61C1DAFC48425B5E
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4505515296.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4505502087.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505526475.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505538713.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: FreeGlobal
                          • String ID:
                          • API String ID: 2979337801-0
                          • Opcode ID: fe7133a2f93821227e3a7e703367dd144469a15fe8ff947d0f1e508e715dc704
                          • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                          • Opcode Fuzzy Hash: fe7133a2f93821227e3a7e703367dd144469a15fe8ff947d0f1e508e715dc704
                          • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 10002411
                            • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                          • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.4505515296.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4505502087.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505526475.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505538713.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                          • String ID:
                          • API String ID: 4216380887-0
                          • Opcode ID: 40c1fda0fc222d3deaf0be0606799ffba2a33d40f74f168943dcfaeb9bc9158e
                          • Instruction ID: e010a8171ff36a63e9221139458dc5df23460d7ee6f57f6168b5e09891e1807c
                          • Opcode Fuzzy Hash: 40c1fda0fc222d3deaf0be0606799ffba2a33d40f74f168943dcfaeb9bc9158e
                          • Instruction Fuzzy Hash: 9141D2B4408305EFF324DF24C880A6AB7F8FB843D4B11892DF94687199DB34BA94CB65
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                          • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                          • GlobalFree.KERNEL32(00000000), ref: 10001642
                          Memory Dump Source
                          • Source File: 00000000.00000002.4505515296.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4505502087.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505526475.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505538713.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                          • String ID:
                          • API String ID: 1148316912-0
                          • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                          • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401D5D
                          • GetClientRect.USER32(00000000,?), ref: 00401D6A
                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D8B
                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D99
                          • DeleteObject.GDI32(00000000), ref: 00401DA8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: 1cce6cf5ba1aed4fa5ce4547bc0ae4b149cf4eb258e4777d2c59333f9832c14c
                          • Instruction ID: a606f7d5b7d9f25f85f3a996f6cf1d54ca927bfb9af82e5c1f6e8eb7e31f2730
                          • Opcode Fuzzy Hash: 1cce6cf5ba1aed4fa5ce4547bc0ae4b149cf4eb258e4777d2c59333f9832c14c
                          • Instruction Fuzzy Hash: 88F0FF72604518AFDB01DBE4DF88CEEB7BCEB08341B14047AF641F61A1CA749D518B78
                          APIs
                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C89
                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 8f57c4960d5009b47da13ac1dbf9672dc76c0f1a0d468b1b2fcc5bc99a892ac9
                          • Instruction ID: 90968196233f782bf8ff3785c90d26ea0bd53ded382d002e8ee2e27c6658862d
                          • Opcode Fuzzy Hash: 8f57c4960d5009b47da13ac1dbf9672dc76c0f1a0d468b1b2fcc5bc99a892ac9
                          • Instruction Fuzzy Hash: 6121C171948209AEEF05EFA5CE4AABE7BB4EF84308F14443EF502B61D0D7B84541DB28
                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403476,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004036D5,?,00000006,00000008,0000000A), ref: 00405C87
                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403476,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004036D5,?,00000006,00000008,0000000A), ref: 00405C91
                          • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405CA3
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C81
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-823278215
                          • Opcode ID: 2d89e3346713fcbf25affea4869717dbbf7bb0cb650dc976aff6b925dbbb9e25
                          • Instruction ID: 792cc20aee96bfe2db1a273563d78520df22e3750eb0c1a77993888458b10d09
                          • Opcode Fuzzy Hash: 2d89e3346713fcbf25affea4869717dbbf7bb0cb650dc976aff6b925dbbb9e25
                          • Instruction Fuzzy Hash: DBD0A731111631AAC1116B458D05CDF769C9F46315342143BF501B30A1C77C1D6187FD
                          APIs
                            • Part of subcall function 004063B0: lstrcpynW.KERNEL32(?,?,00000400,0040355A,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063BD
                            • Part of subcall function 00405D2C: CharNextW.USER32(?,?,00425F30,?,00405DA0,00425F30,00425F30,?,?,75922EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405D3A
                            • Part of subcall function 00405D2C: CharNextW.USER32(00000000), ref: 00405D3F
                            • Part of subcall function 00405D2C: CharNextW.USER32(00000000), ref: 00405D57
                          • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,?,?,75922EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405DE2
                          • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,?,?,75922EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00405DF2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: 0_B
                          • API String ID: 3248276644-2128305573
                          • Opcode ID: 9ab52294f1c51de88c4a4db8473d9fc5f5165192c0b0c0d383058277ec03ae92
                          • Instruction ID: 7d5bbe1e5c8c3abe72dbe24b1e5e7d34393fbb328f3a5d3c645332532cfc401b
                          • Opcode Fuzzy Hash: 9ab52294f1c51de88c4a4db8473d9fc5f5165192c0b0c0d383058277ec03ae92
                          • Instruction Fuzzy Hash: 61F0D125114E6156E62232364D0DBAF1954CE8236474A853BFC51B22D1DB3C8953CDAE
                          APIs
                          • IsWindowVisible.USER32(?), ref: 004053B7
                          • CallWindowProcW.USER32(?,?,?,?), ref: 00405408
                            • Part of subcall function 00404391: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: 7f0b268359981ce96b8471a5d3c832aa899a6e6df9d4a1bd192212e4a6da3699
                          • Instruction ID: e7a51b5005e981c4ca122d20ba3fe12824fd99f760bfe42b36e815d14bf77052
                          • Opcode Fuzzy Hash: 7f0b268359981ce96b8471a5d3c832aa899a6e6df9d4a1bd192212e4a6da3699
                          • Instruction Fuzzy Hash: 5C01717120060DABDF209F11DD84AAB3735EB84395F204037FE457A1D1C7BA8D92AF69
                          APIs
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,00422708,00000000,?,?,Call,?,?,004064F2,80000002), ref: 004062C4
                          • RegCloseKey.ADVAPI32(?,?,004064F2,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,00422708), ref: 004062CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID: Call
                          • API String ID: 3356406503-1824292864
                          • Opcode ID: eb1f67c4e7283d14696156d079f1c46a9bcf05f485b6848abf2eef10094c0e69
                          • Instruction ID: c3e7de0656b9710826ab6423f517e97bb9b3954c36c3ca231a2eb326ebdf078d
                          • Opcode Fuzzy Hash: eb1f67c4e7283d14696156d079f1c46a9bcf05f485b6848abf2eef10094c0e69
                          • Instruction Fuzzy Hash: 80019A32500209EADF219F90CC09EDB3BA8EF55360F01803AFD16A21A0D738DA64DBA4
                          APIs
                          • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75922EE0,00403A00,75923420,004037FF,00000006,?,00000006,00000008,0000000A), ref: 00403A43
                          • GlobalFree.KERNEL32(?), ref: 00403A4A
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A3B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 1100898210-823278215
                          • Opcode ID: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                          • Instruction ID: 78aecf43d79df039942bc1d46619d1d902388d1bf991e2316d5006033f35a71e
                          • Opcode Fuzzy Hash: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                          • Instruction Fuzzy Hash: D9E08C32A000205BC6229F45ED04B5E7B6C6F48B22F0A023AE8C07B26087745C82CF88
                          APIs
                          • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402F80,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\presupuesto urgente.exe,C:\Users\user\Desktop\presupuesto urgente.exe,80000000,00000003), ref: 00405CD3
                          • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F80,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\presupuesto urgente.exe,C:\Users\user\Desktop\presupuesto urgente.exe,80000000,00000003), ref: 00405CE3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-1246513382
                          • Opcode ID: ce420ed133ef401578f7edf27e8b1e41d4059e21aeef7803f585746dd391eaaa
                          • Instruction ID: 4c3d9e560c0c996ae094f7ef7b1b4ed865fc8cc67bffad09b41611580a74fc2a
                          • Opcode Fuzzy Hash: ce420ed133ef401578f7edf27e8b1e41d4059e21aeef7803f585746dd391eaaa
                          • Instruction Fuzzy Hash: 03D05EB2414A209AD3126704DD01D9F73A8EF12314746442AE841A6161E7785C918AAC
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                          • GlobalFree.KERNEL32(00000000), ref: 100011C7
                          • GlobalFree.KERNEL32(00000000), ref: 100011D9
                          • GlobalFree.KERNEL32(?), ref: 10001203
                          Memory Dump Source
                          • Source File: 00000000.00000002.4505515296.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4505502087.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505526475.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4505538713.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                          • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E17
                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E2F
                          • CharNextA.USER32(00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E40
                          • lstrlenA.KERNEL32(00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E49
                          Memory Dump Source
                          • Source File: 00000000.00000002.4503386018.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4503350841.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503406564.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503425431.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4503548313.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_presupuesto urgente.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                          • Instruction ID: dc3323509655add47458b7bfdc28b409d7665b879035d0867add309d4545c2bc
                          • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                          • Instruction Fuzzy Hash: 89F06236104518EFC7029BA5DD40D9FBBA8EF06354B2540BAE980F7211D674DF01AB99