Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
copto de pago.exe

Overview

General Information

Sample name:copto de pago.exe
Analysis ID:1549214
MD5:3b29983c32ddbf81b48046fdbc0142f2
SHA1:f4ecb5bc16fa22bd7394a4c1dd1cc049450d0695
SHA256:1829a5b49d1c30ac6271ab38f248aecc37c40c8fb1cca0ed2b395e94bfe27b86
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • copto de pago.exe (PID: 4204 cmdline: "C:\Users\user\Desktop\copto de pago.exe" MD5: 3B29983C32DDBF81B48046FDBC0142F2)
    • RegSvcs.exe (PID: 3396 cmdline: "C:\Users\user\Desktop\copto de pago.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • ZUHFqcY.exe (PID: 6780 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 3276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • ZUHFqcY.exe (PID: 1124 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 5068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "eric.zhang@longpowartech.com", "Password": "    w#chNV#1"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3277927890.0000000002BD7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
          • 0x34342:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
          • 0x343b4:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
          • 0x3443e:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
          • 0x344d0:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
          • 0x3453a:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
          • 0x345ac:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
          • 0x34642:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
          • 0x346d2:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
          Click to see the 10 entries
          SourceRuleDescriptionAuthorStrings
          0.2.copto de pago.exe.b30000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.copto de pago.exe.b30000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.copto de pago.exe.b30000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x32542:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x325b4:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3263e:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x326d0:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x3273a:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x327ac:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x32842:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x328d2:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              0.2.copto de pago.exe.b30000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.copto de pago.exe.b30000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  Click to see the 6 entries

                  System Summary

                  barindex
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 3396, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZUHFqcY
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.199.224, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 3396, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49705
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-05T12:38:41.109901+010020229301A Network Trojan was detected20.109.210.53443192.168.2.549706TCP
                  2024-11-05T12:39:19.531555+010020229301A Network Trojan was detected20.109.210.53443192.168.2.549917TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: copto de pago.exeAvira: detected
                  Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "eric.zhang@longpowartech.com", "Password": " w#chNV#1"}
                  Source: copto de pago.exeReversingLabs: Detection: 50%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                  Source: copto de pago.exeJoe Sandbox ML: detected
                  Source: copto de pago.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: RegSvcs.pdb, source: ZUHFqcY.exe, 00000003.00000000.2162370669.0000000000D82000.00000002.00000001.01000000.00000006.sdmp, ZUHFqcY.exe.2.dr
                  Source: Binary string: wntdll.pdbUGP source: copto de pago.exe, 00000000.00000003.2040506712.00000000047A0000.00000004.00001000.00020000.00000000.sdmp, copto de pago.exe, 00000000.00000003.2041170054.0000000004600000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: copto de pago.exe, 00000000.00000003.2040506712.00000000047A0000.00000004.00001000.00020000.00000000.sdmp, copto de pago.exe, 00000000.00000003.2041170054.0000000004600000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: RegSvcs.pdb source: ZUHFqcY.exe, 00000003.00000000.2162370669.0000000000D82000.00000002.00000001.01000000.00000006.sdmp, ZUHFqcY.exe.2.dr
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B

                  Networking

                  barindex
                  Source: Yara matchFile source: 0.2.copto de pago.exe.b30000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficTCP traffic: 192.168.2.5:49705 -> 208.91.199.224:587
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                  Source: unknownDNS query: name: ip-api.com
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.5:49706
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.5:49917
                  Source: global trafficTCP traffic: 192.168.2.5:49705 -> 208.91.199.224:587
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: global trafficDNS traffic detected: DNS query: us2.smtp.mailhostbox.com
                  Source: RegSvcs.exe, 00000002.00000002.3279685039.0000000005EAB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277254825.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: RegSvcs.exe, 00000002.00000002.3279685039.0000000005EAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: RegSvcs.exe, 00000002.00000002.3279685039.0000000005EAB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3279685039.0000000005EA0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277254825.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                  Source: RegSvcs.exe, 00000002.00000002.3277927890.0000000002B81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: copto de pago.exe, 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277927890.0000000002B81000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000002.00000002.3277254825.0000000000DCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingW
                  Source: RegSvcs.exe, 00000002.00000002.3277254825.0000000000DCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingj
                  Source: RegSvcs.exe, 00000002.00000002.3279685039.0000000005EAB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277254825.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: RegSvcs.exe, 00000002.00000002.3279685039.0000000005EAB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3279685039.0000000005EA0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277254825.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                  Source: RegSvcs.exe, 00000002.00000002.3277927890.0000000002B81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                  Source: copto de pago.exe, 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: RegSvcs.exe, 00000002.00000002.3279685039.0000000005EAB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3279685039.0000000005EA0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277254825.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, X3fxBL.cs.Net Code: UdKYqv
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

                  System Summary

                  barindex
                  Source: 0.2.copto de pago.exe.b30000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004096A00_2_004096A0
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0042200C0_2_0042200C
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0041A2170_2_0041A217
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004122160_2_00412216
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0042435D0_2_0042435D
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004033C00_2_004033C0
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044F4300_2_0044F430
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004125E80_2_004125E8
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044663B0_2_0044663B
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004138010_2_00413801
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0042096F0_2_0042096F
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004129D00_2_004129D0
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004119E30_2_004119E3
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0040FA100_2_0040FA10
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00423C810_2_00423C81
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00411E780_2_00411E78
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00442E0C0_2_00442E0C
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00420EC00_2_00420EC0
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044CF170_2_0044CF17
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00444FD20_2_00444FD2
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_040E76B00_2_040E76B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02984AD02_2_02984AD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0298CB442_2_0298CB44
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02983EB82_2_02983EB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_029842002_2_02984200
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058E96F12_2_058E96F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058EE6382_2_058EE638
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058E51502_2_058E5150
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058E7AF02_2_058E7AF0
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: String function: 004115D7 appears 36 times
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: String function: 00416C70 appears 39 times
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: String function: 00445AE0 appears 55 times
                  Source: copto de pago.exe, 00000000.00000003.2040904979.00000000048CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs copto de pago.exe
                  Source: copto de pago.exe, 00000000.00000003.2041170054.0000000004723000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs copto de pago.exe
                  Source: copto de pago.exe, 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename51fb4aff-95dd-4a93-9ab4-04a316570185.exe4 vs copto de pago.exe
                  Source: copto de pago.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.copto de pago.exe.b30000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, ojfoYn.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, ojfoYn.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, fq6MquFPL9.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.copto de pago.exe.b30000.1.raw.unpack, fq6MquFPL9.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@2/2
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\ZUHFqcYJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5068:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3276:120:WilError_03
                  Source: C:\Users\user\Desktop\copto de pago.exeFile created: C:\Users\user\AppData\Local\Temp\reenlargeJump to behavior
                  Source: copto de pago.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\copto de pago.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: copto de pago.exeReversingLabs: Detection: 50%
                  Source: C:\Users\user\Desktop\copto de pago.exeFile read: C:\Users\user\Desktop\copto de pago.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\copto de pago.exe "C:\Users\user\Desktop\copto de pago.exe"
                  Source: C:\Users\user\Desktop\copto de pago.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\copto de pago.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\copto de pago.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\copto de pago.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: copto de pago.exeStatic file information: File size 1356887 > 1048576
                  Source: Binary string: RegSvcs.pdb, source: ZUHFqcY.exe, 00000003.00000000.2162370669.0000000000D82000.00000002.00000001.01000000.00000006.sdmp, ZUHFqcY.exe.2.dr
                  Source: Binary string: wntdll.pdbUGP source: copto de pago.exe, 00000000.00000003.2040506712.00000000047A0000.00000004.00001000.00020000.00000000.sdmp, copto de pago.exe, 00000000.00000003.2041170054.0000000004600000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: copto de pago.exe, 00000000.00000003.2040506712.00000000047A0000.00000004.00001000.00020000.00000000.sdmp, copto de pago.exe, 00000000.00000003.2041170054.0000000004600000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: RegSvcs.pdb source: ZUHFqcY.exe, 00000003.00000000.2162370669.0000000000D82000.00000002.00000001.01000000.00000006.sdmp, ZUHFqcY.exe.2.dr
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: copto de pago.exeStatic PE information: real checksum: 0xa961f should be: 0x14ebe7
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058E9230 push esp; retf 2_2_058E925D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058E925F pushfd ; retf 2_2_058E929D
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_00F60BCF pushfd ; retf 0000h6_2_00F60BDA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ZUHFqcYJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ZUHFqcYJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\copto de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: copto de pago.exe PID: 4204, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\copto de pago.exeAPI/Special instruction interceptor: Address: 40E72A4
                  Source: copto de pago.exe, 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 1610000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: F20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2A50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 4A50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1030Jump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeAPI coverage: 3.4 %
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4464Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 6500Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99544Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99108Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98827Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98666Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98530Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98421Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98093Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97982Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: RegSvcs.exe, 00000002.00000002.3277254825.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\copto de pago.exeAPI call chain: ExitProcess graph end nodegraph_0-86646

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_029870B8 CheckRemoteDebuggerPresent,2_2_029870B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_040E7510 mov eax, dword ptr fs:[00000030h]0_2_040E7510
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_040E7570 mov eax, dword ptr fs:[00000030h]0_2_040E7570
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_040E5EC0 mov eax, dword ptr fs:[00000030h]0_2_040E5EC0
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\copto de pago.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 853008Jump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                  Source: C:\Users\user\Desktop\copto de pago.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\copto de pago.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                  Source: copto de pago.exeBinary or memory string: Shell_TrayWnd
                  Source: copto de pago.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,0_2_0041E364
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.copto de pago.exe.b30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.copto de pago.exe.b30000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3277927890.0000000002BD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3277927890.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3277927890.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: copto de pago.exe PID: 4204, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3396, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: copto de pago.exeBinary or memory string: WIN_XP
                  Source: copto de pago.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                  Source: copto de pago.exeBinary or memory string: WIN_XPe
                  Source: copto de pago.exeBinary or memory string: WIN_VISTA
                  Source: copto de pago.exeBinary or memory string: WIN_7
                  Source: copto de pago.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 0.2.copto de pago.exe.b30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.copto de pago.exe.b30000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3277927890.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: copto de pago.exe PID: 4204, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3396, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.copto de pago.exe.b30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.copto de pago.exe.b30000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3277927890.0000000002BD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3277927890.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3277927890.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: copto de pago.exe PID: 4204, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3396, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                  Source: C:\Users\user\Desktop\copto de pago.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt1
                  Registry Run Keys / Startup Folder
                  2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS128
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets541
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                  Registry Run Keys / Startup Folder
                  2
                  Valid Accounts
                  Cached Domain Credentials151
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Hidden Files and Directories
                  Network Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1549214 Sample: copto de pago.exe Startdate: 05/11/2024 Architecture: WINDOWS Score: 100 25 us2.smtp.mailhostbox.com 2->25 27 ip-api.com 2->27 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus / Scanner detection for submitted sample 2->45 47 9 other signatures 2->47 7 copto de pago.exe 1 2->7         started        10 ZUHFqcY.exe 2 2->10         started        12 ZUHFqcY.exe 1 2->12         started        signatures3 process4 signatures5 49 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->49 51 Writes to foreign memory regions 7->51 53 Maps a DLL or memory area into another process 7->53 14 RegSvcs.exe 16 4 7->14         started        19 conhost.exe 10->19         started        21 conhost.exe 12->21         started        process6 dnsIp7 29 us2.smtp.mailhostbox.com 208.91.199.224, 49705, 587 PUBLIC-DOMAIN-REGISTRYUS United States 14->29 31 ip-api.com 208.95.112.1, 49704, 80 TUT-ASUS United States 14->31 23 C:\Users\user\AppData\Roaming\...\ZUHFqcY.exe, PE32 14->23 dropped 33 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->33 35 Tries to steal Mail credentials (via file / registry access) 14->35 37 Tries to harvest and steal browser information (history, passwords, etc) 14->37 39 2 other signatures 14->39 file8 signatures9

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  copto de pago.exe50%ReversingLabsWin32.Trojan.AutoitInject
                  copto de pago.exe100%AviraHEUR/AGEN.1321665
                  copto de pago.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://ocsp.sectigo.com0A0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  us2.smtp.mailhostbox.com
                  208.91.199.224
                  truetrue
                    unknown
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 00000002.00000002.3279685039.0000000005EAB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3279685039.0000000005EA0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277254825.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.com/line/?fields=hostingWRegSvcs.exe, 00000002.00000002.3277254825.0000000000DCF000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ocsp.sectigo.com0ARegSvcs.exe, 00000002.00000002.3279685039.0000000005EAB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3279685039.0000000005EA0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277254825.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://sectigo.com/CPS0RegSvcs.exe, 00000002.00000002.3279685039.0000000005EAB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3279685039.0000000005EA0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3277254825.0000000000DE8000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://account.dyn.com/copto de pago.exe, 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                high
                                http://us2.smtp.mailhostbox.comRegSvcs.exe, 00000002.00000002.3277927890.0000000002BDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3277927890.0000000002B81000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://ip-api.com/line/?fields=hostingjRegSvcs.exe, 00000002.00000002.3277254825.0000000000DCF000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://ip-api.comRegSvcs.exe, 00000002.00000002.3277927890.0000000002B81000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        208.95.112.1
                                        ip-api.comUnited States
                                        53334TUT-ASUSfalse
                                        208.91.199.224
                                        us2.smtp.mailhostbox.comUnited States
                                        394695PUBLIC-DOMAIN-REGISTRYUStrue
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1549214
                                        Start date and time:2024-11-05 12:37:32 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 6m 4s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:9
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:copto de pago.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@7/5@2/2
                                        EGA Information:
                                        • Successful, ratio: 50%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 50
                                        • Number of non-executed functions: 308
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target ZUHFqcY.exe, PID 1124 because it is empty
                                        • Execution Graph export aborted for target ZUHFqcY.exe, PID 6780 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: copto de pago.exe
                                        TimeTypeDescription
                                        06:38:25API Interceptor25x Sleep call for process: RegSvcs.exe modified
                                        12:38:26AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ZUHFqcY C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                        12:38:34AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ZUHFqcY C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        208.95.112.1RDF987656789000.cmd.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        orden de compra_.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        2q8mDVUlgI.exeGet hashmaliciousXWormBrowse
                                        • ip-api.com/line/?fields=hosting
                                        iu56HJ45NV.exeGet hashmaliciousUnknownBrowse
                                        • ip-api.com/json/?fields=225545
                                        SecuriteInfo.com.Trojan.DownLoader47.48553.17653.26482.exeGet hashmaliciousXWormBrowse
                                        • ip-api.com/line/?fields=hosting
                                        QUOTATION#09678.exeGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        MVPloader.exeGet hashmaliciousBlank GrabberBrowse
                                        • ip-api.com/line/?fields=hosting
                                        MVPloader.exeGet hashmaliciousBlank GrabberBrowse
                                        • ip-api.com/line/?fields=hosting
                                        PRODUCT-PICTURE.batGet hashmaliciousAgentTeslaBrowse
                                        • ip-api.com/line/?fields=hosting
                                        SecuriteInfo.com.Win64.Malware-gen.19901.26035.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                                        • ip-api.com/json
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ip-api.comRDF987656789000.cmd.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        orden de compra_.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        2q8mDVUlgI.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        iu56HJ45NV.exeGet hashmaliciousUnknownBrowse
                                        • 208.95.112.1
                                        SecuriteInfo.com.Trojan.DownLoader47.48553.17653.26482.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        QUOTATION#09678.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        MVPloader.exeGet hashmaliciousBlank GrabberBrowse
                                        • 208.95.112.1
                                        MVPloader.exeGet hashmaliciousBlank GrabberBrowse
                                        • 208.95.112.1
                                        PRODUCT-PICTURE.batGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        SecuriteInfo.com.Win64.Malware-gen.19901.26035.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                                        • 208.95.112.1
                                        us2.smtp.mailhostbox.comSecuriteInfo.com.BackDoor.AgentTeslaNET.20.5206.2075.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.223
                                        Proforma Invoice_21-1541 And Packing List.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.223
                                        Tax Invoice 103505.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.224
                                        PO.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.223
                                        Purchase_Order.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.198.143
                                        Scanned.pdf.pif.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.225
                                        Request for Quotation Plug Valve.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.223
                                        Cotizaci#U00f3n P13000996 pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.198.143
                                        ENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.225
                                        Payment Advice - Advice Ref pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.224
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        TUT-ASUSRDF987656789000.cmd.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        orden de compra_.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        2q8mDVUlgI.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        iu56HJ45NV.exeGet hashmaliciousUnknownBrowse
                                        • 208.95.112.1
                                        SecuriteInfo.com.Trojan.DownLoader47.48553.17653.26482.exeGet hashmaliciousXWormBrowse
                                        • 208.95.112.1
                                        QUOTATION#09678.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        MVPloader.exeGet hashmaliciousBlank GrabberBrowse
                                        • 208.95.112.1
                                        MVPloader.exeGet hashmaliciousBlank GrabberBrowse
                                        • 208.95.112.1
                                        PRODUCT-PICTURE.batGet hashmaliciousAgentTeslaBrowse
                                        • 208.95.112.1
                                        SecuriteInfo.com.Win64.Malware-gen.19901.26035.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                                        • 208.95.112.1
                                        PUBLIC-DOMAIN-REGISTRYUS1364. 2024.exeGet hashmaliciousAgentTeslaBrowse
                                        • 199.79.62.115
                                        Quote_220072.exeGet hashmaliciousAgentTeslaBrowse
                                        • 199.79.62.115
                                        TT Copy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 199.79.62.115
                                        24-17745.exeGet hashmaliciousAgentTeslaBrowse
                                        • 199.79.62.115
                                        HSBC Payment Advice.exeGet hashmaliciousFormBookBrowse
                                        • 208.91.199.22
                                        H33UCslPzv.exeGet hashmaliciousXWormBrowse
                                        • 103.53.40.62
                                        PILNE ZAPYTANIE RFQ-05567-2024.10.25.vbsGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                        • 199.79.62.19
                                        https://landsmith.ae/continue.htmlGet hashmaliciousHTMLPhisherBrowse
                                        • 103.53.42.223
                                        PO# 4507573387.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                        • 199.79.62.115
                                        PO #89230.exeGet hashmaliciousAgentTeslaBrowse
                                        • 207.174.215.249
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exepurchase order P857248 dated 04112024.exeGet hashmaliciousXWormBrowse
                                          dJpo3HPctv.exeGet hashmaliciousXWormBrowse
                                            Payslip_October_2024_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                              Payslip_October_2024.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                Massive.exeGet hashmaliciousAgentTeslaBrowse
                                                  z20SWIFT_MT103_Payment_552016_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    Order Specifications for Materials.docx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      9348000 EDT8 EDQ-905.pdf.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                        New_Order_568330_Material_Specifications.exeGet hashmaliciousAgentTesla, MassLogger RAT, Phoenix Stealer, RedLine, SugarDump, XWormBrowse
                                                          Dokument_2024-10-24_135211.exeGet hashmaliciousXWormBrowse
                                                            Process:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:modified
                                                            Size (bytes):142
                                                            Entropy (8bit):5.090621108356562
                                                            Encrypted:false
                                                            SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                            MD5:8C0458BB9EA02D50565175E38D577E35
                                                            SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                            SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                            SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                            Process:C:\Users\user\Desktop\copto de pago.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):244224
                                                            Entropy (8bit):6.6946010160666045
                                                            Encrypted:false
                                                            SSDEEP:6144:oVnBxXZvHAXT158rXvToZJvvmcK/zWIZUW0dFk0zh51kT:iBxXZU1cfToZxvmcAzWIZb0Pk2ST
                                                            MD5:80052EA77D3861973E662D2D949AC731
                                                            SHA1:C3F87F117D3E02A3C4524271192FB1E590C58A4C
                                                            SHA-256:74FBC26BACFF7384B0BFCE9AE4704FD6C09934006F8D6F37428D4C06F081C9DA
                                                            SHA-512:A9BCD99D13C69F5F48A15467DD8EB6568836124F77297A2B1CC3774D3BD86A620894CCA79E13AF291F6090991AAE8E5CE3CB6FAAC23BCB16F61BCF1DAA6AEE45
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:t..SZQ0IFGFC..8F.ZCZ64U5uF19N8SYQ0IBGFCSZ8FFZCZ64U55F19N8SYQ.IBGH\.T8.O.b.7x..a.XJnH!66B(/g%"=4W2f8&zDA;.\(.}.ks4>T,lJKIwZ8FFZCZfqU5yG29,..?Q0IBGFCS.8DGQBQ64.65F99N8SYQ.AGFcSZ8.EZCZv4U.5F1;N8WYQ0IBGFGSZ8FFZCZ.0U57F19N8S[Qp.BGVCSJ8FFZSZ6$U55F19^8SYQ0IBGFCS..EF.CZ64.65.49N8SYQ0IBGFCSZ8FFZCZ24Y55F19N8SYQ0IBGFCSZ8FFZCZ64U55F19N8SYQ0IBGFCSZ8FFZCZ6.U5=F19N8SYQ0IBOfCS.8FFZCZ64U55hE\6LSYQ4.AGFcSZ8.EZCX64U55F19N8SYQ0iBG&m!)J%FZC.34U5.E19H8SY.3IBGFCSZ8FFZCZv4Uu.4TU![SY]0IBGFGSZ:FFZ.Y64U55F19N8SYQpIB.FCSZ8FFZCZ64U55F..M8SYQ0.BGFAS_8..XCZ.5U65F18N8UYQ0IBGFCSZ8FFZCZ64U55F19N8SYQ0IBGFCSZ8FFZCZ64U55[......ox4|M$D.|.!.Y..%..L..>x[.(M....J....a3\..6.Z....0...$.AG>G....~:H+8\.B.IP.S.....h6...U4.<...$..;3.....uz...H2....2.. 5[.4EE*T..Y58#Y.@.GCSZ8........\M.k.M7MmCH....gH@....H4U5QF19<8SY00IB.FCS58FF4CZ6JU55819N~SYQpIBGqCSZ.FFZ.Z64q55FO9N8.$^?../0..8FFZCo.e.X....d...3.8.1b.>...nPf.IY.9{....G..-..Mj-@y..15S10D6=M4nW...fDGW_:ABYOg8....g....j..8....).DFFZCZ6.U5.F19.S.Q0I.G.C..8FF.Z.4.5..9
                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):45984
                                                            Entropy (8bit):6.16795797263964
                                                            Encrypted:false
                                                            SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                            MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                            SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                            SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                            SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: purchase order P857248 dated 04112024.exe, Detection: malicious, Browse
                                                            • Filename: dJpo3HPctv.exe, Detection: malicious, Browse
                                                            • Filename: Payslip_October_2024_pdf.exe, Detection: malicious, Browse
                                                            • Filename: Payslip_October_2024.pdf.exe, Detection: malicious, Browse
                                                            • Filename: Massive.exe, Detection: malicious, Browse
                                                            • Filename: z20SWIFT_MT103_Payment_552016_pdf.exe, Detection: malicious, Browse
                                                            • Filename: Order Specifications for Materials.docx.exe, Detection: malicious, Browse
                                                            • Filename: 9348000 EDT8 EDQ-905.pdf.exe, Detection: malicious, Browse
                                                            • Filename: New_Order_568330_Material_Specifications.exe, Detection: malicious, Browse
                                                            • Filename: Dokument_2024-10-24_135211.exe, Detection: malicious, Browse
                                                            Reputation:moderate, very likely benign file
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                            Process:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1141
                                                            Entropy (8bit):4.442398121585593
                                                            Encrypted:false
                                                            SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                            MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                            SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                            SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                            SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                            Malicious:false
                                                            Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.251710071689202
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:copto de pago.exe
                                                            File size:1'356'887 bytes
                                                            MD5:3b29983c32ddbf81b48046fdbc0142f2
                                                            SHA1:f4ecb5bc16fa22bd7394a4c1dd1cc049450d0695
                                                            SHA256:1829a5b49d1c30ac6271ab38f248aecc37c40c8fb1cca0ed2b395e94bfe27b86
                                                            SHA512:97859bd5e0d029a80a000eef5e9c3bf3038fc562f03c403320fc3f96251b901e93f8081d749714394cbe0264422890402e28329ec9053a4420c46903b14c39fe
                                                            SSDEEP:24576:mRmJkcoQricOIQxiZY1iaI9tlvKpV5hXlJFrTZau+4u62W7:jJZoQrbTFZY1iaI/NK75PLv+452W7
                                                            TLSH:2755CF12AC8C9465C1622173ED3AF77A96342D261377D1EB37D85E2329B03C2573A736
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                                            Icon Hash:c58ee08c9594cd55
                                                            Entrypoint:0x4165c1
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:0
                                                            File Version Major:5
                                                            File Version Minor:0
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:0
                                                            Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                                            Instruction
                                                            call 00007F35106F87CBh
                                                            jmp 00007F35106EF63Eh
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            push ebp
                                                            mov ebp, esp
                                                            push edi
                                                            push esi
                                                            mov esi, dword ptr [ebp+0Ch]
                                                            mov ecx, dword ptr [ebp+10h]
                                                            mov edi, dword ptr [ebp+08h]
                                                            mov eax, ecx
                                                            mov edx, ecx
                                                            add eax, esi
                                                            cmp edi, esi
                                                            jbe 00007F35106EF7BAh
                                                            cmp edi, eax
                                                            jc 00007F35106EF956h
                                                            cmp ecx, 00000080h
                                                            jc 00007F35106EF7CEh
                                                            cmp dword ptr [004A9724h], 00000000h
                                                            je 00007F35106EF7C5h
                                                            push edi
                                                            push esi
                                                            and edi, 0Fh
                                                            and esi, 0Fh
                                                            cmp edi, esi
                                                            pop esi
                                                            pop edi
                                                            jne 00007F35106EF7B7h
                                                            jmp 00007F35106EFB92h
                                                            test edi, 00000003h
                                                            jne 00007F35106EF7C6h
                                                            shr ecx, 02h
                                                            and edx, 03h
                                                            cmp ecx, 08h
                                                            jc 00007F35106EF7DBh
                                                            rep movsd
                                                            jmp dword ptr [00416740h+edx*4]
                                                            mov eax, edi
                                                            mov edx, 00000003h
                                                            sub ecx, 04h
                                                            jc 00007F35106EF7BEh
                                                            and eax, 03h
                                                            add ecx, eax
                                                            jmp dword ptr [00416654h+eax*4]
                                                            jmp dword ptr [00416750h+ecx*4]
                                                            nop
                                                            jmp dword ptr [004166D4h+ecx*4]
                                                            nop
                                                            inc cx
                                                            add byte ptr [eax-4BFFBE9Ah], dl
                                                            inc cx
                                                            add byte ptr [ebx], ah
                                                            ror dword ptr [edx-75F877FAh], 1
                                                            inc esi
                                                            add dword ptr [eax+468A0147h], ecx
                                                            add al, cl
                                                            jmp 00007F3512B67FB7h
                                                            add esi, 03h
                                                            add edi, 03h
                                                            cmp ecx, 08h
                                                            jc 00007F35106EF77Eh
                                                            rep movsd
                                                            jmp dword ptr [00000000h+edx*4]
                                                            Programming Language:
                                                            • [ C ] VS2010 SP1 build 40219
                                                            • [C++] VS2010 SP1 build 40219
                                                            • [ C ] VS2008 SP1 build 30729
                                                            • [IMP] VS2008 SP1 build 30729
                                                            • [ASM] VS2010 SP1 build 40219
                                                            • [RES] VS2010 SP1 build 40219
                                                            • [LNK] VS2010 SP1 build 40219
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x3a818.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0xab0000x3a8180x3aa00ca10a7d76f98eb421efae1a9194d40a8False0.31944213086353945data5.766607496882607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0xab7480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.5150709219858156
                                                            RT_ICON0xabbb00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                            RT_ICON0xabcd80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                            RT_ICON0xabe000x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                            RT_ICON0xabf280x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.37682926829268293
                                                            RT_ICON0xac5900x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.478494623655914
                                                            RT_ICON0xac8780x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishGreat Britain0.514344262295082
                                                            RT_ICON0xaca600x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.49324324324324326
                                                            RT_ICON0xacb880x6ed1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.9985195107335472
                                                            RT_ICON0xb3a600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.570362473347548
                                                            RT_ICON0xb49080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.6430505415162455
                                                            RT_ICON0xb51b00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishGreat Britain0.5616359447004609
                                                            RT_ICON0xb58780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.4125722543352601
                                                            RT_ICON0xb5de00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishGreat Britain0.13950668401750857
                                                            RT_ICON0xc66080x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishGreat Britain0.22774332562539415
                                                            RT_ICON0xcfab00x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishGreat Britain0.23240601503759398
                                                            RT_ICON0xd62980x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishGreat Britain0.25914972273567466
                                                            RT_ICON0xdb7200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishGreat Britain0.24728389230042513
                                                            RT_ICON0xdf9480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.3354771784232365
                                                            RT_ICON0xe1ef00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.3778142589118199
                                                            RT_MENU0xe2f980x50dataEnglishGreat Britain0.9
                                                            RT_DIALOG0xe2fe80xfcdataEnglishGreat Britain0.6507936507936508
                                                            RT_STRING0xe30e80x530dataEnglishGreat Britain0.33960843373493976
                                                            RT_STRING0xe36180x690dataEnglishGreat Britain0.26964285714285713
                                                            RT_STRING0xe3ca80x4d0dataEnglishGreat Britain0.36363636363636365
                                                            RT_STRING0xe41780x5fcdataEnglishGreat Britain0.3087467362924282
                                                            RT_STRING0xe47780x65cdataEnglishGreat Britain0.34336609336609336
                                                            RT_STRING0xe4dd80x388dataEnglishGreat Britain0.377212389380531
                                                            RT_STRING0xe51600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                            RT_GROUP_ICON0xe52b80x102dataEnglishGreat Britain0.6162790697674418
                                                            RT_GROUP_ICON0xe53c00x14dataEnglishGreat Britain1.15
                                                            RT_GROUP_ICON0xe53d80x14dataEnglishGreat Britain1.25
                                                            RT_GROUP_ICON0xe53f00x14dataEnglishGreat Britain1.25
                                                            RT_VERSION0xe54080x19cdataEnglishGreat Britain0.5339805825242718
                                                            RT_MANIFEST0xe55a80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                            DLLImport
                                                            WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                            VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                            COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                            MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                            WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                            PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                            USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                            KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                                            USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                                            GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                                            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                            ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                                            SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                            ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                                            OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishGreat Britain
                                                            EnglishUnited States
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-11-05T12:38:41.109901+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.549706TCP
                                                            2024-11-05T12:39:19.531555+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.549917TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 5, 2024 12:38:24.924719095 CET4970480192.168.2.5208.95.112.1
                                                            Nov 5, 2024 12:38:24.929966927 CET8049704208.95.112.1192.168.2.5
                                                            Nov 5, 2024 12:38:24.930046082 CET4970480192.168.2.5208.95.112.1
                                                            Nov 5, 2024 12:38:24.930936098 CET4970480192.168.2.5208.95.112.1
                                                            Nov 5, 2024 12:38:24.936749935 CET8049704208.95.112.1192.168.2.5
                                                            Nov 5, 2024 12:38:25.523500919 CET8049704208.95.112.1192.168.2.5
                                                            Nov 5, 2024 12:38:25.569442034 CET4970480192.168.2.5208.95.112.1
                                                            Nov 5, 2024 12:38:26.093142033 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:26.098278999 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:26.098512888 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:26.743892908 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:26.747401953 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:26.752290964 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:26.904575109 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:26.904745102 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:26.909638882 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.061481953 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.116292953 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:27.122993946 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:27.127882004 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.280003071 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.280041933 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.280057907 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.280073881 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.280102968 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:27.280143976 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:27.312369108 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.366349936 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:27.468195915 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:27.473058939 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.624670982 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.636876106 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:27.641788006 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.793488979 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.794981956 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:27.800169945 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.954097986 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:27.954472065 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:27.959489107 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.116373062 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.116643906 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:28.121546984 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.275389910 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.275629044 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:28.280457020 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.466645002 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.466856003 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:28.471750021 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.624599934 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.625168085 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:28.625231981 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:28.625257015 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:28.625287056 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:38:28.630026102 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.630040884 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.630137920 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.630150080 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.919084072 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:38:28.960073948 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:39:16.085690975 CET4970480192.168.2.5208.95.112.1
                                                            Nov 5, 2024 12:39:16.090966940 CET8049704208.95.112.1192.168.2.5
                                                            Nov 5, 2024 12:39:16.091028929 CET4970480192.168.2.5208.95.112.1
                                                            Nov 5, 2024 12:40:06.103590012 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:40:06.108510017 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:40:06.261311054 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:40:06.261790037 CET58749705208.91.199.224192.168.2.5
                                                            Nov 5, 2024 12:40:06.261852026 CET49705587192.168.2.5208.91.199.224
                                                            Nov 5, 2024 12:40:06.264869928 CET49705587192.168.2.5208.91.199.224
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 5, 2024 12:38:24.910806894 CET6253253192.168.2.51.1.1.1
                                                            Nov 5, 2024 12:38:24.918649912 CET53625321.1.1.1192.168.2.5
                                                            Nov 5, 2024 12:38:26.083332062 CET5304353192.168.2.51.1.1.1
                                                            Nov 5, 2024 12:38:26.091950893 CET53530431.1.1.1192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Nov 5, 2024 12:38:24.910806894 CET192.168.2.51.1.1.10x79bbStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                            Nov 5, 2024 12:38:26.083332062 CET192.168.2.51.1.1.10xda96Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Nov 5, 2024 12:38:24.918649912 CET1.1.1.1192.168.2.50x79bbNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                            Nov 5, 2024 12:38:26.091950893 CET1.1.1.1192.168.2.50xda96No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                            Nov 5, 2024 12:38:26.091950893 CET1.1.1.1192.168.2.50xda96No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                            Nov 5, 2024 12:38:26.091950893 CET1.1.1.1192.168.2.50xda96No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                            Nov 5, 2024 12:38:26.091950893 CET1.1.1.1192.168.2.50xda96No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                            • ip-api.com
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549704208.95.112.1803396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 5, 2024 12:38:24.930936098 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                            Host: ip-api.com
                                                            Connection: Keep-Alive
                                                            Nov 5, 2024 12:38:25.523500919 CET174INHTTP/1.1 200 OK
                                                            Date: Tue, 05 Nov 2024 11:38:24 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Content-Length: 5
                                                            Access-Control-Allow-Origin: *
                                                            X-Ttl: 60
                                                            X-Rl: 44
                                                            Data Raw: 74 72 75 65 0a
                                                            Data Ascii: true


                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                            Nov 5, 2024 12:38:26.743892908 CET58749705208.91.199.224192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                            Nov 5, 2024 12:38:26.747401953 CET49705587192.168.2.5208.91.199.224EHLO 936905
                                                            Nov 5, 2024 12:38:26.904575109 CET58749705208.91.199.224192.168.2.5250-us2.outbound.mailhostbox.com
                                                            250-PIPELINING
                                                            250-SIZE 41648128
                                                            250-VRFY
                                                            250-ETRN
                                                            250-STARTTLS
                                                            250-AUTH PLAIN LOGIN
                                                            250-AUTH=PLAIN LOGIN
                                                            250-ENHANCEDSTATUSCODES
                                                            250-8BITMIME
                                                            250-DSN
                                                            250 CHUNKING
                                                            Nov 5, 2024 12:38:26.904745102 CET49705587192.168.2.5208.91.199.224STARTTLS
                                                            Nov 5, 2024 12:38:27.061481953 CET58749705208.91.199.224192.168.2.5220 2.0.0 Ready to start TLS

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:06:38:21
                                                            Start date:05/11/2024
                                                            Path:C:\Users\user\Desktop\copto de pago.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\copto de pago.exe"
                                                            Imagebase:0x400000
                                                            File size:1'356'887 bytes
                                                            MD5 hash:3B29983C32DDBF81B48046FDBC0142F2
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2052077383.0000000000B30000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:06:38:22
                                                            Start date:05/11/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\copto de pago.exe"
                                                            Imagebase:0x740000
                                                            File size:45'984 bytes
                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3277927890.0000000002BD7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3277927890.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3277927890.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3277927890.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3276885929.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                            Reputation:high
                                                            Has exited:false

                                                            Target ID:3
                                                            Start time:06:38:34
                                                            Start date:05/11/2024
                                                            Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                                            Imagebase:0xd80000
                                                            File size:45'984 bytes
                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Antivirus matches:
                                                            • Detection: 0%, ReversingLabs
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:06:38:34
                                                            Start date:05/11/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:06:38:42
                                                            Start date:05/11/2024
                                                            Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                                            Imagebase:0x7a0000
                                                            File size:45'984 bytes
                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:06:38:42
                                                            Start date:05/11/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:3.3%
                                                              Dynamic/Decrypted Code Coverage:1.4%
                                                              Signature Coverage:8.8%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:37
                                                              execution_graph 86066 4010e0 86069 401100 86066->86069 86068 4010f8 86070 401113 86069->86070 86072 401120 86070->86072 86073 401184 86070->86073 86074 40114c 86070->86074 86100 401182 86070->86100 86071 40112c DefWindowProcW 86071->86068 86072->86071 86114 401000 Shell_NotifyIconW __localtime64_s 86072->86114 86107 401250 61 API calls __localtime64_s 86073->86107 86076 401151 86074->86076 86077 40119d 86074->86077 86081 401219 86076->86081 86082 40115d 86076->86082 86079 4011a3 86077->86079 86080 42afb4 86077->86080 86078 401193 86078->86068 86079->86072 86088 4011b6 KillTimer 86079->86088 86089 4011db SetTimer RegisterWindowMessageW 86079->86089 86109 40f190 10 API calls 86080->86109 86081->86072 86092 401225 86081->86092 86084 401163 86082->86084 86085 42b01d 86082->86085 86090 42afe9 86084->86090 86091 40116c 86084->86091 86085->86071 86113 4370f4 52 API calls 86085->86113 86087 42b04f 86115 40e0c0 86087->86115 86108 401000 Shell_NotifyIconW __localtime64_s 86088->86108 86089->86078 86097 401204 CreatePopupMenu 86089->86097 86111 40f190 10 API calls 86090->86111 86091->86072 86099 401174 86091->86099 86125 468b0e 74 API calls __localtime64_s 86092->86125 86097->86068 86110 45fd57 65 API calls __localtime64_s 86099->86110 86100->86071 86101 42afe4 86101->86078 86102 42b00e 86112 401a50 331 API calls 86102->86112 86103 4011c9 PostQuitMessage 86103->86068 86106 42afdc 86106->86071 86106->86101 86107->86078 86108->86103 86109->86078 86110->86106 86111->86102 86112->86100 86113->86100 86114->86087 86117 40e0e7 __localtime64_s 86115->86117 86116 40e142 86119 40e184 86116->86119 86148 4341e6 63 API calls __wcsicoll 86116->86148 86117->86116 86118 42729f DestroyIcon 86117->86118 86118->86116 86121 40e1a0 Shell_NotifyIconW 86119->86121 86122 4272db Shell_NotifyIconW 86119->86122 86126 401b80 86121->86126 86124 40e1ba 86124->86100 86125->86101 86127 401b9c 86126->86127 86147 401c7e 86126->86147 86149 4013c0 86127->86149 86130 42722b LoadStringW 86133 427246 86130->86133 86131 401bb9 86154 402160 86131->86154 86168 40e0a0 86133->86168 86134 401bcd 86135 427258 86134->86135 86136 401bda 86134->86136 86172 40d200 52 API calls 2 library calls 86135->86172 86136->86133 86138 401be4 86136->86138 86167 40d200 52 API calls 2 library calls 86138->86167 86141 427267 86142 42727b 86141->86142 86143 401bf3 __localtime64_s _wcscpy _wcsncpy 86141->86143 86173 40d200 52 API calls 2 library calls 86142->86173 86146 401c62 Shell_NotifyIconW 86143->86146 86145 427289 86146->86147 86147->86124 86148->86119 86174 4115d7 86149->86174 86155 426daa 86154->86155 86156 40216b _wcslen 86154->86156 86212 40c600 86155->86212 86159 402180 86156->86159 86160 40219e 86156->86160 86158 426db5 86158->86134 86211 403bd0 52 API calls moneypunct 86159->86211 86162 4013a0 52 API calls 86160->86162 86164 4021a5 86162->86164 86163 402187 _memmove 86163->86134 86165 426db7 86164->86165 86166 4115d7 52 API calls 86164->86166 86166->86163 86167->86143 86169 40e0b2 86168->86169 86170 40e0a8 86168->86170 86169->86143 86224 403c30 52 API calls _memmove 86170->86224 86172->86141 86173->86145 86176 4115e1 _malloc 86174->86176 86177 4013e4 86176->86177 86181 4115fd std::exception::exception 86176->86181 86188 4135bb 86176->86188 86185 4013a0 86177->86185 86178 41163b 86203 4180af 46 API calls std::exception::operator= 86178->86203 86180 411645 86204 418105 RaiseException 86180->86204 86181->86178 86202 41130a 51 API calls __cinit 86181->86202 86184 411656 86186 4115d7 52 API calls 86185->86186 86187 4013a7 86186->86187 86187->86130 86187->86131 86189 413638 _malloc 86188->86189 86195 4135c9 _malloc 86188->86195 86210 417f77 46 API calls __getptd_noexit 86189->86210 86192 4135f7 RtlAllocateHeap 86192->86195 86201 413630 86192->86201 86194 413624 86208 417f77 46 API calls __getptd_noexit 86194->86208 86195->86192 86195->86194 86196 4135d4 86195->86196 86199 413622 86195->86199 86196->86195 86205 418901 46 API calls 2 library calls 86196->86205 86206 418752 46 API calls 8 library calls 86196->86206 86207 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86196->86207 86209 417f77 46 API calls __getptd_noexit 86199->86209 86201->86176 86202->86178 86203->86180 86204->86184 86205->86196 86206->86196 86208->86199 86209->86201 86210->86201 86211->86163 86213 40c619 86212->86213 86214 40c60a 86212->86214 86213->86158 86214->86213 86217 4026f0 86214->86217 86216 426d7a _memmove 86216->86158 86218 426873 86217->86218 86219 4026ff 86217->86219 86220 4013a0 52 API calls 86218->86220 86219->86216 86221 42687b 86220->86221 86222 4115d7 52 API calls 86221->86222 86223 42689e _memmove 86222->86223 86223->86216 86224->86169 86225 40bd20 86226 40bd2d 86225->86226 86229 428194 86225->86229 86227 40bd37 86226->86227 86248 4531b1 85 API calls 5 library calls 86226->86248 86237 40bd50 86227->86237 86228 40bd43 86229->86228 86231 4281bc 86229->86231 86232 4281b2 86229->86232 86247 45e987 86 API calls moneypunct 86231->86247 86246 40b510 VariantClear 86232->86246 86236 4281ba 86238 426cf1 86237->86238 86239 40bd63 86237->86239 86258 44cde9 52 API calls _memmove 86238->86258 86249 40bd80 86239->86249 86242 40bd73 86242->86228 86243 426cfc 86244 40e0a0 52 API calls 86243->86244 86245 426d02 86244->86245 86246->86236 86247->86226 86248->86227 86250 40bd8e 86249->86250 86254 40bdb7 _memmove 86249->86254 86251 40bded 86250->86251 86252 40bdad 86250->86252 86250->86254 86255 4115d7 52 API calls 86251->86255 86259 402f00 86252->86259 86254->86242 86256 40bdf6 86255->86256 86256->86254 86257 4115d7 52 API calls 86256->86257 86257->86254 86258->86243 86260 402f10 86259->86260 86261 402f0c 86259->86261 86262 4115d7 52 API calls 86260->86262 86263 4268c3 86260->86263 86261->86254 86264 402f51 moneypunct _memmove 86262->86264 86264->86254 86265 425ba2 86270 40e360 86265->86270 86267 425bb4 86286 41130a 51 API calls __cinit 86267->86286 86269 425bbe 86271 4115d7 52 API calls 86270->86271 86272 40e3ec GetModuleFileNameW 86271->86272 86287 413a0e 86272->86287 86274 40e421 _wcsncat 86290 413a9e 86274->86290 86277 4115d7 52 API calls 86278 40e45e _wcscpy 86277->86278 86293 40bc70 86278->86293 86282 40e4a9 86282->86267 86283 40e4a1 _wcscat _wcslen _wcsncpy 86283->86282 86284 4115d7 52 API calls 86283->86284 86285 401c90 52 API calls 86283->86285 86284->86283 86285->86283 86286->86269 86312 413801 86287->86312 86342 419efd 86290->86342 86294 4115d7 52 API calls 86293->86294 86295 40bc98 86294->86295 86296 4115d7 52 API calls 86295->86296 86297 40bca6 86296->86297 86298 40e4c0 86297->86298 86354 403350 86298->86354 86300 40e4cb RegOpenKeyExW 86301 427190 RegQueryValueExW 86300->86301 86302 40e4eb 86300->86302 86303 4271b0 86301->86303 86304 42721a RegCloseKey 86301->86304 86302->86283 86305 4115d7 52 API calls 86303->86305 86304->86283 86306 4271cb 86305->86306 86361 43652f 52 API calls 86306->86361 86308 4271d8 RegQueryValueExW 86309 4271f7 86308->86309 86311 42720e 86308->86311 86310 402160 52 API calls 86309->86310 86310->86311 86311->86304 86313 41389e 86312->86313 86320 41381a 86312->86320 86314 4139e8 86313->86314 86316 413a00 86313->86316 86339 417f77 46 API calls __getptd_noexit 86314->86339 86341 417f77 46 API calls __getptd_noexit 86316->86341 86317 4139ed 86340 417f25 10 API calls __localtime64_s 86317->86340 86320->86313 86327 41388a 86320->86327 86334 419e30 46 API calls 2 library calls 86320->86334 86322 41396c 86322->86313 86323 413967 86322->86323 86325 41397a 86322->86325 86323->86274 86324 413929 86324->86313 86326 413945 86324->86326 86336 419e30 46 API calls 2 library calls 86324->86336 86338 419e30 46 API calls 2 library calls 86325->86338 86326->86313 86326->86323 86330 41395b 86326->86330 86327->86313 86333 413909 86327->86333 86335 419e30 46 API calls 2 library calls 86327->86335 86337 419e30 46 API calls 2 library calls 86330->86337 86333->86322 86333->86324 86334->86327 86335->86333 86336->86326 86337->86323 86338->86323 86339->86317 86340->86323 86341->86323 86343 419f13 86342->86343 86344 419f0e 86342->86344 86351 417f77 46 API calls __getptd_noexit 86343->86351 86344->86343 86350 419f2b 86344->86350 86346 419f18 86352 417f25 10 API calls __localtime64_s 86346->86352 86348 40e454 86348->86277 86350->86348 86353 417f77 46 API calls __getptd_noexit 86350->86353 86351->86346 86352->86348 86353->86346 86355 403367 86354->86355 86356 403358 86354->86356 86357 4115d7 52 API calls 86355->86357 86356->86300 86358 403370 86357->86358 86359 4115d7 52 API calls 86358->86359 86360 40339e 86359->86360 86360->86300 86361->86308 86362 416454 86399 416c70 86362->86399 86364 416460 GetStartupInfoW 86365 416474 86364->86365 86400 419d5a HeapCreate 86365->86400 86367 4164cd 86368 4164d8 86367->86368 86484 41642b 46 API calls 3 library calls 86367->86484 86401 417c20 GetModuleHandleW 86368->86401 86371 4164de 86372 4164e9 __RTC_Initialize 86371->86372 86485 41642b 46 API calls 3 library calls 86371->86485 86420 41aaa1 GetStartupInfoW 86372->86420 86376 416503 GetCommandLineW 86433 41f584 GetEnvironmentStringsW 86376->86433 86379 416513 86439 41f4d6 GetModuleFileNameW 86379->86439 86382 41651d 86383 416528 86382->86383 86487 411924 46 API calls 3 library calls 86382->86487 86443 41f2a4 86383->86443 86386 41652e 86387 416539 86386->86387 86488 411924 46 API calls 3 library calls 86386->86488 86457 411703 86387->86457 86390 416541 86392 41654c __wwincmdln 86390->86392 86489 411924 46 API calls 3 library calls 86390->86489 86461 40d6b0 86392->86461 86395 41657c 86491 411906 46 API calls _doexit 86395->86491 86398 416581 __write 86399->86364 86400->86367 86402 417c34 86401->86402 86403 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86401->86403 86492 4178ff 49 API calls _free 86402->86492 86405 417c87 TlsAlloc 86403->86405 86408 417cd5 TlsSetValue 86405->86408 86409 417d96 86405->86409 86406 417c39 86406->86371 86408->86409 86410 417ce6 __init_pointers 86408->86410 86409->86371 86493 418151 InitializeCriticalSectionAndSpinCount 86410->86493 86412 417d91 86501 4178ff 49 API calls _free 86412->86501 86414 417d2a 86414->86412 86494 416b49 86414->86494 86417 417d76 86500 41793c 46 API calls 4 library calls 86417->86500 86419 417d7e GetCurrentThreadId 86419->86409 86421 416b49 __calloc_crt 46 API calls 86420->86421 86423 41aabf 86421->86423 86422 41ac34 86424 41ac6a GetStdHandle 86422->86424 86426 41acce SetHandleCount 86422->86426 86428 41ac7c GetFileType 86422->86428 86432 41aca2 InitializeCriticalSectionAndSpinCount 86422->86432 86423->86422 86425 416b49 __calloc_crt 46 API calls 86423->86425 86427 4164f7 86423->86427 86429 41abb4 86423->86429 86424->86422 86425->86423 86426->86427 86427->86376 86486 411924 46 API calls 3 library calls 86427->86486 86428->86422 86429->86422 86430 41abe0 GetFileType 86429->86430 86431 41abeb InitializeCriticalSectionAndSpinCount 86429->86431 86430->86429 86430->86431 86431->86427 86431->86429 86432->86422 86432->86427 86434 41f595 86433->86434 86435 41f599 86433->86435 86434->86379 86511 416b04 86435->86511 86437 41f5c2 FreeEnvironmentStringsW 86437->86379 86438 41f5bb _memmove 86438->86437 86440 41f50b _wparse_cmdline 86439->86440 86441 416b04 __malloc_crt 46 API calls 86440->86441 86442 41f54e _wparse_cmdline 86440->86442 86441->86442 86442->86382 86444 41f2bc _wcslen 86443->86444 86448 41f2b4 86443->86448 86445 416b49 __calloc_crt 46 API calls 86444->86445 86450 41f2e0 _wcslen 86445->86450 86446 41f336 86518 413748 86446->86518 86448->86386 86449 416b49 __calloc_crt 46 API calls 86449->86450 86450->86446 86450->86448 86450->86449 86451 41f35c 86450->86451 86454 41f373 86450->86454 86517 41ef12 46 API calls 2 library calls 86450->86517 86452 413748 _free 46 API calls 86451->86452 86452->86448 86524 417ed3 86454->86524 86456 41f37f 86456->86386 86458 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86457->86458 86460 411750 __IsNonwritableInCurrentImage 86458->86460 86543 41130a 51 API calls __cinit 86458->86543 86460->86390 86462 42e2f3 86461->86462 86463 40d6cc 86461->86463 86544 408f40 86463->86544 86465 40d707 86548 40ebb0 86465->86548 86472 40d737 86551 411951 86472->86551 86473 40d751 86563 40f4e0 SystemParametersInfoW SystemParametersInfoW 86473->86563 86475 40d75f 86564 40d590 GetCurrentDirectoryW 86475->86564 86477 40d767 SystemParametersInfoW 86478 40d794 86477->86478 86479 40d78d FreeLibrary 86477->86479 86480 408f40 VariantClear 86478->86480 86479->86478 86481 40d79d 86480->86481 86482 408f40 VariantClear 86481->86482 86483 40d7a6 86482->86483 86483->86395 86490 4118da 46 API calls _doexit 86483->86490 86484->86368 86485->86372 86490->86395 86491->86398 86492->86406 86493->86414 86496 416b52 86494->86496 86497 416b8f 86496->86497 86498 416b70 Sleep 86496->86498 86502 41f677 86496->86502 86497->86412 86497->86417 86499 416b85 86498->86499 86499->86496 86499->86497 86500->86419 86501->86409 86503 41f683 86502->86503 86508 41f69e _malloc 86502->86508 86504 41f68f 86503->86504 86503->86508 86510 417f77 46 API calls __getptd_noexit 86504->86510 86505 41f6b1 HeapAlloc 86507 41f6d8 86505->86507 86505->86508 86507->86496 86508->86505 86508->86507 86509 41f694 86509->86496 86510->86509 86514 416b0d 86511->86514 86512 4135bb _malloc 45 API calls 86512->86514 86513 416b43 86513->86438 86514->86512 86514->86513 86515 416b24 Sleep 86514->86515 86516 416b39 86515->86516 86516->86513 86516->86514 86517->86450 86519 413753 RtlFreeHeap 86518->86519 86523 41377c __dosmaperr 86518->86523 86520 413768 86519->86520 86519->86523 86527 417f77 46 API calls __getptd_noexit 86520->86527 86522 41376e GetLastError 86522->86523 86523->86448 86528 417daa 86524->86528 86527->86522 86529 417dc9 __localtime64_s __call_reportfault 86528->86529 86530 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86529->86530 86532 417eb5 __call_reportfault 86530->86532 86534 41a208 86532->86534 86533 417ed1 GetCurrentProcess TerminateProcess 86533->86456 86535 41a210 86534->86535 86536 41a212 IsDebuggerPresent 86534->86536 86535->86533 86542 41fe19 86536->86542 86539 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86540 421ff0 __call_reportfault 86539->86540 86541 421ff8 GetCurrentProcess TerminateProcess 86539->86541 86540->86541 86541->86533 86542->86539 86543->86460 86545 408f48 moneypunct 86544->86545 86546 4265c7 VariantClear 86545->86546 86547 408f55 moneypunct 86545->86547 86546->86547 86547->86465 86604 40ebd0 86548->86604 86608 4182cb 86551->86608 86553 41195e 86615 4181f2 LeaveCriticalSection 86553->86615 86555 40d748 86556 4119b0 86555->86556 86557 4119d6 86556->86557 86558 4119bc 86556->86558 86557->86473 86558->86557 86650 417f77 46 API calls __getptd_noexit 86558->86650 86560 4119c6 86651 417f25 10 API calls __localtime64_s 86560->86651 86562 4119d1 86562->86473 86563->86475 86652 401f20 86564->86652 86566 40d5b6 IsDebuggerPresent 86567 40d5c4 86566->86567 86568 42e1bb MessageBoxA 86566->86568 86569 42e1d4 86567->86569 86570 40d5e3 86567->86570 86568->86569 86824 403a50 52 API calls 3 library calls 86569->86824 86722 40f520 86570->86722 86574 40d5fd GetFullPathNameW 86734 401460 86574->86734 86576 40d63b 86577 40d643 86576->86577 86578 42e231 SetCurrentDirectoryW 86576->86578 86579 40d64c 86577->86579 86825 432fee 6 API calls 86577->86825 86578->86577 86749 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86579->86749 86582 42e252 86582->86579 86584 42e25a GetModuleFileNameW 86582->86584 86586 42e274 86584->86586 86587 42e2cb GetForegroundWindow ShellExecuteW 86584->86587 86826 401b10 86586->86826 86589 40d688 86587->86589 86588 40d656 86591 40d669 86588->86591 86594 40e0c0 74 API calls 86588->86594 86596 40d692 SetCurrentDirectoryW 86589->86596 86757 4091e0 86591->86757 86594->86591 86596->86477 86598 42e28d 86833 40d200 52 API calls 2 library calls 86598->86833 86601 42e299 GetForegroundWindow ShellExecuteW 86602 42e2c6 86601->86602 86602->86589 86603 40ec00 LoadLibraryA GetProcAddress 86603->86472 86605 40d72e 86604->86605 86606 40ebd6 LoadLibraryA 86604->86606 86605->86472 86605->86603 86606->86605 86607 40ebe7 GetProcAddress 86606->86607 86607->86605 86609 4182e0 86608->86609 86610 4182f3 EnterCriticalSection 86608->86610 86616 418209 86609->86616 86610->86553 86612 4182e6 86612->86610 86643 411924 46 API calls 3 library calls 86612->86643 86615->86555 86617 418215 __write 86616->86617 86618 418225 86617->86618 86619 41823d 86617->86619 86644 418901 46 API calls 2 library calls 86618->86644 86622 416b04 __malloc_crt 45 API calls 86619->86622 86628 41824b __write 86619->86628 86621 41822a 86645 418752 46 API calls 8 library calls 86621->86645 86624 418256 86622->86624 86626 41825d 86624->86626 86627 41826c 86624->86627 86625 418231 86646 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86625->86646 86647 417f77 46 API calls __getptd_noexit 86626->86647 86631 4182cb __lock 45 API calls 86627->86631 86628->86612 86633 418273 86631->86633 86634 4182a6 86633->86634 86635 41827b InitializeCriticalSectionAndSpinCount 86633->86635 86638 413748 _free 45 API calls 86634->86638 86636 418297 86635->86636 86637 41828b 86635->86637 86649 4182c2 LeaveCriticalSection _doexit 86636->86649 86639 413748 _free 45 API calls 86637->86639 86638->86636 86640 418291 86639->86640 86648 417f77 46 API calls __getptd_noexit 86640->86648 86644->86621 86645->86625 86647->86628 86648->86636 86649->86628 86650->86560 86651->86562 86834 40e6e0 86652->86834 86656 401f41 GetModuleFileNameW 86852 410100 86656->86852 86658 401f5c 86864 410960 86658->86864 86661 401b10 52 API calls 86662 401f81 86661->86662 86867 401980 86662->86867 86664 401f8e 86665 408f40 VariantClear 86664->86665 86666 401f9d 86665->86666 86667 401b10 52 API calls 86666->86667 86668 401fb4 86667->86668 86669 401980 53 API calls 86668->86669 86670 401fc3 86669->86670 86671 401b10 52 API calls 86670->86671 86672 401fd2 86671->86672 86875 40c2c0 86672->86875 86674 401fe1 86675 40bc70 52 API calls 86674->86675 86676 401ff3 86675->86676 86893 401a10 86676->86893 86678 401ffe 86900 4114ab 86678->86900 86681 428b05 86683 401a10 52 API calls 86681->86683 86682 402017 86684 4114ab __wcsicoll 58 API calls 86682->86684 86685 428b18 86683->86685 86686 402022 86684->86686 86688 401a10 52 API calls 86685->86688 86686->86685 86687 40202d 86686->86687 86689 4114ab __wcsicoll 58 API calls 86687->86689 86690 428b33 86688->86690 86691 402038 86689->86691 86693 428b3b GetModuleFileNameW 86690->86693 86692 402043 86691->86692 86691->86693 86694 4114ab __wcsicoll 58 API calls 86692->86694 86695 401a10 52 API calls 86693->86695 86696 40204e 86694->86696 86697 428b6c 86695->86697 86698 402092 86696->86698 86702 401a10 52 API calls 86696->86702 86707 428b90 _wcscpy 86696->86707 86699 40e0a0 52 API calls 86697->86699 86701 4020a3 86698->86701 86698->86707 86700 428b7a 86699->86700 86703 401a10 52 API calls 86700->86703 86704 428bc6 86701->86704 86908 40e830 53 API calls 86701->86908 86705 402073 _wcscpy 86702->86705 86706 428b88 86703->86706 86713 401a10 52 API calls 86705->86713 86706->86707 86710 401a10 52 API calls 86707->86710 86709 4020bb 86909 40cf00 53 API calls 86709->86909 86717 4020d0 86710->86717 86712 4020c6 86714 408f40 VariantClear 86712->86714 86713->86698 86714->86717 86715 402110 86719 408f40 VariantClear 86715->86719 86717->86715 86720 401a10 52 API calls 86717->86720 86910 40cf00 53 API calls 86717->86910 86911 40e6a0 53 API calls 86717->86911 86721 402120 moneypunct 86719->86721 86720->86717 86721->86566 86723 4295c9 __localtime64_s 86722->86723 86724 40f53c 86722->86724 86726 4295d9 GetOpenFileNameW 86723->86726 87607 410120 86724->87607 86726->86724 86728 40d5f5 86726->86728 86727 40f545 87611 4102b0 SHGetMalloc 86727->87611 86728->86574 86728->86576 86730 40f54c 87616 410190 GetFullPathNameW 86730->87616 86732 40f559 87627 40f570 86732->87627 87676 402400 86734->87676 86736 40146f 86738 428c29 _wcscat 86736->86738 87685 401500 86736->87685 86739 40147c 86739->86738 87693 40d440 86739->87693 86741 401489 86741->86738 86742 401491 GetFullPathNameW 86741->86742 86743 402160 52 API calls 86742->86743 86744 4014bb 86743->86744 86745 402160 52 API calls 86744->86745 86746 4014c8 86745->86746 86746->86738 86747 402160 52 API calls 86746->86747 86748 4014ee 86747->86748 86748->86576 86750 428361 86749->86750 86751 4103fc LoadImageW RegisterClassExW 86749->86751 87714 44395e EnumResourceNamesW LoadImageW 86750->87714 87713 410490 7 API calls 86751->87713 86754 40d651 86756 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86754->86756 86755 428368 86756->86588 86758 409202 86757->86758 86759 42d7ad 86757->86759 86813 409216 moneypunct 86758->86813 87977 410940 331 API calls 86758->87977 87980 45e737 90 API calls 3 library calls 86759->87980 86762 409386 86763 40939c 86762->86763 87978 40f190 10 API calls 86762->87978 86763->86589 86823 401000 Shell_NotifyIconW __localtime64_s 86763->86823 86765 4095b2 86765->86763 86767 4095bf 86765->86767 86766 409253 PeekMessageW 86766->86813 87979 401a50 331 API calls 86767->87979 86769 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86769->86763 86771 4095f9 86769->86771 86770 42d8cd Sleep 86770->86813 86775 42e158 TranslateMessage DispatchMessageW GetMessageW 86771->86775 86773 42e13b 87998 40d410 VariantClear 86773->87998 86775->86775 86778 42e188 86775->86778 86777 409567 PeekMessageW 86777->86813 86778->86763 86781 44c29d 52 API calls 86822 4094e0 86781->86822 86782 46f3c1 107 API calls 86782->86813 86783 40e0a0 52 API calls 86783->86813 86784 46fdbf 108 API calls 86784->86822 86785 409551 TranslateMessage DispatchMessageW 86785->86777 86787 42dcd2 WaitForSingleObject 86789 42dcf0 GetExitCodeProcess CloseHandle 86787->86789 86787->86813 86788 42dd3d Sleep 86788->86822 87987 40d410 VariantClear 86789->87987 86793 4094cf Sleep 86793->86822 86795 40d410 VariantClear 86795->86813 86797 42d94d timeGetTime 87983 465124 53 API calls 86797->87983 86798 40c620 timeGetTime 86798->86822 86801 465124 53 API calls 86801->86822 86802 42dd89 CloseHandle 86802->86822 86803 47d33e 309 API calls 86803->86813 86805 42de19 GetExitCodeProcess CloseHandle 86805->86822 86808 42de88 Sleep 86808->86813 86813->86762 86813->86766 86813->86770 86813->86773 86813->86777 86813->86782 86813->86783 86813->86785 86813->86787 86813->86788 86813->86793 86813->86795 86813->86797 86813->86803 86814 42e0cc VariantClear 86813->86814 86815 408f40 VariantClear 86813->86815 86817 45e737 90 API calls 86813->86817 86813->86822 87715 4091b0 86813->87715 87773 40afa0 86813->87773 87799 4096a0 86813->87799 87926 408fc0 86813->87926 87961 408cc0 86813->87961 87975 40d150 TranslateAcceleratorW 86813->87975 87976 40d170 IsDialogMessageW GetClassLongW 86813->87976 87981 465124 53 API calls 86813->87981 87982 40c620 timeGetTime 86813->87982 87997 40e270 VariantClear moneypunct 86813->87997 86814->86813 86815->86813 86816 401b10 52 API calls 86816->86822 86817->86813 86819 401980 53 API calls 86819->86822 86820 408f40 VariantClear 86820->86822 86822->86781 86822->86784 86822->86798 86822->86801 86822->86802 86822->86805 86822->86808 86822->86813 86822->86816 86822->86819 86822->86820 87984 45178a 54 API calls 86822->87984 87985 47d33e 331 API calls 86822->87985 87986 453bc6 54 API calls 86822->87986 87988 40d410 VariantClear 86822->87988 87989 443d19 67 API calls _wcslen 86822->87989 87990 4574b4 VariantClear 86822->87990 87991 403cd0 86822->87991 87995 4731e1 VariantClear 86822->87995 87996 4331a2 6 API calls 86822->87996 86823->86589 86824->86576 86825->86582 86827 401b16 _wcslen 86826->86827 86828 4115d7 52 API calls 86827->86828 86829 401b63 86827->86829 86830 401b4b _memmove 86828->86830 86832 40d200 52 API calls 2 library calls 86829->86832 86831 4115d7 52 API calls 86830->86831 86831->86829 86832->86598 86833->86601 86835 40bc70 52 API calls 86834->86835 86836 401f31 86835->86836 86837 402560 86836->86837 86838 40256d __write_nolock 86837->86838 86839 402160 52 API calls 86838->86839 86841 402593 86839->86841 86851 4025bd 86841->86851 86912 401c90 86841->86912 86842 4026f0 52 API calls 86842->86851 86843 4026a7 86844 401b10 52 API calls 86843->86844 86850 4026db 86843->86850 86846 4026d1 86844->86846 86845 401b10 52 API calls 86845->86851 86916 40d7c0 52 API calls 2 library calls 86846->86916 86847 401c90 52 API calls 86847->86851 86850->86656 86851->86842 86851->86843 86851->86845 86851->86847 86915 40d7c0 52 API calls 2 library calls 86851->86915 86917 40f760 86852->86917 86855 410118 86855->86658 86857 42805d 86858 42806a 86857->86858 86973 431e58 86857->86973 86860 413748 _free 46 API calls 86858->86860 86861 428078 86860->86861 86862 431e58 82 API calls 86861->86862 86863 428084 86862->86863 86863->86658 86865 4115d7 52 API calls 86864->86865 86866 401f74 86865->86866 86866->86661 86868 4019a3 86867->86868 86869 401985 86867->86869 86868->86869 86870 4019b8 86868->86870 86871 40199f 86869->86871 87595 403e10 53 API calls 86869->87595 87596 403e10 53 API calls 86870->87596 86871->86664 86874 4019c4 86874->86664 86876 40c2c7 86875->86876 86877 40c30e 86875->86877 86880 40c2d3 86876->86880 86881 426c79 86876->86881 86878 40c315 86877->86878 86879 426c2b 86877->86879 86882 40c321 86878->86882 86883 426c5a 86878->86883 86885 426c4b 86879->86885 86886 426c2e 86879->86886 87597 403ea0 52 API calls __cinit 86880->87597 87602 4534e3 52 API calls 86881->87602 87598 403ea0 52 API calls __cinit 86882->87598 87601 4534e3 52 API calls 86883->87601 87600 4534e3 52 API calls 86885->87600 86892 40c2de 86886->86892 87599 4534e3 52 API calls 86886->87599 86892->86674 86892->86892 86894 401a30 86893->86894 86895 401a17 86893->86895 86897 402160 52 API calls 86894->86897 86896 401a2d 86895->86896 87603 403c30 52 API calls _memmove 86895->87603 86896->86678 86899 401a3d 86897->86899 86899->86678 86901 411523 86900->86901 86902 4114ba 86900->86902 87606 4113a8 58 API calls 4 library calls 86901->87606 86907 40200c 86902->86907 87604 417f77 46 API calls __getptd_noexit 86902->87604 86905 4114c6 87605 417f25 10 API calls __localtime64_s 86905->87605 86907->86681 86907->86682 86908->86709 86909->86712 86910->86717 86911->86717 86913 4026f0 52 API calls 86912->86913 86914 401c97 86913->86914 86914->86841 86915->86851 86916->86850 86977 40f6f0 86917->86977 86919 40f77b _strcat moneypunct 86985 40f850 86919->86985 86924 427c2a 87014 414d04 86924->87014 86926 40f7fc 86926->86924 86927 40f804 86926->86927 87001 414a46 86927->87001 86931 40f80e 86931->86855 86936 4528bd 86931->86936 86933 427c59 87020 414fe2 86933->87020 86935 427c79 86937 4150d1 _fseek 81 API calls 86936->86937 86938 452930 86937->86938 87520 452719 86938->87520 86941 452948 86941->86857 86942 414d04 __fread_nolock 61 API calls 86943 452966 86942->86943 86944 414d04 __fread_nolock 61 API calls 86943->86944 86945 452976 86944->86945 86946 414d04 __fread_nolock 61 API calls 86945->86946 86947 45298f 86946->86947 86948 414d04 __fread_nolock 61 API calls 86947->86948 86949 4529aa 86948->86949 86950 4150d1 _fseek 81 API calls 86949->86950 86951 4529c4 86950->86951 86952 4135bb _malloc 46 API calls 86951->86952 86953 4529cf 86952->86953 86954 4135bb _malloc 46 API calls 86953->86954 86955 4529db 86954->86955 86956 414d04 __fread_nolock 61 API calls 86955->86956 86957 4529ec 86956->86957 86958 44afef GetSystemTimeAsFileTime 86957->86958 86959 452a00 86958->86959 86960 452a36 86959->86960 86961 452a13 86959->86961 86963 452aa5 86960->86963 86964 452a3c 86960->86964 86962 413748 _free 46 API calls 86961->86962 86965 452a1c 86962->86965 86967 413748 _free 46 API calls 86963->86967 87526 44b1a9 86964->87526 86968 413748 _free 46 API calls 86965->86968 86970 452aa3 86967->86970 86971 452a25 86968->86971 86969 452a9d 86972 413748 _free 46 API calls 86969->86972 86970->86857 86971->86857 86972->86970 86974 431e64 86973->86974 86976 431e6a 86973->86976 86975 414a46 __fcloseall 82 API calls 86974->86975 86975->86976 86976->86858 86978 425de2 86977->86978 86982 40f6fc _wcslen 86977->86982 86978->86919 86979 40f710 WideCharToMultiByte 86980 40f756 86979->86980 86981 40f728 86979->86981 86980->86919 86983 4115d7 52 API calls 86981->86983 86982->86979 86984 40f735 WideCharToMultiByte 86983->86984 86984->86919 86987 40f85d __localtime64_s _strlen 86985->86987 86988 40f7ab 86987->86988 87033 414db8 86987->87033 86989 4149c2 86988->86989 87048 414904 86989->87048 86991 40f7e9 86991->86924 86992 40f5c0 86991->86992 86993 40f5cd _strcat __write_nolock _memmove 86992->86993 86994 414d04 __fread_nolock 61 API calls 86993->86994 86996 425d11 86993->86996 87000 40f691 __tzset_nolock 86993->87000 87136 4150d1 86993->87136 86994->86993 86997 4150d1 _fseek 81 API calls 86996->86997 86998 425d33 86997->86998 86999 414d04 __fread_nolock 61 API calls 86998->86999 86999->87000 87000->86926 87002 414a52 __write 87001->87002 87003 414a64 87002->87003 87004 414a79 87002->87004 87276 417f77 46 API calls __getptd_noexit 87003->87276 87007 415471 __lock_file 47 API calls 87004->87007 87011 414a74 __write 87004->87011 87006 414a69 87277 417f25 10 API calls __localtime64_s 87006->87277 87009 414a92 87007->87009 87260 4149d9 87009->87260 87011->86931 87345 414c76 87014->87345 87016 414d1c 87017 44afef 87016->87017 87513 442c5a 87017->87513 87019 44b00d 87019->86933 87021 414fee __write 87020->87021 87022 414ffa 87021->87022 87023 41500f 87021->87023 87517 417f77 46 API calls __getptd_noexit 87022->87517 87025 415471 __lock_file 47 API calls 87023->87025 87026 415017 87025->87026 87028 414e4e __ftell_nolock 51 API calls 87026->87028 87027 414fff 87518 417f25 10 API calls __localtime64_s 87027->87518 87030 415024 87028->87030 87519 41503d LeaveCriticalSection LeaveCriticalSection _fprintf 87030->87519 87032 41500a __write 87032->86935 87034 414dd6 87033->87034 87035 414deb 87033->87035 87044 417f77 46 API calls __getptd_noexit 87034->87044 87035->87034 87037 414df2 87035->87037 87046 41b91b 79 API calls 12 library calls 87037->87046 87038 414ddb 87045 417f25 10 API calls __localtime64_s 87038->87045 87041 414e18 87042 414de6 87041->87042 87047 418f98 77 API calls 6 library calls 87041->87047 87042->86987 87044->87038 87045->87042 87046->87041 87047->87042 87050 414910 __write 87048->87050 87049 414923 87104 417f77 46 API calls __getptd_noexit 87049->87104 87050->87049 87053 414951 87050->87053 87052 414928 87105 417f25 10 API calls __localtime64_s 87052->87105 87067 41d4d1 87053->87067 87056 414956 87057 41496a 87056->87057 87058 41495d 87056->87058 87060 414992 87057->87060 87061 414972 87057->87061 87106 417f77 46 API calls __getptd_noexit 87058->87106 87084 41d218 87060->87084 87107 417f77 46 API calls __getptd_noexit 87061->87107 87066 414933 __write @_EH4_CallFilterFunc@8 87066->86991 87068 41d4dd __write 87067->87068 87069 4182cb __lock 46 API calls 87068->87069 87081 41d4eb 87069->87081 87070 41d560 87109 41d5fb 87070->87109 87071 41d567 87073 416b04 __malloc_crt 46 API calls 87071->87073 87075 41d56e 87073->87075 87074 41d5f0 __write 87074->87056 87075->87070 87076 41d57c InitializeCriticalSectionAndSpinCount 87075->87076 87079 41d59c 87076->87079 87080 41d5af EnterCriticalSection 87076->87080 87077 418209 __mtinitlocknum 46 API calls 87077->87081 87082 413748 _free 46 API calls 87079->87082 87080->87070 87081->87070 87081->87071 87081->87077 87112 4154b2 47 API calls __lock 87081->87112 87113 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87081->87113 87082->87070 87085 41d23a 87084->87085 87086 41d255 87085->87086 87097 41d26c __wopenfile 87085->87097 87118 417f77 46 API calls __getptd_noexit 87086->87118 87088 41d25a 87119 417f25 10 API calls __localtime64_s 87088->87119 87089 41d47a 87123 417f77 46 API calls __getptd_noexit 87089->87123 87090 41d48c 87115 422bf9 87090->87115 87094 41d47f 87124 417f25 10 API calls __localtime64_s 87094->87124 87095 41499d 87108 4149b8 LeaveCriticalSection LeaveCriticalSection _fprintf 87095->87108 87097->87089 87103 41d421 87097->87103 87120 41341f 58 API calls 3 library calls 87097->87120 87099 41d41a 87099->87103 87121 41341f 58 API calls 3 library calls 87099->87121 87101 41d439 87101->87103 87122 41341f 58 API calls 3 library calls 87101->87122 87103->87089 87103->87090 87104->87052 87105->87066 87106->87066 87107->87066 87108->87066 87114 4181f2 LeaveCriticalSection 87109->87114 87111 41d602 87111->87074 87112->87081 87113->87081 87114->87111 87125 422b35 87115->87125 87117 422c14 87117->87095 87118->87088 87119->87095 87120->87099 87121->87101 87122->87103 87123->87094 87124->87095 87126 422b41 __write 87125->87126 87127 422b54 87126->87127 87130 422b8a 87126->87130 87128 417f77 __dosmaperr 46 API calls 87127->87128 87129 422b59 87128->87129 87131 417f25 __localtime64_s 10 API calls 87129->87131 87132 422400 __tsopen_nolock 109 API calls 87130->87132 87135 422b63 __write 87131->87135 87133 422ba4 87132->87133 87134 422bcb __wsopen_helper LeaveCriticalSection 87133->87134 87134->87135 87135->87117 87137 4150dd __write 87136->87137 87138 4150e9 87137->87138 87140 41510f 87137->87140 87167 417f77 46 API calls __getptd_noexit 87138->87167 87149 415471 87140->87149 87141 4150ee 87168 417f25 10 API calls __localtime64_s 87141->87168 87148 4150f9 __write 87148->86993 87150 415483 87149->87150 87151 4154a5 EnterCriticalSection 87149->87151 87150->87151 87152 41548b 87150->87152 87153 415117 87151->87153 87154 4182cb __lock 46 API calls 87152->87154 87155 415047 87153->87155 87154->87153 87156 415067 87155->87156 87157 415057 87155->87157 87162 415079 87156->87162 87170 414e4e 87156->87170 87225 417f77 46 API calls __getptd_noexit 87157->87225 87161 41505c 87169 415143 LeaveCriticalSection LeaveCriticalSection _fprintf 87161->87169 87187 41443c 87162->87187 87165 4150b9 87200 41e1f4 87165->87200 87167->87141 87168->87148 87169->87148 87171 414e61 87170->87171 87172 414e79 87170->87172 87226 417f77 46 API calls __getptd_noexit 87171->87226 87173 414139 __flswbuf 46 API calls 87172->87173 87175 414e80 87173->87175 87178 41e1f4 __write 51 API calls 87175->87178 87176 414e66 87227 417f25 10 API calls __localtime64_s 87176->87227 87179 414e97 87178->87179 87180 414f09 87179->87180 87182 414ec9 87179->87182 87186 414e71 87179->87186 87228 417f77 46 API calls __getptd_noexit 87180->87228 87183 41e1f4 __write 51 API calls 87182->87183 87182->87186 87184 414f64 87183->87184 87185 41e1f4 __write 51 API calls 87184->87185 87184->87186 87185->87186 87186->87162 87188 414477 87187->87188 87189 414455 87187->87189 87193 414139 87188->87193 87189->87188 87190 414139 __flswbuf 46 API calls 87189->87190 87191 414470 87190->87191 87229 41b7b2 77 API calls 5 library calls 87191->87229 87194 414145 87193->87194 87195 41415a 87193->87195 87230 417f77 46 API calls __getptd_noexit 87194->87230 87195->87165 87197 41414a 87231 417f25 10 API calls __localtime64_s 87197->87231 87199 414155 87199->87165 87201 41e200 __write 87200->87201 87202 41e223 87201->87202 87203 41e208 87201->87203 87204 41e22f 87202->87204 87209 41e269 87202->87209 87252 417f8a 46 API calls __getptd_noexit 87203->87252 87254 417f8a 46 API calls __getptd_noexit 87204->87254 87207 41e20d 87253 417f77 46 API calls __getptd_noexit 87207->87253 87208 41e234 87255 417f77 46 API calls __getptd_noexit 87208->87255 87232 41ae56 87209->87232 87213 41e23c 87256 417f25 10 API calls __localtime64_s 87213->87256 87214 41e26f 87216 41e291 87214->87216 87217 41e27d 87214->87217 87257 417f77 46 API calls __getptd_noexit 87216->87257 87242 41e17f 87217->87242 87220 41e289 87259 41e2c0 LeaveCriticalSection __unlock_fhandle 87220->87259 87221 41e296 87258 417f8a 46 API calls __getptd_noexit 87221->87258 87222 41e215 __write 87222->87161 87225->87161 87226->87176 87227->87186 87228->87186 87229->87188 87230->87197 87231->87199 87233 41ae62 __write 87232->87233 87234 41aebc 87233->87234 87235 4182cb __lock 46 API calls 87233->87235 87236 41aec1 EnterCriticalSection 87234->87236 87237 41aede __write 87234->87237 87238 41ae8e 87235->87238 87236->87237 87237->87214 87239 41aeaa 87238->87239 87240 41ae97 InitializeCriticalSectionAndSpinCount 87238->87240 87241 41aeec ___lock_fhandle LeaveCriticalSection 87239->87241 87240->87239 87241->87234 87243 41aded __lseeki64_nolock 46 API calls 87242->87243 87244 41e18e 87243->87244 87245 41e1a4 SetFilePointer 87244->87245 87246 41e194 87244->87246 87248 41e1c3 87245->87248 87249 41e1bb GetLastError 87245->87249 87247 417f77 __dosmaperr 46 API calls 87246->87247 87250 41e199 87247->87250 87248->87250 87251 417f9d __dosmaperr 46 API calls 87248->87251 87249->87248 87250->87220 87251->87250 87252->87207 87253->87222 87254->87208 87255->87213 87256->87222 87257->87221 87258->87220 87259->87222 87261 4149ea 87260->87261 87262 4149fe 87260->87262 87306 417f77 46 API calls __getptd_noexit 87261->87306 87264 41443c __flush 77 API calls 87262->87264 87274 4149fa 87262->87274 87266 414a0a 87264->87266 87265 4149ef 87307 417f25 10 API calls __localtime64_s 87265->87307 87279 41d8c2 87266->87279 87270 414139 __flswbuf 46 API calls 87271 414a18 87270->87271 87283 41d7fe 87271->87283 87273 414a1e 87273->87274 87275 413748 _free 46 API calls 87273->87275 87278 414ab2 LeaveCriticalSection LeaveCriticalSection _fprintf 87274->87278 87275->87274 87276->87006 87277->87011 87278->87011 87280 41d8d2 87279->87280 87282 414a12 87279->87282 87281 413748 _free 46 API calls 87280->87281 87280->87282 87281->87282 87282->87270 87284 41d80a __write 87283->87284 87285 41d812 87284->87285 87286 41d82d 87284->87286 87323 417f8a 46 API calls __getptd_noexit 87285->87323 87287 41d839 87286->87287 87292 41d873 87286->87292 87325 417f8a 46 API calls __getptd_noexit 87287->87325 87290 41d817 87324 417f77 46 API calls __getptd_noexit 87290->87324 87291 41d83e 87326 417f77 46 API calls __getptd_noexit 87291->87326 87295 41ae56 ___lock_fhandle 48 API calls 87292->87295 87297 41d879 87295->87297 87296 41d846 87327 417f25 10 API calls __localtime64_s 87296->87327 87299 41d893 87297->87299 87300 41d887 87297->87300 87328 417f77 46 API calls __getptd_noexit 87299->87328 87308 41d762 87300->87308 87303 41d88d 87329 41d8ba LeaveCriticalSection __unlock_fhandle 87303->87329 87304 41d81f __write 87304->87273 87306->87265 87307->87274 87330 41aded 87308->87330 87310 41d7c8 87343 41ad67 47 API calls __dosmaperr 87310->87343 87312 41d772 87312->87310 87313 41d7a6 87312->87313 87316 41aded __lseeki64_nolock 46 API calls 87312->87316 87313->87310 87314 41aded __lseeki64_nolock 46 API calls 87313->87314 87317 41d7b2 CloseHandle 87314->87317 87315 41d7d0 87318 41d7f2 87315->87318 87344 417f9d 46 API calls __dosmaperr 87315->87344 87319 41d79d 87316->87319 87317->87310 87321 41d7be GetLastError 87317->87321 87318->87303 87320 41aded __lseeki64_nolock 46 API calls 87319->87320 87320->87313 87321->87310 87323->87290 87324->87304 87325->87291 87326->87296 87327->87304 87328->87303 87329->87304 87331 41ae12 87330->87331 87332 41adfa 87330->87332 87334 417f8a __dosmaperr 46 API calls 87331->87334 87337 41ae51 87331->87337 87333 417f8a __dosmaperr 46 API calls 87332->87333 87335 41adff 87333->87335 87336 41ae23 87334->87336 87338 417f77 __dosmaperr 46 API calls 87335->87338 87339 417f77 __dosmaperr 46 API calls 87336->87339 87337->87312 87341 41ae07 87338->87341 87340 41ae2b 87339->87340 87342 417f25 __localtime64_s 10 API calls 87340->87342 87341->87312 87342->87341 87343->87315 87344->87318 87346 414c82 __write 87345->87346 87347 414cc3 87346->87347 87348 414c96 __localtime64_s 87346->87348 87349 414cbb __write 87346->87349 87350 415471 __lock_file 47 API calls 87347->87350 87372 417f77 46 API calls __getptd_noexit 87348->87372 87349->87016 87352 414ccb 87350->87352 87358 414aba 87352->87358 87353 414cb0 87373 417f25 10 API calls __localtime64_s 87353->87373 87362 414ad8 __localtime64_s 87358->87362 87365 414af2 87358->87365 87359 414ae2 87425 417f77 46 API calls __getptd_noexit 87359->87425 87361 414ae7 87426 417f25 10 API calls __localtime64_s 87361->87426 87362->87359 87362->87365 87369 414b2d 87362->87369 87374 414cfa LeaveCriticalSection LeaveCriticalSection _fprintf 87365->87374 87366 414c38 __localtime64_s 87428 417f77 46 API calls __getptd_noexit 87366->87428 87368 414139 __flswbuf 46 API calls 87368->87369 87369->87365 87369->87366 87369->87368 87375 41dfcc 87369->87375 87405 41d8f3 87369->87405 87427 41e0c2 46 API calls 3 library calls 87369->87427 87372->87353 87373->87349 87374->87349 87376 41dfd8 __write 87375->87376 87377 41dfe0 87376->87377 87380 41dffb 87376->87380 87498 417f8a 46 API calls __getptd_noexit 87377->87498 87378 41e007 87500 417f8a 46 API calls __getptd_noexit 87378->87500 87380->87378 87384 41e041 87380->87384 87382 41dfe5 87499 417f77 46 API calls __getptd_noexit 87382->87499 87383 41e00c 87501 417f77 46 API calls __getptd_noexit 87383->87501 87387 41e063 87384->87387 87388 41e04e 87384->87388 87389 41ae56 ___lock_fhandle 48 API calls 87387->87389 87503 417f8a 46 API calls __getptd_noexit 87388->87503 87392 41e069 87389->87392 87390 41e014 87502 417f25 10 API calls __localtime64_s 87390->87502 87394 41e077 87392->87394 87395 41e08b 87392->87395 87393 41e053 87504 417f77 46 API calls __getptd_noexit 87393->87504 87429 41da15 87394->87429 87505 417f77 46 API calls __getptd_noexit 87395->87505 87400 41e083 87507 41e0ba LeaveCriticalSection __unlock_fhandle 87400->87507 87401 41e090 87506 417f8a 46 API calls __getptd_noexit 87401->87506 87404 41dfed __write 87404->87369 87406 41d900 87405->87406 87410 41d915 87405->87410 87511 417f77 46 API calls __getptd_noexit 87406->87511 87408 41d905 87512 417f25 10 API calls __localtime64_s 87408->87512 87411 41d94a 87410->87411 87417 41d910 87410->87417 87508 420603 87410->87508 87413 414139 __flswbuf 46 API calls 87411->87413 87414 41d95e 87413->87414 87415 41dfcc __read 59 API calls 87414->87415 87416 41d965 87415->87416 87416->87417 87418 414139 __flswbuf 46 API calls 87416->87418 87417->87369 87419 41d988 87418->87419 87419->87417 87420 414139 __flswbuf 46 API calls 87419->87420 87421 41d994 87420->87421 87421->87417 87422 414139 __flswbuf 46 API calls 87421->87422 87423 41d9a1 87422->87423 87424 414139 __flswbuf 46 API calls 87423->87424 87424->87417 87425->87361 87426->87365 87427->87369 87428->87361 87430 41da31 87429->87430 87431 41da4c 87429->87431 87432 417f8a __dosmaperr 46 API calls 87430->87432 87433 41da5b 87431->87433 87435 41da7a 87431->87435 87434 41da36 87432->87434 87436 417f8a __dosmaperr 46 API calls 87433->87436 87437 417f77 __dosmaperr 46 API calls 87434->87437 87439 41da98 87435->87439 87451 41daac 87435->87451 87438 41da60 87436->87438 87452 41da3e 87437->87452 87442 417f77 __dosmaperr 46 API calls 87438->87442 87440 417f8a __dosmaperr 46 API calls 87439->87440 87443 41da9d 87440->87443 87441 41db02 87445 417f8a __dosmaperr 46 API calls 87441->87445 87444 41da67 87442->87444 87447 417f77 __dosmaperr 46 API calls 87443->87447 87448 417f25 __localtime64_s 10 API calls 87444->87448 87446 41db07 87445->87446 87449 417f77 __dosmaperr 46 API calls 87446->87449 87450 41daa4 87447->87450 87448->87452 87449->87450 87454 417f25 __localtime64_s 10 API calls 87450->87454 87451->87441 87451->87452 87453 41dae1 87451->87453 87455 41db1b 87451->87455 87452->87400 87453->87441 87458 41daec ReadFile 87453->87458 87454->87452 87457 416b04 __malloc_crt 46 API calls 87455->87457 87459 41db31 87457->87459 87460 41dc17 87458->87460 87461 41df8f GetLastError 87458->87461 87464 41db59 87459->87464 87465 41db3b 87459->87465 87460->87461 87466 41dc2b 87460->87466 87462 41de16 87461->87462 87463 41df9c 87461->87463 87473 417f9d __dosmaperr 46 API calls 87462->87473 87477 41dd9b 87462->87477 87468 417f77 __dosmaperr 46 API calls 87463->87468 87467 420494 __lseeki64_nolock 48 API calls 87464->87467 87469 417f77 __dosmaperr 46 API calls 87465->87469 87466->87477 87479 41de5b 87466->87479 87480 41dc47 87466->87480 87470 41db67 87467->87470 87471 41dfa1 87468->87471 87472 41db40 87469->87472 87470->87458 87474 417f8a __dosmaperr 46 API calls 87471->87474 87475 417f8a __dosmaperr 46 API calls 87472->87475 87473->87477 87474->87477 87475->87452 87476 413748 _free 46 API calls 87476->87452 87477->87452 87477->87476 87478 41ded0 ReadFile 87483 41deef GetLastError 87478->87483 87490 41def9 87478->87490 87479->87477 87479->87478 87481 41dcab ReadFile 87480->87481 87486 41dd28 87480->87486 87482 41dcc9 GetLastError 87481->87482 87489 41dcd3 87481->87489 87482->87480 87482->87489 87483->87479 87483->87490 87484 41ddec MultiByteToWideChar 87484->87477 87485 41de10 GetLastError 87484->87485 87485->87462 87486->87477 87487 41dda3 87486->87487 87488 41dd96 87486->87488 87492 41dd60 87486->87492 87487->87492 87493 41ddda 87487->87493 87491 417f77 __dosmaperr 46 API calls 87488->87491 87489->87480 87494 420494 __lseeki64_nolock 48 API calls 87489->87494 87490->87479 87495 420494 __lseeki64_nolock 48 API calls 87490->87495 87491->87477 87492->87484 87496 420494 __lseeki64_nolock 48 API calls 87493->87496 87494->87489 87495->87490 87497 41dde9 87496->87497 87497->87484 87498->87382 87499->87404 87500->87383 87501->87390 87502->87404 87503->87393 87504->87390 87505->87401 87506->87400 87507->87404 87509 416b04 __malloc_crt 46 API calls 87508->87509 87510 420618 87509->87510 87510->87411 87511->87408 87512->87417 87516 4148b3 GetSystemTimeAsFileTime __aulldiv 87513->87516 87515 442c6b 87515->87019 87516->87515 87517->87027 87518->87032 87519->87032 87524 45272f __tzset_nolock _wcscpy 87520->87524 87521 4528a4 87521->86941 87521->86942 87522 414d04 61 API calls __fread_nolock 87522->87524 87523 44afef GetSystemTimeAsFileTime 87523->87524 87524->87521 87524->87522 87524->87523 87525 4150d1 81 API calls _fseek 87524->87525 87525->87524 87527 44b1bc 87526->87527 87528 44b1ca 87526->87528 87529 4149c2 116 API calls 87527->87529 87530 44b1e1 87528->87530 87531 4149c2 116 API calls 87528->87531 87532 44b1d8 87528->87532 87529->87528 87561 4321a4 87530->87561 87533 44b2db 87531->87533 87532->86969 87533->87530 87535 44b2e9 87533->87535 87537 44b2f6 87535->87537 87540 414a46 __fcloseall 82 API calls 87535->87540 87536 44b224 87538 44b253 87536->87538 87539 44b228 87536->87539 87537->86969 87565 43213d 87538->87565 87542 44b235 87539->87542 87543 414a46 __fcloseall 82 API calls 87539->87543 87540->87537 87544 44b245 87542->87544 87546 414a46 __fcloseall 82 API calls 87542->87546 87543->87542 87544->86969 87545 44b25a 87547 44b260 87545->87547 87548 44b289 87545->87548 87546->87544 87550 44b26d 87547->87550 87552 414a46 __fcloseall 82 API calls 87547->87552 87575 44b0bf 87548->87575 87553 44b27d 87550->87553 87554 414a46 __fcloseall 82 API calls 87550->87554 87551 44b28f 87584 4320f8 87551->87584 87552->87550 87553->86969 87554->87553 87557 44b2a2 87559 44b2b2 87557->87559 87560 414a46 __fcloseall 82 API calls 87557->87560 87558 414a46 __fcloseall 82 API calls 87558->87557 87559->86969 87560->87559 87562 4321cb 87561->87562 87564 4321b4 __tzset_nolock _memmove 87561->87564 87563 414d04 __fread_nolock 61 API calls 87562->87563 87563->87564 87564->87536 87566 4135bb _malloc 46 API calls 87565->87566 87567 432150 87566->87567 87568 4135bb _malloc 46 API calls 87567->87568 87569 432162 87568->87569 87570 4135bb _malloc 46 API calls 87569->87570 87571 432174 87570->87571 87572 4320f8 46 API calls 87571->87572 87573 432189 87571->87573 87574 432198 87572->87574 87573->87545 87574->87545 87576 44b18e 87575->87576 87582 44b0da 87575->87582 87594 43206e 79 API calls 87576->87594 87578 442caf 61 API calls 87578->87582 87579 44b194 87579->87551 87582->87576 87582->87578 87583 44b19d 87582->87583 87592 44b040 61 API calls 87582->87592 87593 442d48 79 API calls 87582->87593 87583->87551 87585 43210f 87584->87585 87586 432109 87584->87586 87588 432122 87585->87588 87590 413748 _free 46 API calls 87585->87590 87587 413748 _free 46 API calls 87586->87587 87587->87585 87589 432135 87588->87589 87591 413748 _free 46 API calls 87588->87591 87589->87557 87589->87558 87590->87588 87591->87589 87592->87582 87593->87582 87594->87579 87595->86871 87596->86874 87597->86892 87598->86892 87599->86892 87600->86883 87601->86892 87602->86892 87603->86896 87604->86905 87605->86907 87606->86907 87656 410160 87607->87656 87609 41012f GetFullPathNameW 87610 410147 moneypunct 87609->87610 87610->86727 87612 4102cb SHGetDesktopFolder 87611->87612 87615 410333 _wcsncpy 87611->87615 87613 4102e0 _wcsncpy 87612->87613 87612->87615 87614 41031c SHGetPathFromIDListW 87613->87614 87613->87615 87614->87615 87615->86730 87617 425f4a 87616->87617 87618 4101bb 87616->87618 87621 4114ab __wcsicoll 58 API calls 87617->87621 87624 425f6e 87617->87624 87619 410160 52 API calls 87618->87619 87620 4101c7 87619->87620 87660 410200 52 API calls 2 library calls 87620->87660 87621->87617 87623 4101d6 87661 410200 52 API calls 2 library calls 87623->87661 87624->86732 87626 4101e9 87626->86732 87628 40f760 128 API calls 87627->87628 87629 40f584 87628->87629 87630 429335 87629->87630 87631 40f58c 87629->87631 87634 4528bd 118 API calls 87630->87634 87632 40f598 87631->87632 87633 429358 87631->87633 87662 4033c0 113 API calls 7 library calls 87632->87662 87663 434034 86 API calls _wprintf 87633->87663 87636 42934b 87634->87636 87640 429373 87636->87640 87641 42934f 87636->87641 87638 429369 87638->87640 87639 40f5b4 87639->86728 87642 4115d7 52 API calls 87640->87642 87643 431e58 82 API calls 87641->87643 87652 4293c5 moneypunct 87642->87652 87643->87633 87644 42959c 87645 413748 _free 46 API calls 87644->87645 87646 4295a5 87645->87646 87647 431e58 82 API calls 87646->87647 87648 4295b1 87647->87648 87652->87644 87653 401b10 52 API calls 87652->87653 87664 444af8 52 API calls _memmove 87652->87664 87665 44c7dd 64 API calls 3 library calls 87652->87665 87666 44b41c 52 API calls 87652->87666 87667 402780 87652->87667 87675 4022d0 52 API calls moneypunct 87652->87675 87653->87652 87657 410167 _wcslen 87656->87657 87658 4115d7 52 API calls 87657->87658 87659 41017e _wcscpy 87658->87659 87659->87609 87660->87623 87661->87626 87662->87639 87663->87638 87664->87652 87665->87652 87666->87652 87668 402827 87667->87668 87674 402790 moneypunct _memmove 87667->87674 87671 4115d7 52 API calls 87668->87671 87669 4115d7 52 API calls 87670 402797 87669->87670 87672 4115d7 52 API calls 87670->87672 87673 4027bd 87670->87673 87671->87674 87672->87673 87673->87652 87674->87669 87675->87652 87677 402417 87676->87677 87681 402539 moneypunct 87676->87681 87678 4115d7 52 API calls 87677->87678 87677->87681 87679 402443 87678->87679 87680 4115d7 52 API calls 87679->87680 87683 4024b4 87680->87683 87681->86736 87683->87681 87705 402880 95 API calls 2 library calls 87683->87705 87706 4022d0 52 API calls moneypunct 87683->87706 87688 401566 87685->87688 87686 401794 87707 40e9a0 90 API calls 87686->87707 87688->87686 87689 40167a 87688->87689 87691 4010a0 52 API calls 87688->87691 87692 4017c0 87689->87692 87708 45e737 90 API calls 3 library calls 87689->87708 87691->87688 87692->86739 87694 40bc70 52 API calls 87693->87694 87703 40d451 87694->87703 87695 40d50f 87711 410600 52 API calls 87695->87711 87697 427c01 87712 45e737 90 API calls 3 library calls 87697->87712 87698 40e0a0 52 API calls 87698->87703 87700 401b10 52 API calls 87700->87703 87701 40d519 87701->86741 87703->87695 87703->87697 87703->87698 87703->87700 87703->87701 87709 40f310 53 API calls 87703->87709 87710 40d860 91 API calls 87703->87710 87705->87683 87706->87683 87707->87689 87708->87692 87709->87703 87710->87703 87711->87701 87712->87701 87713->86754 87714->86755 87716 42c5fe 87715->87716 87731 4091c6 87715->87731 87717 40bc70 52 API calls 87716->87717 87716->87731 87718 42c64e InterlockedIncrement 87717->87718 87719 42c665 87718->87719 87724 42c697 87718->87724 87721 42c672 InterlockedDecrement Sleep InterlockedIncrement 87719->87721 87719->87724 87720 42c737 InterlockedDecrement 87722 42c74a 87720->87722 87721->87719 87721->87724 87725 408f40 VariantClear 87722->87725 87723 42c731 87723->87720 87724->87720 87724->87723 87999 408e80 VariantClear 87724->87999 87727 42c752 87725->87727 88005 410c60 VariantClear moneypunct 87727->88005 87728 42c6cf 88000 45340c 85 API calls 87728->88000 87731->86813 87732 42c6db 87733 402160 52 API calls 87732->87733 87734 42c6e5 87733->87734 88001 45340c 85 API calls 87734->88001 87736 42c6f1 88002 40d200 52 API calls 2 library calls 87736->88002 87738 42c6fb 88003 465124 53 API calls 87738->88003 87740 42c715 87741 42c76a 87740->87741 87742 42c719 87740->87742 87743 401b10 52 API calls 87741->87743 88004 46fe32 VariantClear 87742->88004 87745 42c77e 87743->87745 87746 401980 53 API calls 87745->87746 87752 42c796 87746->87752 87747 42c812 88007 46fe32 VariantClear 87747->88007 87749 42c82a InterlockedDecrement 88008 46ff07 54 API calls 87749->88008 87751 42c864 88009 45e737 90 API calls 3 library calls 87751->88009 87752->87747 87752->87751 88006 40ba10 52 API calls 2 library calls 87752->88006 87753 42c849 87755 42c9ec 87753->87755 87761 408f40 VariantClear 87753->87761 87765 402780 52 API calls 87753->87765 87770 401980 53 API calls 87753->87770 88011 40a780 87753->88011 88052 47d33e 331 API calls 87755->88052 87758 42c9fe 88053 46feb1 VariantClear VariantClear 87758->88053 87760 42c874 87764 408f40 VariantClear 87760->87764 87772 42ca59 87760->87772 87761->87753 87762 42ca08 87763 401b10 52 API calls 87762->87763 87766 42ca15 87763->87766 87767 42c891 87764->87767 87765->87753 87768 40c2c0 52 API calls 87766->87768 88010 410c60 VariantClear moneypunct 87767->88010 87768->87760 87770->87753 87772->87772 87774 40afc4 87773->87774 87775 40b156 87773->87775 87776 40afd5 87774->87776 87777 42d1e3 87774->87777 88063 45e737 90 API calls 3 library calls 87775->88063 87780 40a780 194 API calls 87776->87780 87797 40b11a moneypunct 87776->87797 88064 45e737 90 API calls 3 library calls 87777->88064 87783 40b00a 87780->87783 87781 42d1f8 87786 408f40 VariantClear 87781->87786 87782 40b143 87782->86813 87783->87781 87787 40b012 87783->87787 87785 42d4db 87785->87785 87786->87782 87788 40b04a 87787->87788 87789 40b094 moneypunct 87787->87789 87790 42d231 VariantClear 87787->87790 87796 40b05c moneypunct 87788->87796 88065 40e270 VariantClear moneypunct 87788->88065 87791 40b108 87789->87791 87793 42d425 moneypunct 87789->87793 87790->87796 87791->87797 88066 40e270 VariantClear moneypunct 87791->88066 87792 42d45a VariantClear 87792->87797 87793->87792 87793->87797 87796->87789 87798 4115d7 52 API calls 87796->87798 87797->87782 88067 45e737 90 API calls 3 library calls 87797->88067 87798->87789 87800 4096c6 _wcslen 87799->87800 87801 4115d7 52 API calls 87800->87801 87862 40a70c moneypunct _memmove 87800->87862 87802 4096fa _memmove 87801->87802 87804 4115d7 52 API calls 87802->87804 87803 4013a0 52 API calls 87805 4297aa 87803->87805 87806 40971b 87804->87806 87807 4115d7 52 API calls 87805->87807 87808 409749 CharUpperBuffW 87806->87808 87810 40976a moneypunct 87806->87810 87806->87862 87850 4297d1 _memmove 87807->87850 87808->87810 87858 4097e5 moneypunct 87810->87858 88069 47dcbb 196 API calls 87810->88069 87812 408f40 VariantClear 87813 42ae92 87812->87813 88098 410c60 VariantClear moneypunct 87813->88098 87815 42aea4 87816 409aa2 87818 4115d7 52 API calls 87816->87818 87822 409afe 87816->87822 87816->87850 87817 40a689 87819 4115d7 52 API calls 87817->87819 87818->87822 87835 40a6af moneypunct _memmove 87819->87835 87820 40c2c0 52 API calls 87820->87858 87821 409b2a 87825 429dbe 87821->87825 87868 409b4d moneypunct _memmove 87821->87868 88077 40b400 VariantClear VariantClear moneypunct 87821->88077 87822->87821 87823 4115d7 52 API calls 87822->87823 87824 429d31 87823->87824 87826 429d42 87824->87826 88074 44a801 52 API calls 87824->88074 87828 429dd3 87825->87828 88078 40b400 VariantClear VariantClear moneypunct 87825->88078 87840 40e0a0 52 API calls 87826->87840 87828->87868 88079 40e1c0 VariantClear moneypunct 87828->88079 87829 429a46 VariantClear 87829->87858 87831 40a045 87837 4115d7 52 API calls 87831->87837 87832 42a3f5 88083 47390f VariantClear 87832->88083 87833 408f40 VariantClear 87833->87858 87842 4115d7 52 API calls 87835->87842 87843 40a04c 87837->87843 87839 4115d7 52 API calls 87839->87858 87844 429d57 87840->87844 87842->87862 87848 40a0a7 87843->87848 87852 4091e0 317 API calls 87843->87852 88075 453443 52 API calls 87844->88075 87846 42a42f 88084 45e737 90 API calls 3 library calls 87846->88084 87869 40a0af 87848->87869 88085 40c790 VariantClear moneypunct 87848->88085 87849 4299d9 87853 408f40 VariantClear 87849->87853 88097 45e737 90 API calls 3 library calls 87850->88097 87852->87848 87857 4299e2 87853->87857 87854 429abd 87854->86813 87855 429d88 88076 453443 52 API calls 87855->88076 88071 410c60 VariantClear moneypunct 87857->88071 87858->87816 87858->87817 87858->87820 87858->87829 87858->87833 87858->87835 87858->87839 87858->87849 87858->87850 87858->87854 87864 40a780 194 API calls 87858->87864 87865 42a452 87858->87865 88070 40c4e0 194 API calls 87858->88070 88072 40ba10 52 API calls 2 library calls 87858->88072 88073 40e270 VariantClear moneypunct 87858->88073 87862->87803 87864->87858 87865->87812 87866 44a801 52 API calls 87866->87868 87868->87832 87868->87846 87868->87862 87868->87866 87872 402780 52 API calls 87868->87872 87875 40a780 194 API calls 87868->87875 87878 401980 53 API calls 87868->87878 87884 41130a 51 API calls __cinit 87868->87884 87885 4115d7 52 API calls 87868->87885 87888 409fd2 87868->87888 87891 409c95 87868->87891 88080 45f508 52 API calls 87868->88080 88081 403e10 53 API calls 87868->88081 88082 408e80 VariantClear 87868->88082 87873 40a11b 87869->87873 87874 42a4b4 VariantClear 87869->87874 87901 40a162 moneypunct _memmove 87869->87901 87870 40a650 moneypunct 87870->86813 87871 408f40 VariantClear 87871->87901 87872->87868 87880 40a12d moneypunct 87873->87880 88086 40e270 VariantClear moneypunct 87873->88086 87874->87880 87875->87868 87878->87868 87879 4115d7 52 API calls 87879->87901 87880->87879 87880->87901 87883 42a74d VariantClear 87883->87901 87884->87868 87885->87868 87886 40a368 87887 42aad4 87886->87887 87895 40a397 87886->87895 88090 46fe90 VariantClear VariantClear moneypunct 87887->88090 87888->87831 87888->87832 87889 42a886 VariantClear 87889->87901 87890 42a7e4 VariantClear 87890->87901 87891->86813 87892 40a3ce 87905 40a3d9 moneypunct 87892->87905 88091 40b400 VariantClear VariantClear moneypunct 87892->88091 87894 40e270 VariantClear 87894->87901 87895->87892 87920 40a42c moneypunct 87895->87920 88068 40b400 VariantClear VariantClear moneypunct 87895->88068 87898 4115d7 52 API calls 87898->87901 87899 42abaf 87903 42abd4 VariantClear 87899->87903 87911 40a4ee moneypunct 87899->87911 87900 4115d7 52 API calls 87904 42a5a6 VariantInit VariantCopy 87900->87904 87901->87871 87901->87883 87901->87886 87901->87887 87901->87889 87901->87890 87901->87894 87901->87898 87901->87900 88087 470870 52 API calls 87901->88087 88088 408e80 VariantClear 87901->88088 88089 44ccf1 VariantClear moneypunct 87901->88089 87902 40a4dc 87902->87911 88093 40e270 VariantClear moneypunct 87902->88093 87903->87911 87904->87901 87907 42a5c6 VariantClear 87904->87907 87906 40a41a 87905->87906 87913 42ab44 VariantClear 87905->87913 87905->87920 87906->87920 88092 40e270 VariantClear moneypunct 87906->88092 87907->87901 87908 42ac4f 87914 42ac79 VariantClear 87908->87914 87918 40a546 moneypunct 87908->87918 87911->87908 87912 40a534 87911->87912 87912->87918 88094 40e270 VariantClear moneypunct 87912->88094 87913->87920 87914->87918 87915 42ad28 87921 42ad4e VariantClear 87915->87921 87925 40a583 moneypunct 87915->87925 87918->87915 87919 40a571 87918->87919 87919->87925 88095 40e270 VariantClear moneypunct 87919->88095 87920->87899 87920->87902 87921->87925 87923 42ae0e VariantClear 87923->87925 87925->87870 87925->87923 88096 40e270 VariantClear moneypunct 87925->88096 87927 408fff 87926->87927 87940 40900d 87926->87940 88099 403ea0 52 API calls __cinit 87927->88099 87930 42c3f6 88103 45e737 90 API calls 3 library calls 87930->88103 87932 40a780 194 API calls 87932->87940 87933 4090f2 moneypunct 87933->86813 87934 42c44a 88105 45e737 90 API calls 3 library calls 87934->88105 87935 42c47b 88106 451b42 61 API calls 87935->88106 87938 42c564 87944 408f40 VariantClear 87938->87944 87940->87930 87940->87932 87940->87933 87940->87934 87940->87935 87940->87938 87941 42c4cb 87940->87941 87943 42c548 87940->87943 87947 409112 87940->87947 87949 4090df 87940->87949 87951 42c528 87940->87951 87953 4090ea 87940->87953 88102 4534e3 52 API calls 87940->88102 88104 40c4e0 194 API calls 87940->88104 88108 47faae 233 API calls 87941->88108 88111 45e737 90 API calls 3 library calls 87943->88111 87944->87933 87945 42c491 87945->87933 88107 45e737 90 API calls 3 library calls 87945->88107 87946 42c4da 87946->87933 88109 45e737 90 API calls 3 library calls 87946->88109 87947->87943 87956 40912b 87947->87956 87949->87953 88100 408e80 VariantClear 87949->88100 88110 45e737 90 API calls 3 library calls 87951->88110 87957 408f40 VariantClear 87953->87957 87956->87933 88101 403e10 53 API calls 87956->88101 87957->87933 87959 40914b 87960 408f40 VariantClear 87959->87960 87960->87933 88112 408d90 87961->88112 87963 429778 88139 410c60 VariantClear moneypunct 87963->88139 87965 429780 87966 408cf9 87966->87963 87967 42976c 87966->87967 87969 408d2d 87966->87969 88138 45e737 90 API calls 3 library calls 87967->88138 88128 403d10 87969->88128 87972 408d71 moneypunct 87972->86813 87973 408d45 moneypunct 87973->87972 87974 408f40 VariantClear 87973->87974 87974->87973 87975->86813 87976->86813 87977->86813 87978->86765 87979->86769 87980->86813 87981->86813 87982->86813 87983->86813 87984->86822 87985->86822 87986->86822 87987->86822 87988->86822 87989->86822 87990->86822 87992 403cdf 87991->87992 87993 408f40 VariantClear 87992->87993 87994 403ce7 87993->87994 87994->86808 87995->86822 87996->86822 87997->86813 87998->86762 87999->87728 88000->87732 88001->87736 88002->87738 88003->87740 88004->87723 88005->87731 88006->87752 88007->87749 88008->87753 88009->87760 88010->87731 88012 40a7a6 88011->88012 88013 40ae8c 88011->88013 88015 4115d7 52 API calls 88012->88015 88054 41130a 51 API calls __cinit 88013->88054 88049 40a7c6 moneypunct _memmove 88015->88049 88016 40a86d 88024 40abd1 88016->88024 88028 40a878 moneypunct 88016->88028 88017 401b10 52 API calls 88017->88049 88019 408e80 VariantClear 88019->88049 88020 42b791 VariantClear 88020->88049 88021 40a884 moneypunct 88021->87753 88022 42ba2d VariantClear 88022->88049 88023 408f40 VariantClear 88023->88028 88059 45e737 90 API calls 3 library calls 88024->88059 88025 40e270 VariantClear 88025->88049 88026 42b459 VariantClear 88026->88049 88027 42b6f6 VariantClear 88027->88049 88028->88021 88028->88023 88029 40bc10 53 API calls 88029->88049 88030 408cc0 187 API calls 88030->88049 88032 42bc5b 88032->87753 88033 42bbf5 88060 45e737 90 API calls 3 library calls 88033->88060 88034 42bb6a 88062 44b92d VariantClear 88034->88062 88035 4115d7 52 API calls 88035->88049 88036 4115d7 52 API calls 88040 42b5b3 VariantInit VariantCopy 88036->88040 88037 40b5f0 89 API calls 88037->88049 88039 408f40 VariantClear 88039->88049 88042 42b5d7 VariantClear 88040->88042 88040->88049 88042->88049 88045 42bc37 88061 45e737 90 API calls 3 library calls 88045->88061 88048 42bc48 88048->88034 88050 408f40 VariantClear 88048->88050 88049->88016 88049->88017 88049->88019 88049->88020 88049->88022 88049->88024 88049->88025 88049->88026 88049->88027 88049->88029 88049->88030 88049->88033 88049->88034 88049->88035 88049->88036 88049->88037 88049->88039 88049->88045 88051 4530c9 VariantClear 88049->88051 88055 45308a 53 API calls 88049->88055 88056 470870 52 API calls 88049->88056 88057 457f66 87 API calls __write_nolock 88049->88057 88058 472f47 127 API calls 88049->88058 88050->88034 88051->88049 88052->87758 88053->87762 88054->88049 88055->88049 88056->88049 88057->88049 88058->88049 88059->88034 88060->88034 88061->88048 88062->88032 88063->87777 88064->87781 88065->87796 88066->87797 88067->87785 88068->87892 88069->87810 88070->87858 88071->87870 88072->87858 88073->87858 88074->87826 88075->87855 88076->87821 88077->87825 88078->87828 88079->87868 88080->87868 88081->87868 88082->87868 88083->87846 88084->87865 88085->87848 88086->87880 88087->87901 88088->87901 88089->87901 88090->87892 88091->87905 88092->87920 88093->87911 88094->87918 88095->87925 88096->87925 88097->87865 88098->87815 88099->87940 88100->87953 88101->87959 88102->87940 88103->87933 88104->87940 88105->87933 88106->87945 88107->87933 88108->87946 88109->87933 88110->87933 88111->87938 88113 4289d2 88112->88113 88114 408db3 88112->88114 88142 45e737 90 API calls 3 library calls 88113->88142 88140 40bec0 90 API calls 88114->88140 88117 4289e5 88143 45e737 90 API calls 3 library calls 88117->88143 88118 408dc9 88118->88117 88120 428a05 88118->88120 88123 40a780 194 API calls 88118->88123 88124 408e64 88118->88124 88126 408f40 VariantClear 88118->88126 88127 408e5a 88118->88127 88141 40ba10 52 API calls 2 library calls 88118->88141 88122 408f40 VariantClear 88120->88122 88122->88127 88123->88118 88125 408f40 VariantClear 88124->88125 88125->88127 88126->88118 88127->87966 88129 408f40 VariantClear 88128->88129 88130 403d20 88129->88130 88131 403cd0 VariantClear 88130->88131 88132 403d4d 88131->88132 88144 46e91c 88132->88144 88147 467897 88132->88147 88191 45e17d 88132->88191 88201 4755ad 88132->88201 88133 403d76 88133->87963 88133->87973 88138->87963 88139->87965 88140->88118 88141->88118 88142->88117 88143->88120 88204 46e785 88144->88204 88146 46e92f 88146->88133 88148 4678bb 88147->88148 88180 467954 88148->88180 88308 45340c 85 API calls 88148->88308 88149 4115d7 52 API calls 88150 467989 88149->88150 88152 467995 88150->88152 88312 40da60 53 API calls 88150->88312 88156 4533eb 85 API calls 88152->88156 88153 4678f6 88155 413a0e __wsplitpath 46 API calls 88153->88155 88157 4678fc 88155->88157 88158 4679b7 88156->88158 88159 401b10 52 API calls 88157->88159 88160 40de40 60 API calls 88158->88160 88161 46790c 88159->88161 88163 4679c3 88160->88163 88309 40d200 52 API calls 2 library calls 88161->88309 88164 4679c7 GetLastError 88163->88164 88165 467a05 88163->88165 88167 403cd0 VariantClear 88164->88167 88170 467a2c 88165->88170 88171 467a4b 88165->88171 88166 467917 88166->88180 88310 4339fa GetFileAttributesW FindFirstFileW FindClose 88166->88310 88168 4679dc 88167->88168 88172 4679e6 88168->88172 88176 44ae3e CloseHandle 88168->88176 88175 4115d7 52 API calls 88170->88175 88173 4115d7 52 API calls 88171->88173 88179 408f40 VariantClear 88172->88179 88177 467a49 88173->88177 88174 467928 88178 46792f 88174->88178 88174->88180 88182 467a31 88175->88182 88176->88172 88186 408f40 VariantClear 88177->88186 88311 4335cd 56 API calls 3 library calls 88178->88311 88185 4679ed 88179->88185 88180->88149 88181 467964 88180->88181 88181->88133 88313 436299 52 API calls 2 library calls 88182->88313 88185->88133 88188 467a88 88186->88188 88187 467939 88187->88180 88189 408f40 VariantClear 88187->88189 88188->88133 88190 467947 88189->88190 88190->88180 88192 45e198 88191->88192 88193 45e19c 88192->88193 88194 45e1b8 88192->88194 88197 408f40 VariantClear 88193->88197 88195 45e1cc 88194->88195 88196 45e1db FindClose 88194->88196 88199 45e1d9 moneypunct 88195->88199 88200 44ae3e CloseHandle 88195->88200 88196->88199 88198 45e1a4 88197->88198 88198->88133 88199->88133 88200->88199 88314 475077 88201->88314 88203 4755c0 88203->88133 88205 46e7a2 88204->88205 88206 4115d7 52 API calls 88205->88206 88208 46e802 88205->88208 88207 46e7ad 88206->88207 88210 46e7b9 88207->88210 88252 40da60 53 API calls 88207->88252 88209 46e7e5 88208->88209 88217 46e82f 88208->88217 88212 408f40 VariantClear 88209->88212 88253 4533eb 88210->88253 88214 46e7ea 88212->88214 88214->88146 88216 46e8b5 88245 4680ed 88216->88245 88217->88216 88219 46e845 88217->88219 88223 4533eb 85 API calls 88219->88223 88222 46e8bb 88249 443fbe 88222->88249 88233 46e84b 88223->88233 88224 46e7db 88224->88209 88269 44ae3e 88224->88269 88225 46e87a 88272 4689f4 59 API calls 88225->88272 88229 46e883 88232 4013c0 52 API calls 88229->88232 88230 46e881 88239 46e911 88230->88239 88275 40da20 88230->88275 88234 46e88f 88232->88234 88233->88225 88233->88229 88236 40e0a0 52 API calls 88234->88236 88235 408f40 VariantClear 88235->88230 88237 46e899 88236->88237 88273 40d200 52 API calls 2 library calls 88237->88273 88239->88146 88240 46e8a5 88274 4689f4 59 API calls 88240->88274 88243 46e903 88244 44ae3e CloseHandle 88243->88244 88244->88239 88246 468100 88245->88246 88247 4680fa 88245->88247 88246->88222 88279 467ac4 55 API calls 2 library calls 88247->88279 88280 443e36 88249->88280 88251 443fd3 88251->88230 88251->88235 88252->88210 88254 453404 88253->88254 88255 4533f8 88253->88255 88257 40de40 88254->88257 88255->88254 88287 4531b1 85 API calls 5 library calls 88255->88287 88258 40da20 CloseHandle 88257->88258 88259 40de4e 88258->88259 88288 40f110 88259->88288 88262 4264fa 88264 40de84 88297 40e080 SetFilePointerEx SetFilePointerEx 88264->88297 88266 40de8b 88298 40f160 SetFilePointerEx SetFilePointerEx WriteFile 88266->88298 88268 40de90 88268->88217 88268->88224 88270 44ae4b moneypunct 88269->88270 88300 443fdf 88269->88300 88270->88209 88272->88230 88273->88240 88274->88230 88276 40da37 88275->88276 88277 40da29 88275->88277 88276->88277 88278 40da3c CloseHandle 88276->88278 88277->88243 88278->88243 88279->88246 88283 443e19 88280->88283 88284 443e26 88283->88284 88285 443e32 WriteFile 88283->88285 88286 443db4 SetFilePointerEx SetFilePointerEx 88284->88286 88285->88251 88286->88285 88287->88254 88289 40f125 CreateFileW 88288->88289 88290 42630c 88288->88290 88292 40de74 88289->88292 88291 426311 CreateFileW 88290->88291 88290->88292 88291->88292 88293 426337 88291->88293 88292->88262 88296 40dea0 55 API calls moneypunct 88292->88296 88299 40df90 SetFilePointerEx SetFilePointerEx 88293->88299 88295 426342 88295->88292 88296->88264 88297->88266 88298->88268 88299->88295 88301 40da20 CloseHandle 88300->88301 88302 443feb 88301->88302 88305 4340db 88302->88305 88304 444001 88304->88270 88306 40da20 CloseHandle 88305->88306 88307 4340e7 moneypunct 88306->88307 88307->88304 88308->88153 88309->88166 88310->88174 88311->88187 88312->88152 88313->88177 88315 4533eb 85 API calls 88314->88315 88316 4750b8 88315->88316 88317 4750ee 88316->88317 88318 475129 88316->88318 88320 408f40 VariantClear 88317->88320 88367 4646e0 88318->88367 88324 4750f5 88320->88324 88321 47515e 88322 475162 88321->88322 88330 47518e 88321->88330 88323 408f40 VariantClear 88322->88323 88343 475169 88323->88343 88324->88203 88325 475365 88401 44b3ac 57 API calls 88325->88401 88326 4754ea 88408 464812 92 API calls 88326->88408 88333 4533eb 85 API calls 88330->88333 88342 475480 88330->88342 88352 475357 88330->88352 88354 4754b5 88330->88354 88399 436299 52 API calls 2 library calls 88330->88399 88400 463ad5 64 API calls __wcsicoll 88330->88400 88331 4754fc 88332 475374 88331->88332 88334 475508 88331->88334 88380 430d31 88332->88380 88333->88330 88335 408f40 VariantClear 88334->88335 88339 47550f 88335->88339 88337 475388 88387 4577e9 88337->88387 88339->88343 88341 47539e 88395 410cfc 88341->88395 88345 408f40 VariantClear 88342->88345 88343->88203 88345->88343 88347 4753d4 88403 40e830 53 API calls 88347->88403 88348 4753b8 88402 45e737 90 API calls 3 library calls 88348->88402 88351 4753c5 GetCurrentProcess TerminateProcess 88351->88347 88352->88325 88352->88326 88353 4753e3 88365 475406 88353->88365 88404 40cf00 53 API calls 88353->88404 88355 408f40 VariantClear 88354->88355 88355->88343 88356 475556 88356->88343 88358 4753f8 88365->88356 88366 408f40 VariantClear 88365->88366 88406 40cf00 53 API calls 88365->88406 88366->88365 88411 4536f7 53 API calls 88367->88411 88369 4646fc 88412 4426cd 59 API calls _wcslen 88369->88412 88371 464711 88373 40bc70 52 API calls 88371->88373 88379 46474b 88371->88379 88374 46472c 88373->88374 88413 461465 52 API calls _memmove 88374->88413 88376 464741 88377 40c600 52 API calls 88376->88377 88377->88379 88378 464793 88378->88321 88379->88378 88414 463ad5 64 API calls __wcsicoll 88379->88414 88381 430db2 88380->88381 88382 430d54 88380->88382 88381->88337 88383 4115d7 52 API calls 88382->88383 88384 430d74 88383->88384 88385 430da9 88384->88385 88386 4115d7 52 API calls 88384->88386 88385->88337 88386->88384 88388 457a84 88387->88388 88394 45780c _strcat moneypunct _wcslen _wcscpy 88387->88394 88388->88341 88389 45340c 85 API calls 88389->88394 88390 443006 57 API calls 88390->88394 88392 4135bb 46 API calls _malloc 88392->88394 88393 40f6f0 54 API calls 88393->88394 88394->88388 88394->88389 88394->88390 88394->88392 88394->88393 88415 44b3ac 57 API calls 88394->88415 88396 410d11 88395->88396 88397 410da9 VirtualProtect 88396->88397 88398 410d77 88396->88398 88397->88398 88398->88347 88398->88348 88399->88330 88400->88330 88401->88332 88402->88351 88403->88353 88404->88358 88406->88365 88408->88331 88411->88369 88412->88371 88413->88376 88414->88378 88415->88394 88416 40e69ab 88417 40e69b2 88416->88417 88418 40e69ba 88417->88418 88419 40e6a50 88417->88419 88423 40e6660 88418->88423 88436 40e7300 9 API calls 88419->88436 88422 40e6a37 88437 40e4050 88423->88437 88426 40e6730 CreateFileW 88427 40e66ff 88426->88427 88429 40e673d 88426->88429 88428 40e6759 VirtualAlloc 88427->88428 88427->88429 88434 40e6860 CloseHandle 88427->88434 88435 40e6870 VirtualFree 88427->88435 88440 40e7570 GetPEB 88427->88440 88428->88429 88430 40e677a ReadFile 88428->88430 88431 40e694c VirtualFree 88429->88431 88432 40e695a 88429->88432 88430->88429 88433 40e6798 VirtualAlloc 88430->88433 88431->88432 88432->88422 88433->88427 88433->88429 88434->88427 88435->88427 88436->88422 88439 40e46db 88437->88439 88442 40e7510 GetPEB 88437->88442 88439->88427 88441 40e759a 88440->88441 88441->88426 88442->88439 88443 42d154 88447 480a8d 88443->88447 88445 42d161 88446 480a8d 194 API calls 88445->88446 88446->88445 88448 480ae4 88447->88448 88449 480b26 88447->88449 88451 480aeb 88448->88451 88452 480b15 88448->88452 88450 40bc70 52 API calls 88449->88450 88470 480b2e 88450->88470 88454 480aee 88451->88454 88455 480b04 88451->88455 88480 4805bf 194 API calls 88452->88480 88454->88449 88456 480af3 88454->88456 88479 47fea2 194 API calls __itow_s 88455->88479 88478 47f135 194 API calls 88456->88478 88458 40e0a0 52 API calls 88458->88470 88461 408f40 VariantClear 88463 481156 88461->88463 88462 480aff 88462->88461 88465 408f40 VariantClear 88463->88465 88464 40c2c0 52 API calls 88464->88470 88466 48115e 88465->88466 88466->88445 88467 401980 53 API calls 88467->88470 88469 40e710 53 API calls 88469->88470 88470->88458 88470->88462 88470->88464 88470->88467 88470->88469 88471 408e80 VariantClear 88470->88471 88472 40a780 194 API calls 88470->88472 88473 480ff5 88470->88473 88481 45377f 52 API calls 88470->88481 88482 45e951 53 API calls 88470->88482 88483 40e830 53 API calls 88470->88483 88484 47925f 53 API calls 88470->88484 88485 47fcff 194 API calls 88470->88485 88471->88470 88472->88470 88486 45e737 90 API calls 3 library calls 88473->88486 88478->88462 88479->88462 88480->88462 88481->88470 88482->88470 88483->88470 88484->88470 88485->88470 88486->88462 88487 425b2b 88492 40f000 88487->88492 88491 425b3a 88493 4115d7 52 API calls 88492->88493 88494 40f007 88493->88494 88495 4276ea 88494->88495 88501 40f030 88494->88501 88500 41130a 51 API calls __cinit 88500->88491 88502 40f039 88501->88502 88503 40f01a 88501->88503 88531 41130a 51 API calls __cinit 88502->88531 88505 40e500 88503->88505 88506 40bc70 52 API calls 88505->88506 88507 40e515 GetVersionExW 88506->88507 88508 402160 52 API calls 88507->88508 88509 40e557 88508->88509 88532 40e660 88509->88532 88515 427674 88519 4276c6 GetSystemInfo 88515->88519 88517 40e5e0 88520 4276d5 GetSystemInfo 88517->88520 88546 40efd0 88517->88546 88518 40e5cd GetCurrentProcess 88553 40ef20 LoadLibraryA GetProcAddress 88518->88553 88519->88520 88524 40e629 88550 40ef90 88524->88550 88527 40e641 FreeLibrary 88528 40e644 88527->88528 88529 40e653 FreeLibrary 88528->88529 88530 40e656 88528->88530 88529->88530 88530->88500 88531->88503 88533 40e667 88532->88533 88534 42761d 88533->88534 88535 40c600 52 API calls 88533->88535 88536 40e55c 88535->88536 88537 40e680 88536->88537 88538 40e687 88537->88538 88539 427616 88538->88539 88540 40c600 52 API calls 88538->88540 88541 40e566 88540->88541 88541->88515 88542 40ef60 88541->88542 88543 40e5c8 88542->88543 88544 40ef66 LoadLibraryA 88542->88544 88543->88517 88543->88518 88544->88543 88545 40ef77 GetProcAddress 88544->88545 88545->88543 88547 40e620 88546->88547 88548 40efd6 LoadLibraryA 88546->88548 88547->88519 88547->88524 88548->88547 88549 40efe7 GetProcAddress 88548->88549 88549->88547 88554 40efb0 LoadLibraryA GetProcAddress 88550->88554 88552 40e632 GetNativeSystemInfo 88552->88527 88552->88528 88553->88517 88554->88552 88555 425b5e 88560 40c7f0 88555->88560 88559 425b6d 88595 40db10 52 API calls 88560->88595 88562 40c82a 88596 410ab0 6 API calls 88562->88596 88564 40c86d 88565 40bc70 52 API calls 88564->88565 88566 40c877 88565->88566 88567 40bc70 52 API calls 88566->88567 88568 40c881 88567->88568 88569 40bc70 52 API calls 88568->88569 88570 40c88b 88569->88570 88571 40bc70 52 API calls 88570->88571 88572 40c8d1 88571->88572 88573 40bc70 52 API calls 88572->88573 88574 40c991 88573->88574 88597 40d2c0 52 API calls 88574->88597 88576 40c99b 88598 40d0d0 53 API calls 88576->88598 88578 40c9c1 88579 40bc70 52 API calls 88578->88579 88580 40c9cb 88579->88580 88599 40e310 53 API calls 88580->88599 88582 40ca28 88583 408f40 VariantClear 88582->88583 88584 40ca30 88583->88584 88585 408f40 VariantClear 88584->88585 88586 40ca38 GetStdHandle 88585->88586 88587 429630 88586->88587 88588 40ca87 88586->88588 88587->88588 88589 429639 88587->88589 88594 41130a 51 API calls __cinit 88588->88594 88600 4432c0 57 API calls 88589->88600 88591 429641 88601 44b6ab CreateThread 88591->88601 88593 42964f CloseHandle 88593->88588 88594->88559 88595->88562 88596->88564 88597->88576 88598->88578 88599->88582 88600->88591 88601->88593 88602 44b5cb 58 API calls 88601->88602 88603 425b6f 88608 40dc90 88603->88608 88607 425b7e 88609 40bc70 52 API calls 88608->88609 88610 40dd03 88609->88610 88617 40f210 88610->88617 88612 426a97 88614 40dd96 88614->88612 88615 40ddb7 88614->88615 88620 40dc00 52 API calls 2 library calls 88614->88620 88616 41130a 51 API calls __cinit 88615->88616 88616->88607 88621 40f250 RegOpenKeyExW 88617->88621 88619 40f230 88619->88614 88620->88614 88622 425e17 88621->88622 88623 40f275 RegQueryValueExW 88621->88623 88622->88619 88624 40f2c3 RegCloseKey 88623->88624 88625 40f298 88623->88625 88624->88619 88626 40f2a9 RegCloseKey 88625->88626 88627 425e1d 88625->88627 88626->88619 88628 40e6400 88629 40e4050 GetPEB 88628->88629 88630 40e64e1 88629->88630 88642 40e62f0 88630->88642 88643 40e62f9 Sleep 88642->88643 88644 40e6307 88643->88644
                                                              APIs
                                                              • _wcslen.LIBCMT ref: 004096C1
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • _memmove.LIBCMT ref: 0040970C
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                                              • _memmove.LIBCMT ref: 00409D96
                                                              • _memmove.LIBCMT ref: 0040A6C4
                                                              • _memmove.LIBCMT ref: 004297E5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                                              • String ID:
                                                              • API String ID: 2383988440-0
                                                              • Opcode ID: 876d4408dddb13418f9c329c0810e903cd78253e60d2b892afa1379f56ecdd34
                                                              • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                                              • Opcode Fuzzy Hash: 876d4408dddb13418f9c329c0810e903cd78253e60d2b892afa1379f56ecdd34
                                                              • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                                                • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\copto de pago.exe,00000104,?), ref: 00401F4C
                                                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                                                • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                                                • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                                              • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                                              • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\copto de pago.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                                                • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                                              • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                                              • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                                              • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                                                • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                                • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                                • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                                                • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                                • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                                • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                                • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                                                • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                                • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                                • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                                                • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                                                • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                                              • String ID: C:\Users\user\Desktop\copto de pago.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                              • API String ID: 2495805114-2275796776
                                                              • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                              • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                                              • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                                              • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1920 427693-427696 1915->1920 1921 427688-427691 1915->1921 1919 4276b4-4276be 1916->1919 1922 427625-427629 1917->1922 1923 40e59c-40e59f 1917->1923 1935 40e5ec-40e60c 1918->1935 1936 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1936 1937 4276c6-4276ca GetSystemInfo 1919->1937 1920->1919 1927 427698-4276a8 1920->1927 1921->1919 1929 427636-427640 1922->1929 1930 42762b-427631 1922->1930 1925 40e5a5-40e5ae 1923->1925 1926 427654-427657 1923->1926 1931 40e5b4 1925->1931 1932 427645-42764f 1925->1932 1926->1918 1938 42765d-42766f 1926->1938 1933 4276b0 1927->1933 1934 4276aa-4276ae 1927->1934 1929->1918 1930->1918 1931->1918 1932->1918 1933->1919 1934->1919 1939 40e612-40e623 call 40efd0 1935->1939 1940 4276d5-4276df GetSystemInfo 1935->1940 1936->1935 1948 40e5e8 1936->1948 1937->1940 1938->1918 1939->1937 1945 40e629-40e63f call 40ef90 GetNativeSystemInfo 1939->1945 1950 40e641-40e642 FreeLibrary 1945->1950 1951 40e644-40e651 1945->1951 1948->1935 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                                                              APIs
                                                              • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                              • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                                              • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                                              • FreeLibrary.KERNEL32(?), ref: 0040E642
                                                              • FreeLibrary.KERNEL32(?), ref: 0040E654
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                                              • String ID: 0SH
                                                              • API String ID: 3363477735-851180471
                                                              • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                              • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                                              • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                                              • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                                              APIs
                                                              • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                                              • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: IsThemeActive$uxtheme.dll
                                                              • API String ID: 2574300362-3542929980
                                                              • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                              • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                                              • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                                              • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                                              APIs
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                                              • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                                              • TranslateMessage.USER32(?), ref: 00409556
                                                              • DispatchMessageW.USER32(?), ref: 00409561
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Message$Peek$DispatchSleepTranslate
                                                              • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                                              • API String ID: 1762048999-758534266
                                                              • Opcode ID: 230208aa29ab6d04e6d17a77ab66c18202fa9fbe0bb8c521ee9ec5454df47b9a
                                                              • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                                              • Opcode Fuzzy Hash: 230208aa29ab6d04e6d17a77ab66c18202fa9fbe0bb8c521ee9ec5454df47b9a
                                                              • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                                              Control-flow Graph

                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\copto de pago.exe,00000104,?), ref: 00401F4C
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • __wcsicoll.LIBCMT ref: 00402007
                                                              • __wcsicoll.LIBCMT ref: 0040201D
                                                              • __wcsicoll.LIBCMT ref: 00402033
                                                                • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                                              • __wcsicoll.LIBCMT ref: 00402049
                                                              • _wcscpy.LIBCMT ref: 0040207C
                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\copto de pago.exe,00000104), ref: 00428B5B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\copto de pago.exe$CMDLINE$CMDLINERAW
                                                              • API String ID: 3948761352-3465321191
                                                              • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                                              • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                                              • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                                                              • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __fread_nolock$_fseek_wcscpy
                                                              • String ID: D)E$D)E$FILE
                                                              • API String ID: 3888824918-361185794
                                                              • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                              • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                                              • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                                              • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                                              • __wsplitpath.LIBCMT ref: 0040E41C
                                                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                              • _wcsncat.LIBCMT ref: 0040E433
                                                              • __wmakepath.LIBCMT ref: 0040E44F
                                                                • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                              • _wcscpy.LIBCMT ref: 0040E487
                                                                • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                              • _wcscat.LIBCMT ref: 00427541
                                                              • _wcslen.LIBCMT ref: 00427551
                                                              • _wcslen.LIBCMT ref: 00427562
                                                              • _wcscat.LIBCMT ref: 0042757C
                                                              • _wcsncpy.LIBCMT ref: 004275BC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                                              • String ID: Include$\
                                                              • API String ID: 3173733714-3429789819
                                                              • Opcode ID: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
                                                              • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                                              • Opcode Fuzzy Hash: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
                                                              • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                                              Control-flow Graph

                                                              APIs
                                                              • _fseek.LIBCMT ref: 0045292B
                                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                                                • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                                                • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                                              • __fread_nolock.LIBCMT ref: 00452961
                                                              • __fread_nolock.LIBCMT ref: 00452971
                                                              • __fread_nolock.LIBCMT ref: 0045298A
                                                              • __fread_nolock.LIBCMT ref: 004529A5
                                                              • _fseek.LIBCMT ref: 004529BF
                                                              • _malloc.LIBCMT ref: 004529CA
                                                              • _malloc.LIBCMT ref: 004529D6
                                                              • __fread_nolock.LIBCMT ref: 004529E7
                                                              • _free.LIBCMT ref: 00452A17
                                                              • _free.LIBCMT ref: 00452A20
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                                              • String ID:
                                                              • API String ID: 1255752989-0
                                                              • Opcode ID: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                                              • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                                              • Opcode Fuzzy Hash: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                                                              • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                                              Control-flow Graph

                                                              APIs
                                                              • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                              • RegisterClassExW.USER32(00000030), ref: 004104ED
                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                              • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                              • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                              • ImageList_ReplaceIcon.COMCTL32(00B9F5C8,000000FF,00000000), ref: 00410552
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                              • API String ID: 2914291525-1005189915
                                                              • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                              • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                                              • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                                              • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                                              Control-flow Graph

                                                              APIs
                                                              • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                                              • LoadIconW.USER32(?,00000063), ref: 004103C0
                                                              • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                                              • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                                              • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                                              • RegisterClassExW.USER32(?), ref: 0041045D
                                                                • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                                                • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                                                • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                                                • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                                                • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                                                • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                                                • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00B9F5C8,000000FF,00000000), ref: 00410552
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                              • String ID: #$0$AutoIt v3
                                                              • API String ID: 423443420-4155596026
                                                              • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                              • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                                              • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                                              • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _malloc
                                                              • String ID: Default
                                                              • API String ID: 1579825452-753088835
                                                              • Opcode ID: 1b19945bf038a30438c39f47f175bc13ecdef86ba402a24ebf6cae6f42ee6129
                                                              • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                                              • Opcode Fuzzy Hash: 1b19945bf038a30438c39f47f175bc13ecdef86ba402a24ebf6cae6f42ee6129
                                                              • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1970 40f696-40f69c 1966->1970 1968 40f660-40f674 call 4150d1 1967->1968 1969 40f63e 1967->1969 1974 40f679-40f67c 1968->1974 1971 40f640 1969->1971 1973 40f642-40f650 1971->1973 1975 40f652-40f655 1973->1975 1976 40f67e-40f68c 1973->1976 1974->1963 1977 40f65b-40f65e 1975->1977 1978 425d1e-425d3e call 4150d1 call 414d04 1975->1978 1979 40f68e-40f68f 1976->1979 1980 40f69f-40f6ad 1976->1980 1977->1968 1977->1971 1991 425d43-425d5f call 414d30 1978->1991 1979->1975 1982 40f6b4-40f6c2 1980->1982 1983 40f6af-40f6b2 1980->1983 1985 425d16 1982->1985 1986 40f6c8-40f6d6 1982->1986 1983->1975 1985->1978 1987 425d05-425d0b 1986->1987 1988 40f6dc-40f6df 1986->1988 1987->1973 1990 425d11 1987->1990 1988->1975 1990->1985 1991->1970
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __fread_nolock_fseek_memmove_strcat
                                                              • String ID: AU3!$EA06
                                                              • API String ID: 1268643489-2658333250
                                                              • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                              • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                                              • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                                              • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2000 40112c-401141 DefWindowProcW 1997->2000 2002 401184-40118e call 401250 1998->2002 2003 40114c-40114f 1998->2003 1999->1998 2001 401120-401126 1999->2001 2001->2000 2005 42b038-42b03f 2001->2005 2008 401193-40119a 2002->2008 2006 401151-401157 2003->2006 2007 40119d 2003->2007 2005->2000 2013 42b045-42b059 call 401000 call 40e0c0 2005->2013 2011 401219-40121f 2006->2011 2012 40115d 2006->2012 2009 4011a3-4011a9 2007->2009 2010 42afb4-42afc5 call 40f190 2007->2010 2009->2001 2015 4011af 2009->2015 2010->2008 2011->2001 2018 401225-42b06d call 468b0e 2011->2018 2016 401163-401166 2012->2016 2017 42b01d-42b024 2012->2017 2013->2000 2015->2001 2022 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2015->2022 2023 4011db-401202 SetTimer RegisterWindowMessageW 2015->2023 2025 42afe9-42b018 call 40f190 call 401a50 2016->2025 2026 40116c-401172 2016->2026 2017->2000 2024 42b02a-42b033 call 4370f4 2017->2024 2018->2008 2023->2008 2032 401204-401216 CreatePopupMenu 2023->2032 2024->2000 2025->2000 2026->2001 2034 401174-42afde call 45fd57 2026->2034 2034->2000 2045 42afe4 2034->2045 2045->2008
                                                              APIs
                                                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                                              • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                                              • PostQuitMessage.USER32(00000000), ref: 004011CB
                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                                              • CreatePopupMenu.USER32 ref: 00401204
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                              • String ID: TaskbarCreated
                                                              • API String ID: 129472671-2362178303
                                                              • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                              • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                                              • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                                              • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                                                              APIs
                                                              • _malloc.LIBCMT ref: 004115F1
                                                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                              • std::exception::exception.LIBCMT ref: 00411626
                                                              • std::exception::exception.LIBCMT ref: 00411640
                                                              • __CxxThrowException@8.LIBCMT ref: 00411651
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                              • String ID: ,*H$4*H$@fI
                                                              • API String ID: 615853336-1459471987
                                                              • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                              • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                                              • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                                              • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2065 40e6660-40e670e call 40e4050 2068 40e6715-40e673b call 40e7570 CreateFileW 2065->2068 2071 40e673d 2068->2071 2072 40e6742-40e6752 2068->2072 2073 40e688d-40e6891 2071->2073 2080 40e6759-40e6773 VirtualAlloc 2072->2080 2081 40e6754 2072->2081 2074 40e68d3-40e68d6 2073->2074 2075 40e6893-40e6897 2073->2075 2077 40e68d9-40e68e0 2074->2077 2078 40e6899-40e689c 2075->2078 2079 40e68a3-40e68a7 2075->2079 2082 40e6935-40e694a 2077->2082 2083 40e68e2-40e68ed 2077->2083 2078->2079 2084 40e68a9-40e68b3 2079->2084 2085 40e68b7-40e68bb 2079->2085 2086 40e677a-40e6791 ReadFile 2080->2086 2087 40e6775 2080->2087 2081->2073 2090 40e694c-40e6957 VirtualFree 2082->2090 2091 40e695a-40e6962 2082->2091 2088 40e68ef 2083->2088 2089 40e68f1-40e68fd 2083->2089 2084->2085 2092 40e68bd-40e68c7 2085->2092 2093 40e68cb 2085->2093 2094 40e6798-40e67d8 VirtualAlloc 2086->2094 2095 40e6793 2086->2095 2087->2073 2088->2082 2098 40e68ff-40e690f 2089->2098 2099 40e6911-40e691d 2089->2099 2090->2091 2092->2093 2093->2074 2096 40e67df-40e67fa call 40e77c0 2094->2096 2097 40e67da 2094->2097 2095->2073 2105 40e6805-40e680f 2096->2105 2097->2073 2101 40e6933 2098->2101 2102 40e691f-40e6928 2099->2102 2103 40e692a-40e6930 2099->2103 2101->2077 2102->2101 2103->2101 2106 40e6842-40e6856 call 40e75d0 2105->2106 2107 40e6811-40e6840 call 40e77c0 2105->2107 2113 40e685a-40e685e 2106->2113 2114 40e6858 2106->2114 2107->2105 2115 40e686a-40e686e 2113->2115 2116 40e6860-40e6864 CloseHandle 2113->2116 2114->2073 2117 40e687e-40e6887 2115->2117 2118 40e6870-40e687b VirtualFree 2115->2118 2116->2115 2117->2068 2117->2073 2118->2117
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 040E6731
                                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 040E6957
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateFileFreeVirtual
                                                              • String ID:
                                                              • API String ID: 204039940-0
                                                              • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                              • Instruction ID: 5b588fa78316981d6059f302d4610cde1eef867f0828030fcd4cd9ba4cb2915a
                                                              • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                              • Instruction Fuzzy Hash: 41A13870E00208EFDB14CFA5D994BFEBBB5BF58304F608659E501BB280D776AA51CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2119 4102b0-4102c5 SHGetMalloc 2120 4102cb-4102da SHGetDesktopFolder 2119->2120 2121 425dfd-425e0e call 433244 2119->2121 2122 4102e0-41031a call 412fba 2120->2122 2123 41036b-410379 2120->2123 2131 410360-410368 2122->2131 2132 41031c-410331 SHGetPathFromIDListW 2122->2132 2123->2121 2129 41037f-410384 2123->2129 2131->2123 2133 410351-41035d 2132->2133 2134 410333-41034a call 412fba 2132->2134 2133->2131 2134->2133
                                                              APIs
                                                              • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                              • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                              • _wcsncpy.LIBCMT ref: 004102ED
                                                              • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                              • _wcsncpy.LIBCMT ref: 00410340
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                                              • String ID: C:\Users\user\Desktop\copto de pago.exe
                                                              • API String ID: 3170942423-1793639283
                                                              • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                              • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                                              • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                                              • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2137 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2140 427190-4271ae RegQueryValueExW 2137->2140 2141 40e4eb-40e4f0 2137->2141 2142 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2140->2142 2143 42721a-42722a RegCloseKey 2140->2143 2148 427210-427219 call 436508 2142->2148 2149 4271f7-42720e call 402160 2142->2149 2148->2143 2149->2148
                                                              APIs
                                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                                              • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: QueryValue$CloseOpen
                                                              • String ID: Include$Software\AutoIt v3\AutoIt
                                                              • API String ID: 1586453840-614718249
                                                              • Opcode ID: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
                                                              • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                                              • Opcode Fuzzy Hash: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
                                                              • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2154 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                                                              APIs
                                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                                              • ShowWindow.USER32(?,00000000), ref: 004105E4
                                                              • ShowWindow.USER32(?,00000000), ref: 004105EE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$CreateShow
                                                              • String ID: AutoIt v3$edit
                                                              • API String ID: 1584632944-3779509399
                                                              • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                              • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                                              • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                                              • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                                              APIs
                                                                • Part of subcall function 040E62F0: Sleep.KERNELBASE(000001F4), ref: 040E6301
                                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 040E654D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateFileSleep
                                                              • String ID: 9N8SYQ0IBGFCSZ8FFZCZ64U55F1
                                                              • API String ID: 2694422964-3082983164
                                                              • Opcode ID: e4dfb43b3c8bdda6f0ef87d34ec52e3202cf3a2c62bb67a3375538b966757694
                                                              • Instruction ID: 23db23d4c49ed510822f4362034f6491fca3249650d8f37d74db3cd3aa7fef9c
                                                              • Opcode Fuzzy Hash: e4dfb43b3c8bdda6f0ef87d34ec52e3202cf3a2c62bb67a3375538b966757694
                                                              • Instruction Fuzzy Hash: 9E619130E14288DAEF11DBF4D854BEEBBB49F25304F004599E2487B2C1D7BA1B49CB66
                                                              APIs
                                                              • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                              • _wcsncpy.LIBCMT ref: 00401C41
                                                              • _wcscpy.LIBCMT ref: 00401C5D
                                                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                                              • String ID: Line:
                                                              • API String ID: 1874344091-1585850449
                                                              • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                              • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                                              • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                                              • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                                              APIs
                                                              • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                                              • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                                              • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                                              • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Close$OpenQueryValue
                                                              • String ID: Control Panel\Mouse
                                                              • API String ID: 1607946009-824357125
                                                              • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                              • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                                              • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                                              • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                                              APIs
                                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 040E5B1D
                                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 040E5B41
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 040E5B63
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                              • String ID:
                                                              • API String ID: 2438371351-0
                                                              • Opcode ID: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                              • Instruction ID: ec96e307c2700c4cb985cff72d169e4e83af7f736416c42a90d7905f4e92e619
                                                              • Opcode Fuzzy Hash: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                              • Instruction Fuzzy Hash: 4262F930A14258DBEB24CFA5CC50BEEB372EF58304F1095A9D10DEB390E675AE91CB59
                                                              APIs
                                                                • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                                              • _free.LIBCMT ref: 004295A0
                                                                • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                                • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                                • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                                                • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                                                • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                                                • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                                              • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\copto de pago.exe
                                                              • API String ID: 3938964917-2232928783
                                                              • Opcode ID: 85129ba88a80f874cc85648756a67b28b96809e39b045faff7acf40c360edc50
                                                              • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                                              • Opcode Fuzzy Hash: 85129ba88a80f874cc85648756a67b28b96809e39b045faff7acf40c360edc50
                                                              • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: Error:
                                                              • API String ID: 4104443479-232661952
                                                              • Opcode ID: 0f3a33fb7be69c8e6baf3b23b87111ea2728d16161c2c78c6bada8bccab6f67e
                                                              • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                                              • Opcode Fuzzy Hash: 0f3a33fb7be69c8e6baf3b23b87111ea2728d16161c2c78c6bada8bccab6f67e
                                                              • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                                              APIs
                                                              • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\copto de pago.exe,0040F545,C:\Users\user\Desktop\copto de pago.exe,004A90E8,C:\Users\user\Desktop\copto de pago.exe,?,0040F545), ref: 0041013C
                                                                • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                                                • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                                                • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                                                • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                                                • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                                                • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                                              • String ID: X$pWH
                                                              • API String ID: 85490731-941433119
                                                              • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                              • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                                              • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                                              • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                                              Strings
                                                              • C:\Users\user\Desktop\copto de pago.exe, xrefs: 00410107
                                                              • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _strcat
                                                              • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\copto de pago.exe
                                                              • API String ID: 1765576173-763500996
                                                              • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                              • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                                              • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                                              • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
                                                              • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                                              • Opcode Fuzzy Hash: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
                                                              • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                                              • String ID:
                                                              • API String ID: 1794320848-0
                                                              • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                              • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                                              • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                                              • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                                              • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Process$CurrentTerminate
                                                              • String ID:
                                                              • API String ID: 2429186680-0
                                                              • Opcode ID: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
                                                              • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                                              • Opcode Fuzzy Hash: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
                                                              • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                                              APIs
                                                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: IconNotifyShell_
                                                              • String ID:
                                                              • API String ID: 1144537725-0
                                                              • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                              • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                                                              • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                                              • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                                                              APIs
                                                              • _malloc.LIBCMT ref: 0043214B
                                                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                              • _malloc.LIBCMT ref: 0043215D
                                                              • _malloc.LIBCMT ref: 0043216F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _malloc$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 680241177-0
                                                              • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                                              • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                                              • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                                              • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                                              APIs
                                                              • _free.LIBCMT ref: 0043210A
                                                                • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                                                • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                                                              • _free.LIBCMT ref: 0043211D
                                                              • _free.LIBCMT ref: 00432130
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                              • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                                                              • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                                              • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                                                              APIs
                                                              • __wsplitpath.LIBCMT ref: 004678F7
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast__wsplitpath_malloc
                                                              • String ID:
                                                              • API String ID: 4163294574-0
                                                              • Opcode ID: 466b4abea8eb3f9882cf6d05d385968ec72279f5f07066920500c3d4079e3d60
                                                              • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                                              • Opcode Fuzzy Hash: 466b4abea8eb3f9882cf6d05d385968ec72279f5f07066920500c3d4079e3d60
                                                              • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                                              APIs
                                                                • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                                                • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                                                • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                                              • _strcat.LIBCMT ref: 0040F786
                                                                • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                                                • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                                              • String ID:
                                                              • API String ID: 3199840319-0
                                                              • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                                              • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                                              • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                                                              • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                                              APIs
                                                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                                              • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: FreeInfoLibraryParametersSystem
                                                              • String ID:
                                                              • API String ID: 3403648963-0
                                                              • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                              • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                                              • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                                              • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                                              APIs
                                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                              • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                                              • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                                              • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                                              APIs
                                                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                              • __lock_file.LIBCMT ref: 00414A8D
                                                                • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                                              • __fclose_nolock.LIBCMT ref: 00414A98
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                              • String ID:
                                                              • API String ID: 2800547568-0
                                                              • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                              • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                                              • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                                              • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                                              APIs
                                                              • __lock_file.LIBCMT ref: 00415012
                                                              • __ftell_nolock.LIBCMT ref: 0041501F
                                                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                              • String ID:
                                                              • API String ID: 2999321469-0
                                                              • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                              • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                                              • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                                              • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                                              APIs
                                                              • CreateProcessW.KERNELBASE(?,00000000), ref: 040E5B1D
                                                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 040E5B41
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 040E5B63
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                              • String ID:
                                                              • API String ID: 2438371351-0
                                                              • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                              • Instruction ID: 5656d66f2a2a61fe571f9331fbfa212705fc745b6629fb8ea757e0b1c9e7a52d
                                                              • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                              • Instruction Fuzzy Hash: A812FE20E24658C6EB24DF60D8507DEB232EF68300F1094E9910DEB7A4E77A5F91CF5A
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID:
                                                              • API String ID: 4104443479-0
                                                              • Opcode ID: 64fdff3ae94ab83457d8603152ae0d5fedf77ee6c12e0e45d0860bef15caa14f
                                                              • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                                              • Opcode Fuzzy Hash: 64fdff3ae94ab83457d8603152ae0d5fedf77ee6c12e0e45d0860bef15caa14f
                                                              • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID:
                                                              • API String ID: 4104443479-0
                                                              • Opcode ID: 3c2b2ceb588fdbf9e3bb202f762175435206956dbe978b084b72eee7771b4497
                                                              • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                                                              • Opcode Fuzzy Hash: 3c2b2ceb588fdbf9e3bb202f762175435206956dbe978b084b72eee7771b4497
                                                              • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                              • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                              • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                                              • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                                              • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                                                              • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __lock_file
                                                              • String ID:
                                                              • API String ID: 3031932315-0
                                                              • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                              • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                                              • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                                              • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                                              APIs
                                                              • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID:
                                                              • API String ID: 3934441357-0
                                                              • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                              • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                                              • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                                              • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wfsopen
                                                              • String ID:
                                                              • API String ID: 197181222-0
                                                              • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                              • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                                              • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                                              • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                                              APIs
                                                              • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                              • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                                              • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                                              • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                                              APIs
                                                              • Sleep.KERNELBASE(000001F4), ref: 040E6301
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                              • Instruction ID: eb893331773d1bb7b82de9e6cf4433013cb4108b9ea473c92a734fb0f25a943e
                                                              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                              • Instruction Fuzzy Hash: E9E0BF7494110DEFDB00EFB4D5496EE7BB4EF05301F1005A1FD05E7681DB319E648A62
                                                              APIs
                                                              • Sleep.KERNELBASE(000001F4), ref: 040E6301
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                              • Instruction ID: 206f5fa0dedf1cd424ceb719cb5bdd65f0c3652d717e1db1c5e5ff5db8910278
                                                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                              • Instruction Fuzzy Hash: BDE0E67494110DDFDB00EFB4D5496AE7FB4EF04301F100561FD01E2281D6319D608A62
                                                              APIs
                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                                              • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                                              • GetKeyState.USER32(00000011), ref: 0047C92D
                                                              • GetKeyState.USER32(00000009), ref: 0047C936
                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                                              • GetKeyState.USER32(00000010), ref: 0047C953
                                                              • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                                              • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                                              • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                                              • _wcsncpy.LIBCMT ref: 0047CA29
                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                                              • SendMessageW.USER32 ref: 0047CA7F
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                                              • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                                              • ImageList_SetDragCursorImage.COMCTL32(00B9F5C8,00000000,00000000,00000000), ref: 0047CB9B
                                                              • ImageList_BeginDrag.COMCTL32(00B9F5C8,00000000,000000F8,000000F0), ref: 0047CBAC
                                                              • SetCapture.USER32(?), ref: 0047CBB6
                                                              • ClientToScreen.USER32(?,?), ref: 0047CC17
                                                              • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                                              • ReleaseCapture.USER32 ref: 0047CC3A
                                                              • GetCursorPos.USER32(?), ref: 0047CC72
                                                              • ScreenToClient.USER32(?,?), ref: 0047CC80
                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                                              • SendMessageW.USER32 ref: 0047CD12
                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                                              • SendMessageW.USER32 ref: 0047CD80
                                                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                                              • GetCursorPos.USER32(?), ref: 0047CDC8
                                                              • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                                              • GetParent.USER32(00000000), ref: 0047CDF7
                                                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                                              • SendMessageW.USER32 ref: 0047CE93
                                                              • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,030D1BC0,00000000,?,?,?,?), ref: 0047CF1C
                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                                              • SendMessageW.USER32 ref: 0047CF6B
                                                              • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                                              • TrackPopupMenuEx.USER32(?,00000080,?,?,030D1BC0,00000000,?,?,?,?), ref: 0047CFE6
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                              • String ID: @GUI_DRAGID$F
                                                              • API String ID: 3100379633-4164748364
                                                              • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                              • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                                              • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                                              • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                                              APIs
                                                              • GetForegroundWindow.USER32 ref: 00434420
                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                                              • IsIconic.USER32(?), ref: 0043444F
                                                              • ShowWindow.USER32(?,00000009), ref: 0043445C
                                                              • SetForegroundWindow.USER32(?), ref: 0043446A
                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                                              • GetCurrentThreadId.KERNEL32 ref: 00434485
                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                                              • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                                              • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                                              • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                                              • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                                              • keybd_event.USER32(00000012,00000000), ref: 00434514
                                                              • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                                              • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                              • String ID: Shell_TrayWnd
                                                              • API String ID: 2889586943-2988720461
                                                              • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                              • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                                              • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                                              • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                                              APIs
                                                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                                              • CloseHandle.KERNEL32(?), ref: 004463A0
                                                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                                              • GetProcessWindowStation.USER32 ref: 004463D1
                                                              • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                                              • _wcslen.LIBCMT ref: 00446498
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • _wcsncpy.LIBCMT ref: 004464C0
                                                              • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                                              • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                                              • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                                              • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                                              • CloseWindowStation.USER32(00000000), ref: 0044656C
                                                              • CloseDesktop.USER32(?), ref: 0044657A
                                                              • SetProcessWindowStation.USER32(?), ref: 00446588
                                                              • CloseHandle.KERNEL32(?), ref: 00446592
                                                              • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                                              • String ID: $@OH$default$winsta0
                                                              • API String ID: 3324942560-3791954436
                                                              • Opcode ID: 17ea6258488d9c46c7a00dd8b46b11f65bca9c9d467b249e48c4e72528dedec9
                                                              • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                                              • Opcode Fuzzy Hash: 17ea6258488d9c46c7a00dd8b46b11f65bca9c9d467b249e48c4e72528dedec9
                                                              • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                                              APIs
                                                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\copto de pago.exe,0040F545,C:\Users\user\Desktop\copto de pago.exe,004A90E8,C:\Users\user\Desktop\copto de pago.exe,?,0040F545), ref: 0041013C
                                                                • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                                                                • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                                                                • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                                                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                              • _wcscat.LIBCMT ref: 0044BD94
                                                              • _wcscat.LIBCMT ref: 0044BDBD
                                                              • __wsplitpath.LIBCMT ref: 0044BDEA
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                                                              • _wcscpy.LIBCMT ref: 0044BE71
                                                              • _wcscat.LIBCMT ref: 0044BE83
                                                              • _wcscat.LIBCMT ref: 0044BE95
                                                              • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                                                              • DeleteFileW.KERNEL32(?), ref: 0044BED3
                                                              • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                                                              • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                                                              • DeleteFileW.KERNEL32(?), ref: 0044BF15
                                                              • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                                                              • FindClose.KERNEL32(00000000), ref: 0044BF33
                                                              • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                                                              • FindClose.KERNEL32(00000000), ref: 0044BF7C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                              • String ID: \*.*
                                                              • API String ID: 2188072990-1173974218
                                                              • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                              • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                                                              • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                                                              • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                                              • FindClose.KERNEL32(00000000), ref: 00478924
                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                                              • __swprintf.LIBCMT ref: 004789D3
                                                              • __swprintf.LIBCMT ref: 00478A1D
                                                              • __swprintf.LIBCMT ref: 00478A4B
                                                              • __swprintf.LIBCMT ref: 00478A79
                                                                • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                                                • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                                              • __swprintf.LIBCMT ref: 00478AA7
                                                              • __swprintf.LIBCMT ref: 00478AD5
                                                              • __swprintf.LIBCMT ref: 00478B03
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                              • API String ID: 999945258-2428617273
                                                              • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                              • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                                              • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                                              • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                                              APIs
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                                              • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                                              • __wsplitpath.LIBCMT ref: 00403492
                                                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                              • _wcscpy.LIBCMT ref: 004034A7
                                                              • _wcscat.LIBCMT ref: 004034BC
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                                • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                                                • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                                              • _wcscpy.LIBCMT ref: 004035A0
                                                              • _wcslen.LIBCMT ref: 00403623
                                                              • _wcslen.LIBCMT ref: 0040367D
                                                              Strings
                                                              • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                                              • Unterminated string, xrefs: 00428348
                                                              • Error opening the file, xrefs: 00428231
                                                              • _, xrefs: 0040371C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                              • API String ID: 3393021363-188983378
                                                              • Opcode ID: d7567003ac82893a05918a50732f98c0da489d2a1a1b1371126f827adaf0f001
                                                              • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                                              • Opcode Fuzzy Hash: d7567003ac82893a05918a50732f98c0da489d2a1a1b1371126f827adaf0f001
                                                              • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                                              • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                                              • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                                              • FindClose.KERNEL32(00000000), ref: 00431B20
                                                              • FindClose.KERNEL32(00000000), ref: 00431B34
                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                                              • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                                              • FindClose.KERNEL32(00000000), ref: 00431BCD
                                                              • FindClose.KERNEL32(00000000), ref: 00431BDB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                              • String ID: *.*
                                                              • API String ID: 1409584000-438819550
                                                              • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                              • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                                              • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                                              • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                                              APIs
                                                              • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                                              • __swprintf.LIBCMT ref: 00431C2E
                                                              • _wcslen.LIBCMT ref: 00431C3A
                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                                              • String ID: :$\$\??\%s
                                                              • API String ID: 2192556992-3457252023
                                                              • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                              • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                                              • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                                              • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                                              APIs
                                                              • GetLocalTime.KERNEL32(?), ref: 004722A2
                                                              • __swprintf.LIBCMT ref: 004722B9
                                                              • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                                              • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                                              • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                                              • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                                              • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                                              • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                                              • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                                              • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                                              • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: FolderPath$LocalTime__swprintf
                                                              • String ID: %.3d
                                                              • API String ID: 3337348382-986655627
                                                              • Opcode ID: 7886e1de9339dcccb7d90e6fd0fd2fa7ca800526018001cd1a68e58c6d42a46d
                                                              • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                                              • Opcode Fuzzy Hash: 7886e1de9339dcccb7d90e6fd0fd2fa7ca800526018001cd1a68e58c6d42a46d
                                                              • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                                              • FindClose.KERNEL32(00000000), ref: 0044291C
                                                              • FindClose.KERNEL32(00000000), ref: 00442930
                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                                              • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                                              • FindClose.KERNEL32(00000000), ref: 004429D4
                                                                • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                                              • FindClose.KERNEL32(00000000), ref: 004429E2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                              • String ID: *.*
                                                              • API String ID: 2640511053-438819550
                                                              • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                              • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                                              • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                                              • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                                              • GetLastError.KERNEL32 ref: 00433414
                                                              • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                                              • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                                              • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                              • String ID: SeShutdownPrivilege
                                                              • API String ID: 2938487562-3733053543
                                                              • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                              • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                                              • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                                              • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                                              APIs
                                                                • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                                                • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                                                • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                                                • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                                              • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                                              • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                                              • GetLengthSid.ADVAPI32(?), ref: 00446241
                                                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                                              • CopySid.ADVAPI32(00000000), ref: 00446271
                                                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                              • String ID:
                                                              • API String ID: 1255039815-0
                                                              • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                              • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                                              • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                                              • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                                              APIs
                                                              • __swprintf.LIBCMT ref: 00433073
                                                              • __swprintf.LIBCMT ref: 00433085
                                                              • __wcsicoll.LIBCMT ref: 00433092
                                                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                                              • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                                              • LockResource.KERNEL32(00000000), ref: 004330CA
                                                              • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                                              • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                                              • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                                              • LockResource.KERNEL32(?), ref: 00433120
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                                              • String ID:
                                                              • API String ID: 1158019794-0
                                                              • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                              • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                                              • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                                              • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                              • String ID:
                                                              • API String ID: 1737998785-0
                                                              • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                              • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                                              • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                                              • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                                              • GetLastError.KERNEL32 ref: 0045D6BF
                                                              • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Error$Mode$DiskFreeLastSpace
                                                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                              • API String ID: 4194297153-14809454
                                                              • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                              • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                                              • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                                              • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove$_strncmp
                                                              • String ID: @oH$\$^$h
                                                              • API String ID: 2175499884-3701065813
                                                              • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                              • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                                              • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                                              • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                                              APIs
                                                              • socket.WSOCK32(00000002,00000001,00000006), ref: 0046530D
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                                              • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                                              • closesocket.WSOCK32(00000000), ref: 00465377
                                                              • listen.WSOCK32(00000000,00000005), ref: 00465381
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                                              • closesocket.WSOCK32(00000000), ref: 004653BD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$closesocket$bindlistensocket
                                                              • String ID:
                                                              • API String ID: 540024437-0
                                                              • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                              • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                                              • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                                              • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                                              • API String ID: 0-2872873767
                                                              • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                              • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                                              • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                                              • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                                              • __wsplitpath.LIBCMT ref: 00475644
                                                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                              • _wcscat.LIBCMT ref: 00475657
                                                              • __wcsicoll.LIBCMT ref: 0047567B
                                                              • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                                              • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                              • String ID:
                                                              • API String ID: 2547909840-0
                                                              • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                              • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                                              • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                                              • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                                              APIs
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                                              • Sleep.KERNEL32(0000000A), ref: 0045250B
                                                              • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                                              • FindClose.KERNEL32(?), ref: 004525FF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                                              • String ID: *.*$\VH
                                                              • API String ID: 2786137511-2657498754
                                                              • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                              • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                                              • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                                              • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                                              • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                                              • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                              • String ID: pqI
                                                              • API String ID: 2579439406-2459173057
                                                              • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                              • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                                              • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                                              • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                                              APIs
                                                              • __wcsicoll.LIBCMT ref: 00433349
                                                              • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                                              • __wcsicoll.LIBCMT ref: 00433375
                                                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wcsicollmouse_event
                                                              • String ID: DOWN
                                                              • API String ID: 1033544147-711622031
                                                              • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                              • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                                              • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                                              • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                                              APIs
                                                              • GetKeyboardState.USER32(?), ref: 0044C3D2
                                                              • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                                              • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                                              • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                                              • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: KeyboardMessagePostState$InputSend
                                                              • String ID:
                                                              • API String ID: 3031425849-0
                                                              • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                              • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                                              • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                                              • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                                              APIs
                                                                • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 0047666F
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastinet_addrsocket
                                                              • String ID:
                                                              • API String ID: 4170576061-0
                                                              • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                              • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                                              • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                                              • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                                              APIs
                                                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                              • IsWindowVisible.USER32 ref: 0047A368
                                                              • IsWindowEnabled.USER32 ref: 0047A378
                                                              • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                                              • IsIconic.USER32 ref: 0047A393
                                                              • IsZoomed.USER32 ref: 0047A3A1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                              • String ID:
                                                              • API String ID: 292994002-0
                                                              • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                              • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                                              • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                                              • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                                              APIs
                                                                • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                              • CoInitialize.OLE32(00000000), ref: 00478442
                                                              • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                                              • CoUninitialize.OLE32 ref: 0047863C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                              • String ID: .lnk
                                                              • API String ID: 886957087-24824748
                                                              • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                              • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                                              • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                                              • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                                              APIs
                                                              • OpenClipboard.USER32(?), ref: 0046DCE7
                                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                              • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                              • CloseClipboard.USER32 ref: 0046DD0D
                                                              • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                              • CloseClipboard.USER32 ref: 0046DD41
                                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                              • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                              • CloseClipboard.USER32 ref: 0046DD99
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                              • String ID:
                                                              • API String ID: 15083398-0
                                                              • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                              • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                                              • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                                              • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: U$\
                                                              • API String ID: 4104443479-100911408
                                                              • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                              • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                                              • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                                              • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Find$File$CloseFirstNext
                                                              • String ID:
                                                              • API String ID: 3541575487-0
                                                              • Opcode ID: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
                                                              • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                                              • Opcode Fuzzy Hash: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
                                                              • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                                              APIs
                                                              • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                                              • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                                              • FindClose.KERNEL32(00000000), ref: 004339EB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: FileFind$AttributesCloseFirst
                                                              • String ID:
                                                              • API String ID: 48322524-0
                                                              • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                              • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                                              • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                                              • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                                              APIs
                                                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                                              • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                              • String ID:
                                                              • API String ID: 901099227-0
                                                              • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                                              • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                                              • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                                                              • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                                              APIs
                                                              • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Proc
                                                              • String ID:
                                                              • API String ID: 2346855178-0
                                                              • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                              • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                                              • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                                              • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                                              APIs
                                                              • BlockInput.USER32(00000001), ref: 0045A38B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: BlockInput
                                                              • String ID:
                                                              • API String ID: 3456056419-0
                                                              • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                              • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                                              • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                                              • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                                              APIs
                                                              • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: LogonUser
                                                              • String ID:
                                                              • API String ID: 1244722697-0
                                                              • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                              • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                                              • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                                              • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                                              APIs
                                                              • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: NameUser
                                                              • String ID:
                                                              • API String ID: 2645101109-0
                                                              • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                              • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                                              • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                                              • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                              • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                                              • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                                              • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: N@
                                                              • API String ID: 0-1509896676
                                                              • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                              • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                                              • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                              • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                              • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                                              • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                                              • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                              • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                                              • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                              • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                              • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                                              • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                              • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                              • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                                              • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                              • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2d7fbe86e8598efd3f700fe7d096233ebb79330acfecc149979e56b8d22bcd3b
                                                              • Instruction ID: 8b6a6d254c44f3607553f4d7a44cdc8f363e9bb38e8b5abe1f79ee457f0d01ed
                                                              • Opcode Fuzzy Hash: 2d7fbe86e8598efd3f700fe7d096233ebb79330acfecc149979e56b8d22bcd3b
                                                              • Instruction Fuzzy Hash: E931B471D1091CDFDF48CFADC991AAEB7F2AF88201F548299D516AB345D634AB01EB40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                              • Instruction ID: b3f5f780659ab64252afea66cd97ec7ae38b3735e115b85460eb6542d277fa7b
                                                              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                              • Instruction Fuzzy Hash: B4019279A00109EFCB44DF99C5909AEF7F5FB48314F208599E919A7305E730AE51DB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                              • Instruction ID: cdb4c8858ddd69933a80357ff592328961c7e847a0f2c8ad275625c277de5ac1
                                                              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                              • Instruction Fuzzy Hash: 9C019279A00209EFCB44DF99C5909AEF7F5FB48310F208599D919A7301E730AE51DB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2053100101.00000000040E4000.00000040.00000020.00020000.00000000.sdmp, Offset: 040E4000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_40e4000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                              APIs
                                                              • DeleteObject.GDI32(?), ref: 0045953B
                                                              • DeleteObject.GDI32(?), ref: 00459551
                                                              • DestroyWindow.USER32(?), ref: 00459563
                                                              • GetDesktopWindow.USER32 ref: 00459581
                                                              • GetWindowRect.USER32(00000000), ref: 00459588
                                                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                                              • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                                              • GetClientRect.USER32(00000000,?), ref: 004596F8
                                                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                                              • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                                              • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                                              • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                                              • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                                              • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                                              • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                                              • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                                              • ShowWindow.USER32(?,00000004), ref: 00459865
                                                              • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                                              • GetStockObject.GDI32(00000011), ref: 004598CD
                                                              • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                                              • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                                              • DeleteDC.GDI32(00000000), ref: 004598F8
                                                              • _wcslen.LIBCMT ref: 00459916
                                                              • _wcscpy.LIBCMT ref: 0045993A
                                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                                              • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                                              • GetDC.USER32(00000000), ref: 004599FC
                                                              • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                                              • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                                              • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                                              • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                              • String ID: $AutoIt v3$DISPLAY$static
                                                              • API String ID: 4040870279-2373415609
                                                              • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                              • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                                              • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                                              • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                                              APIs
                                                              • GetSysColor.USER32(00000012), ref: 0044181E
                                                              • SetTextColor.GDI32(?,?), ref: 00441826
                                                              • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                                              • GetSysColor.USER32(0000000F), ref: 00441849
                                                              • SetBkColor.GDI32(?,?), ref: 00441864
                                                              • SelectObject.GDI32(?,?), ref: 00441874
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                                              • GetSysColor.USER32(00000010), ref: 004418B2
                                                              • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                                              • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                                              • DeleteObject.GDI32(?), ref: 004418D5
                                                              • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                                              • FillRect.USER32(?,?,?), ref: 00441970
                                                                • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                                                • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                                • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                                • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                                                • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                                                • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                                • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                                                • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                                                • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                                                • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                                • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                                • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                                • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                              • String ID:
                                                              • API String ID: 69173610-0
                                                              • Opcode ID: c8a6ac4ae8f443655677bc86ae764d03f57232e15dc5d5dcac45869bbcc4533b
                                                              • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                                              • Opcode Fuzzy Hash: c8a6ac4ae8f443655677bc86ae764d03f57232e15dc5d5dcac45869bbcc4533b
                                                              • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                                              APIs
                                                              • DestroyWindow.USER32(?), ref: 004590F2
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                                              • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                                              • GetClientRect.USER32(00000000,?), ref: 0045924E
                                                              • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                                              • GetStockObject.GDI32(00000011), ref: 004592AC
                                                              • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                                              • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                                              • DeleteDC.GDI32(00000000), ref: 004592D6
                                                              • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                                              • GetStockObject.GDI32(00000011), ref: 004593D3
                                                              • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                                              • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                              • API String ID: 2910397461-517079104
                                                              • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                              • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                                              • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                                              • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wcsnicmp
                                                              • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                              • API String ID: 1038674560-3360698832
                                                              • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                                              • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                                              • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                                                              • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                                              APIs
                                                              • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                                              • SetCursor.USER32(00000000), ref: 0043075B
                                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                                              • SetCursor.USER32(00000000), ref: 00430773
                                                              • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                                              • SetCursor.USER32(00000000), ref: 0043078B
                                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                                              • SetCursor.USER32(00000000), ref: 004307A3
                                                              • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                                              • SetCursor.USER32(00000000), ref: 004307BB
                                                              • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                                              • SetCursor.USER32(00000000), ref: 004307D3
                                                              • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                                              • SetCursor.USER32(00000000), ref: 004307EB
                                                              • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                                              • SetCursor.USER32(00000000), ref: 00430803
                                                              • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                                              • SetCursor.USER32(00000000), ref: 0043081B
                                                              • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                                              • SetCursor.USER32(00000000), ref: 00430833
                                                              • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                                              • SetCursor.USER32(00000000), ref: 0043084B
                                                              • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                                              • SetCursor.USER32(00000000), ref: 00430863
                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                                              • SetCursor.USER32(00000000), ref: 0043087B
                                                              • SetCursor.USER32(00000000), ref: 00430887
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                                              • SetCursor.USER32(00000000), ref: 0043089F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Cursor$Load
                                                              • String ID:
                                                              • API String ID: 1675784387-0
                                                              • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                              • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                                              • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                                              • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                                              APIs
                                                              • GetSysColor.USER32(0000000E), ref: 00430913
                                                              • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                                              • GetSysColor.USER32(00000012), ref: 00430933
                                                              • SetTextColor.GDI32(?,?), ref: 0043093B
                                                              • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                                              • GetSysColor.USER32(0000000F), ref: 00430959
                                                              • CreateSolidBrush.GDI32(?), ref: 00430962
                                                              • GetSysColor.USER32(00000011), ref: 00430979
                                                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                                              • SelectObject.GDI32(?,00000000), ref: 0043099C
                                                              • SetBkColor.GDI32(?,?), ref: 004309A6
                                                              • SelectObject.GDI32(?,?), ref: 004309B4
                                                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                                              • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                                              • DrawFocusRect.USER32(?,?), ref: 00430A91
                                                              • GetSysColor.USER32(00000011), ref: 00430A9F
                                                              • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                                              • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                                              • SelectObject.GDI32(?,?), ref: 00430AD0
                                                              • DeleteObject.GDI32(00000105), ref: 00430ADC
                                                              • SelectObject.GDI32(?,?), ref: 00430AE3
                                                              • DeleteObject.GDI32(?), ref: 00430AE9
                                                              • SetTextColor.GDI32(?,?), ref: 00430AF0
                                                              • SetBkColor.GDI32(?,?), ref: 00430AFB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                              • String ID:
                                                              • API String ID: 1582027408-0
                                                              • Opcode ID: 0fc54ca7880b8250f5455aad5081468a4898125874aa09f0f002b05b6088d479
                                                              • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                                              • Opcode Fuzzy Hash: 0fc54ca7880b8250f5455aad5081468a4898125874aa09f0f002b05b6088d479
                                                              • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                                              APIs
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                                              • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CloseConnectCreateRegistry
                                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                              • API String ID: 3217815495-966354055
                                                              • Opcode ID: cc51306d31ed6c8e05796ddcf504f705dab8229ec76f85ad91dfb98ceec273a0
                                                              • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                                              • Opcode Fuzzy Hash: cc51306d31ed6c8e05796ddcf504f705dab8229ec76f85ad91dfb98ceec273a0
                                                              • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 004566AE
                                                              • GetDesktopWindow.USER32 ref: 004566C3
                                                              • GetWindowRect.USER32(00000000), ref: 004566CA
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                                              • DestroyWindow.USER32(?), ref: 00456746
                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                                              • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                                              • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                                              • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                                              • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                                              • IsWindowVisible.USER32(?), ref: 0045682C
                                                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                                              • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                                              • GetWindowRect.USER32(?,?), ref: 00456873
                                                              • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                                              • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                                              • CopyRect.USER32(?,?), ref: 004568BE
                                                              • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                              • String ID: ($,$tooltips_class32
                                                              • API String ID: 225202481-3320066284
                                                              • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                              • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                                              • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                                              • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                                              APIs
                                                              • OpenClipboard.USER32(?), ref: 0046DCE7
                                                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                                              • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                                              • CloseClipboard.USER32 ref: 0046DD0D
                                                              • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                                              • CloseClipboard.USER32 ref: 0046DD41
                                                              • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                                              • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                                              • CloseClipboard.USER32 ref: 0046DD99
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                                              • String ID:
                                                              • API String ID: 15083398-0
                                                              • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                              • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                                              • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                                              • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                                              APIs
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • GetWindowRect.USER32(?,?), ref: 00471CF7
                                                              • GetClientRect.USER32(?,?), ref: 00471D05
                                                              • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                                              • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                                              • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                                              • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                                              • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                                              • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                                              • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                                              • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                                              • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                                              • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                                              • GetClientRect.USER32(?,?), ref: 00471E8A
                                                              • GetStockObject.GDI32(00000011), ref: 00471EA6
                                                              • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                                              • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                              • String ID: @$AutoIt v3 GUI
                                                              • API String ID: 867697134-3359773793
                                                              • Opcode ID: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
                                                              • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                                              • Opcode Fuzzy Hash: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
                                                              • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                              • API String ID: 1503153545-1459072770
                                                              • Opcode ID: b1dcb5dacd1f2072149b846e72ce4b3dcf4a50df91d710b51ce636c939b7599d
                                                              • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                                              • Opcode Fuzzy Hash: b1dcb5dacd1f2072149b846e72ce4b3dcf4a50df91d710b51ce636c939b7599d
                                                              • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wcsicoll$__wcsnicmp
                                                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                                              • API String ID: 790654849-32604322
                                                              • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                              • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                                              • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                                              • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e5b051fd50d99fa90b2629cec502b0b5abd27188c27a482d59dc70fd2e6235d1
                                                              • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                                              • Opcode Fuzzy Hash: e5b051fd50d99fa90b2629cec502b0b5abd27188c27a482d59dc70fd2e6235d1
                                                              • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                                              APIs
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window
                                                              • String ID: 0
                                                              • API String ID: 2353593579-4108050209
                                                              • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                              • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                                              • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                                              • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                                              APIs
                                                              • GetSysColor.USER32(0000000F), ref: 0044A05E
                                                              • GetClientRect.USER32(?,?), ref: 0044A0D1
                                                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                                              • GetWindowDC.USER32(?), ref: 0044A0F6
                                                              • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                                              • ReleaseDC.USER32(?,?), ref: 0044A11B
                                                              • GetSysColor.USER32(0000000F), ref: 0044A131
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                                              • GetSysColor.USER32(0000000F), ref: 0044A14F
                                                              • GetSysColor.USER32(00000005), ref: 0044A15B
                                                              • GetWindowDC.USER32(?), ref: 0044A1BE
                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                                              • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                                              • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                                              • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                                              • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                                              • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                                              • GetSysColor.USER32(00000008), ref: 0044A265
                                                              • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                                              • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                                              • GetStockObject.GDI32(00000005), ref: 0044A28A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                              • String ID:
                                                              • API String ID: 1744303182-0
                                                              • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                              • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                                              • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                                              • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                                              • __mtterm.LIBCMT ref: 00417C34
                                                                • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                                                • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                                                • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                                                • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                                              • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                                              • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                                              • __init_pointers.LIBCMT ref: 00417CE6
                                                              • __calloc_crt.LIBCMT ref: 00417D54
                                                              • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                              • API String ID: 4163708885-3819984048
                                                              • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                              • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                                              • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                                              • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: >>>AUTOIT SCRIPT<<<$\
                                                              • API String ID: 0-1896584978
                                                              • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                              • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                                              • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                                              • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wcsicoll$IconLoad
                                                              • String ID: blank$info$question$stop$warning
                                                              • API String ID: 2485277191-404129466
                                                              • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                              • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                                              • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                                              • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                                              APIs
                                                              • LoadIconW.USER32(?,00000063), ref: 0045464C
                                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                                              • SetWindowTextW.USER32(?,?), ref: 00454678
                                                              • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                                              • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                                              • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                                              • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                                              • GetWindowRect.USER32(?,?), ref: 004546F5
                                                              • SetWindowTextW.USER32(?,?), ref: 00454765
                                                              • GetDesktopWindow.USER32 ref: 0045476F
                                                              • GetWindowRect.USER32(00000000), ref: 00454776
                                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                                              • GetClientRect.USER32(?,?), ref: 004547D2
                                                              • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                                              • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                              • String ID:
                                                              • API String ID: 3869813825-0
                                                              • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                              • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                                              • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                                              • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                                              APIs
                                                              • _wcslen.LIBCMT ref: 00464B28
                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                                              • _wcslen.LIBCMT ref: 00464C28
                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                                              • _wcslen.LIBCMT ref: 00464CBA
                                                              • _wcslen.LIBCMT ref: 00464CD0
                                                              • _wcslen.LIBCMT ref: 00464CEF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$Directory$CurrentSystem
                                                              • String ID: D
                                                              • API String ID: 1914653954-2746444292
                                                              • Opcode ID: 5f72559f0a2586b771b9af551f03c1fb97e064fdb306134380bfcbf6c4a29eaa
                                                              • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                                              • Opcode Fuzzy Hash: 5f72559f0a2586b771b9af551f03c1fb97e064fdb306134380bfcbf6c4a29eaa
                                                              • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                                              APIs
                                                              • _wcsncpy.LIBCMT ref: 0045CE39
                                                              • __wsplitpath.LIBCMT ref: 0045CE78
                                                              • _wcscat.LIBCMT ref: 0045CE8B
                                                              • _wcscat.LIBCMT ref: 0045CE9E
                                                              • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                              • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                                              • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                                              • _wcscpy.LIBCMT ref: 0045CF61
                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                              • String ID: *.*
                                                              • API String ID: 1153243558-438819550
                                                              • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                              • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                                              • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                                              • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wcsicoll
                                                              • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                              • API String ID: 3832890014-4202584635
                                                              • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                              • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                                              • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                                              • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                                              APIs
                                                              • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                                              • GetFocus.USER32 ref: 0046A0DD
                                                              • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessagePost$CtrlFocus
                                                              • String ID: 0
                                                              • API String ID: 1534620443-4108050209
                                                              • Opcode ID: 69f57c1da7d99aaf19a54cb3f0377e1430f34c496c45dabe130679879bb200d9
                                                              • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                                              • Opcode Fuzzy Hash: 69f57c1da7d99aaf19a54cb3f0377e1430f34c496c45dabe130679879bb200d9
                                                              • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                                              APIs
                                                              • DestroyWindow.USER32(?), ref: 004558E3
                                                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$CreateDestroy
                                                              • String ID: ,$tooltips_class32
                                                              • API String ID: 1109047481-3856767331
                                                              • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                              • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                                              • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                                              • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                                              APIs
                                                              • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                                              • GetMenuItemCount.USER32(?), ref: 00468C45
                                                              • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                                              • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                                              • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                                              • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                                              • GetMenuItemCount.USER32 ref: 00468CFD
                                                              • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                                              • GetCursorPos.USER32(?), ref: 00468D3F
                                                              • SetForegroundWindow.USER32(?), ref: 00468D49
                                                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                                              • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                                              • String ID: 0
                                                              • API String ID: 1441871840-4108050209
                                                              • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                              • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                                              • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                                              • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                              • __swprintf.LIBCMT ref: 00460915
                                                              • __swprintf.LIBCMT ref: 0046092D
                                                              • _wprintf.LIBCMT ref: 004609E1
                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                              • API String ID: 3631882475-2268648507
                                                              • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                              • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                                              • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                                              • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                                              APIs
                                                              • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                                              • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                                              • SendMessageW.USER32 ref: 00471740
                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                                              • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                                              • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                                              • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                                              • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                                              • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                                              • SendMessageW.USER32 ref: 0047184F
                                                              • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                                              • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                                              • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                                              • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                                              • String ID:
                                                              • API String ID: 4116747274-0
                                                              • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                              • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                                              • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                                              • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                                              APIs
                                                              • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                                              • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                                              • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: InfoItemMenu$Sleep
                                                              • String ID: 0
                                                              • API String ID: 1196289194-4108050209
                                                              • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                              • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                                              • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                                              • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                                              APIs
                                                              • GetDC.USER32(00000000), ref: 0043143E
                                                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                                              • SelectObject.GDI32(00000000,?), ref: 00431466
                                                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                                              • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                              • String ID: (
                                                              • API String ID: 3300687185-3887548279
                                                              • Opcode ID: 603e6b3e37746ec9058b96d14af227772b21f97dc715e72dc47e988551ca64b1
                                                              • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                                              • Opcode Fuzzy Hash: 603e6b3e37746ec9058b96d14af227772b21f97dc715e72dc47e988551ca64b1
                                                              • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                                              APIs
                                                                • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                              • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                              • API String ID: 1976180769-4113822522
                                                              • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                              • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                                              • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                                              • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                                              • String ID:
                                                              • API String ID: 461458858-0
                                                              • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                              • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                                              • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                                              • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                                              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                                              • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                                              • CloseHandle.KERNEL32(00000000), ref: 00430113
                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                                              • GlobalFree.KERNEL32(00000000), ref: 00430150
                                                              • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                                              • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                                              • DeleteObject.GDI32(?), ref: 004301D0
                                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                              • String ID:
                                                              • API String ID: 3969911579-0
                                                              • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                              • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                                              • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                                              • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                                              • String ID: 0
                                                              • API String ID: 956284711-4108050209
                                                              • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                              • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                                              • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                                              • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                              • String ID: 0.0.0.0
                                                              • API String ID: 1965227024-3771769585
                                                              • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                                              • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                                              • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                                                              • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                                              APIs
                                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: SendString$_memmove_wcslen
                                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                              • API String ID: 369157077-1007645807
                                                              • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                              • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                                              • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                                              • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                                              APIs
                                                              • GetParent.USER32 ref: 00445BF8
                                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                                              • __wcsicoll.LIBCMT ref: 00445C33
                                                              • __wcsicoll.LIBCMT ref: 00445C4F
                                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wcsicoll$ClassMessageNameParentSend
                                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                              • API String ID: 3125838495-3381328864
                                                              • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                              • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                                              • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                                              • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                                              APIs
                                                              • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                                              • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                                              • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                                              • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                                              • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                                              • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CharNext
                                                              • String ID:
                                                              • API String ID: 1350042424-0
                                                              • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                              • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                                              • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                                              • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                                              APIs
                                                                • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                                                • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                                              • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                                              • _wcscpy.LIBCMT ref: 004787E5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                              • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                              • API String ID: 3052893215-2127371420
                                                              • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                              • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                                              • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                                              • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                                              APIs
                                                              • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                                              • __swprintf.LIBCMT ref: 0045E7F7
                                                              • _wprintf.LIBCMT ref: 0045E8B3
                                                              • _wprintf.LIBCMT ref: 0045E8D7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                              • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                              • API String ID: 2295938435-2354261254
                                                              • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                              • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                                              • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                                              • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __swprintf_wcscpy$__i64tow__itow
                                                              • String ID: %.15g$0x%p$False$True
                                                              • API String ID: 3038501623-2263619337
                                                              • Opcode ID: c1d1e427df81d364f3e7315beb2c85998febd91a9edec5b390063b37ecf0eef7
                                                              • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                                              • Opcode Fuzzy Hash: c1d1e427df81d364f3e7315beb2c85998febd91a9edec5b390063b37ecf0eef7
                                                              • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                                              APIs
                                                              • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                                              • __swprintf.LIBCMT ref: 0045E5F6
                                                              • _wprintf.LIBCMT ref: 0045E6A3
                                                              • _wprintf.LIBCMT ref: 0045E6C7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                                              • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                              • API String ID: 2295938435-8599901
                                                              • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                              • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                                              • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                                              • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                                              APIs
                                                              • timeGetTime.WINMM ref: 00443B67
                                                                • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                                              • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                                              • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                                              • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                                              • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                                              • IsWindow.USER32(00000000), ref: 00443C3A
                                                              • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                                                • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                              • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                                              • String ID: BUTTON
                                                              • API String ID: 1834419854-3405671355
                                                              • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                              • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                                              • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                                              • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                                              • LoadStringW.USER32(00000000), ref: 00454040
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • _wprintf.LIBCMT ref: 00454074
                                                              • __swprintf.LIBCMT ref: 004540A3
                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                              • API String ID: 455036304-4153970271
                                                              • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                              • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                                              • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                                              • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                                              APIs
                                                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                                              • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                                              • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                                              • _memmove.LIBCMT ref: 00467EB8
                                                              • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                                              • _memmove.LIBCMT ref: 00467F6C
                                                              • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                                              • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                              • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                                              • String ID:
                                                              • API String ID: 2170234536-0
                                                              • Opcode ID: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
                                                              • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                                              • Opcode Fuzzy Hash: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
                                                              • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                                              APIs
                                                              • GetKeyboardState.USER32(?), ref: 00453CE0
                                                              • SetKeyboardState.USER32(?), ref: 00453D3B
                                                              • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                                              • GetKeyState.USER32(000000A0), ref: 00453D75
                                                              • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                                              • GetKeyState.USER32(000000A1), ref: 00453DB5
                                                              • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                                              • GetKeyState.USER32(00000011), ref: 00453DEF
                                                              • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                                              • GetKeyState.USER32(00000012), ref: 00453E26
                                                              • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                                              • GetKeyState.USER32(0000005B), ref: 00453E5D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: State$Async$Keyboard
                                                              • String ID:
                                                              • API String ID: 541375521-0
                                                              • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                              • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                                              • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                                              • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                                              APIs
                                                              • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                                              • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                                              • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                                              • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                                              • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                                              • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                                              • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                                              • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                                              • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                                              • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$ItemMoveRect$Invalidate
                                                              • String ID:
                                                              • API String ID: 3096461208-0
                                                              • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                              • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                                              • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                                              • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                                              APIs
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                                              • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                                              • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                                              • DeleteObject.GDI32(?), ref: 0047151E
                                                              • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                                              • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                                              • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                                              • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                                              • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                                              • DeleteObject.GDI32(?), ref: 004715EA
                                                              • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                                              • String ID:
                                                              • API String ID: 3218148540-0
                                                              • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                              • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                                              • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                                              • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                              • String ID:
                                                              • API String ID: 136442275-0
                                                              • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                              • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                                              • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                                              • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                                              APIs
                                                              • _wcsncpy.LIBCMT ref: 00467490
                                                              • _wcsncpy.LIBCMT ref: 004674BC
                                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                              • _wcstok.LIBCMT ref: 004674FF
                                                                • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                              • _wcstok.LIBCMT ref: 004675B2
                                                              • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                              • _wcslen.LIBCMT ref: 00467793
                                                              • _wcscpy.LIBCMT ref: 00467641
                                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                              • _wcslen.LIBCMT ref: 004677BD
                                                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                                • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                              • String ID: X
                                                              • API String ID: 3104067586-3081909835
                                                              • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                                              • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                                              • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                                                              • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                                              APIs
                                                              • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                                              • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                                              • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                                              • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                                              • _wcslen.LIBCMT ref: 0046CDB0
                                                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                                              • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                                              • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                                                • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                                                • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                                                • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                                              Strings
                                                              • NULL Pointer assignment, xrefs: 0046CEA6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                                              • String ID: NULL Pointer assignment
                                                              • API String ID: 440038798-2785691316
                                                              • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                              • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                                              • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                                              • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                                              APIs
                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                                              • _wcslen.LIBCMT ref: 004610A3
                                                              • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                                              • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                                              • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                                              • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                                              • GetWindowRect.USER32(?,?), ref: 00461248
                                                                • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                                              • String ID: ThumbnailClass
                                                              • API String ID: 4136854206-1241985126
                                                              • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                              • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                                              • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                                              • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                                              APIs
                                                              • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                                              • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                                              • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                                              • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                                              • GetClientRect.USER32(?,?), ref: 00471A1A
                                                              • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                                              • DestroyIcon.USER32(?), ref: 00471AF4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                              • String ID: 2
                                                              • API String ID: 1331449709-450215437
                                                              • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                              • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                                              • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                                              • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                                              • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                                              • __swprintf.LIBCMT ref: 00460915
                                                              • __swprintf.LIBCMT ref: 0046092D
                                                              • _wprintf.LIBCMT ref: 004609E1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                                              • API String ID: 3054410614-2561132961
                                                              • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                              • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                                              • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                                              • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                                              APIs
                                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                                              • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                                              • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                                              • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                              • API String ID: 600699880-22481851
                                                              • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                              • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                                              • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                                              • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: DestroyWindow
                                                              • String ID: static
                                                              • API String ID: 3375834691-2160076837
                                                              • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                              • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                                              • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                                              • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                                              • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$DriveType
                                                              • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                                              • API String ID: 2907320926-3566645568
                                                              • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                              • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                                              • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                                              • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                                              APIs
                                                                • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                              • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                                              • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                                              • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                                              • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                                              • DeleteObject.GDI32(00000000), ref: 00470A04
                                                              • DestroyIcon.USER32(00000000), ref: 00470A1C
                                                              • DeleteObject.GDI32(13962656), ref: 00470A34
                                                              • DestroyWindow.USER32(00000007), ref: 00470A4C
                                                              • DestroyIcon.USER32(?), ref: 00470A73
                                                              • DestroyIcon.USER32(?), ref: 00470A81
                                                              • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                                              • String ID:
                                                              • API String ID: 1237572874-0
                                                              • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                              • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                                              • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                                              • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                                              APIs
                                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                                              • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                                              • VariantInit.OLEAUT32(?), ref: 004793E1
                                                              • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                                              • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                                              • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                                              • VariantClear.OLEAUT32(?), ref: 00479489
                                                              • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                                              • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                                              • VariantClear.OLEAUT32(?), ref: 004794CA
                                                              • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                              • String ID:
                                                              • API String ID: 2706829360-0
                                                              • Opcode ID: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                                              • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                                              • Opcode Fuzzy Hash: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                                              • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                                              APIs
                                                              • GetKeyboardState.USER32(?), ref: 0044480E
                                                              • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                                              • GetKeyState.USER32(000000A0), ref: 004448AA
                                                              • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                                              • GetKeyState.USER32(000000A1), ref: 004448D9
                                                              • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                                              • GetKeyState.USER32(00000011), ref: 00444903
                                                              • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                                              • GetKeyState.USER32(00000012), ref: 0044492D
                                                              • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                                              • GetKeyState.USER32(0000005B), ref: 00444958
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: State$Async$Keyboard
                                                              • String ID:
                                                              • API String ID: 541375521-0
                                                              • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                              • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                                              • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                                              • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                              • String ID:
                                                              • API String ID: 3413494760-0
                                                              • Opcode ID: 2a8305ef8d4776459e33b90f77451cd3990213b7daaf01a0e2fad0b7a80df6fc
                                                              • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                                              • Opcode Fuzzy Hash: 2a8305ef8d4776459e33b90f77451cd3990213b7daaf01a0e2fad0b7a80df6fc
                                                              • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AddressProc_free_malloc$_strcat_strlen
                                                              • String ID: AU3_FreeVar
                                                              • API String ID: 2634073740-771828931
                                                              • Opcode ID: 0205934085a73e828eb836af54efcf0b2f745960cf3f8f52847b126bcd632882
                                                              • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                                              • Opcode Fuzzy Hash: 0205934085a73e828eb836af54efcf0b2f745960cf3f8f52847b126bcd632882
                                                              • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                                              APIs
                                                              • CoInitialize.OLE32 ref: 0046C63A
                                                              • CoUninitialize.OLE32 ref: 0046C645
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                                                • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                                              • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                                              • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                                              • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                                              • IIDFromString.OLE32(?,?), ref: 0046C705
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                              • API String ID: 2294789929-1287834457
                                                              • Opcode ID: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
                                                              • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                                              • Opcode Fuzzy Hash: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
                                                              • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                                              APIs
                                                                • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                                                • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                                                • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                                              • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                                              • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                                              • ImageList_EndDrag.COMCTL32 ref: 00471169
                                                              • ReleaseCapture.USER32 ref: 0047116F
                                                              • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                              • API String ID: 2483343779-2107944366
                                                              • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                                              • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                                              • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                                                              • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                                              • _wcslen.LIBCMT ref: 00450720
                                                              • _wcscat.LIBCMT ref: 00450733
                                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                                              • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window_wcscat_wcslen
                                                              • String ID: -----$SysListView32
                                                              • API String ID: 4008455318-3975388722
                                                              • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                              • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                                              • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                                              • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                                              APIs
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                                              • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                                              • GetParent.USER32 ref: 00469C98
                                                              • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                                              • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                                              • GetParent.USER32 ref: 00469CBC
                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 2360848162-1403004172
                                                              • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                              • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                                              • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                                              • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                                              • String ID:
                                                              • API String ID: 262282135-0
                                                              • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                              • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                                              • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                                              • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                                              APIs
                                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                                              • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                                              • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                                              • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                                              • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$LongWindow
                                                              • String ID:
                                                              • API String ID: 312131281-0
                                                              • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                              • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                                              • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                                              • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                                              APIs
                                                                • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                                              • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                                                              • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                                                                • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                              • String ID:
                                                              • API String ID: 3771399671-0
                                                              • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                              • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                                              • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                                              • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 00434643
                                                              • GetForegroundWindow.USER32(00000000), ref: 00434655
                                                              • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                                              • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                                              • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                              • String ID:
                                                              • API String ID: 2156557900-0
                                                              • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                              • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                                              • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                                              • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                              • API String ID: 0-1603158881
                                                              • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                              • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                                              • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                                              • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                                              APIs
                                                              • CreateMenu.USER32 ref: 00448603
                                                              • SetMenu.USER32(?,00000000), ref: 00448613
                                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                                              • IsMenu.USER32(?), ref: 004486AB
                                                              • CreatePopupMenu.USER32 ref: 004486B5
                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                                              • DrawMenuBar.USER32 ref: 004486F5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                              • String ID: 0
                                                              • API String ID: 161812096-4108050209
                                                              • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                              • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                                              • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                                              • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\copto de pago.exe), ref: 00434057
                                                              • LoadStringW.USER32(00000000), ref: 00434060
                                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                                              • LoadStringW.USER32(00000000), ref: 00434078
                                                              • _wprintf.LIBCMT ref: 004340A1
                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                                              Strings
                                                              • C:\Users\user\Desktop\copto de pago.exe, xrefs: 00434040
                                                              • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModuleString$Message_wprintf
                                                              • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\copto de pago.exe
                                                              • API String ID: 3648134473-2598470269
                                                              • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                              • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                                              • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                                              • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b5b2eb1c0fd75675c26b78e4e5fa3366e30ffffa818d49f3caf60ca944b06ede
                                                              • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                                              • Opcode Fuzzy Hash: b5b2eb1c0fd75675c26b78e4e5fa3366e30ffffa818d49f3caf60ca944b06ede
                                                              • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                              • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                                              • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                                              • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                                              APIs
                                                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\copto de pago.exe,0040F545,C:\Users\user\Desktop\copto de pago.exe,004A90E8,C:\Users\user\Desktop\copto de pago.exe,?,0040F545), ref: 0041013C
                                                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                              • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                                              • MoveFileW.KERNEL32(?,?), ref: 00453932
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                              • String ID:
                                                              • API String ID: 978794511-0
                                                              • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                              • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                                              • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                                              • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                              • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                                              • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                                              • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ClearVariant
                                                              • String ID:
                                                              • API String ID: 1473721057-0
                                                              • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                              • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                                              • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                                              • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove$_memcmp
                                                              • String ID: '$\$h
                                                              • API String ID: 2205784470-1303700344
                                                              • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                              • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                                              • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                                              • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                                              APIs
                                                              • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                                              • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                                              • VariantClear.OLEAUT32 ref: 0045EA6D
                                                              • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                                              • __swprintf.LIBCMT ref: 0045EC33
                                                              • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                                              Strings
                                                              • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                                              • String ID: %4d%02d%02d%02d%02d%02d
                                                              • API String ID: 2441338619-1568723262
                                                              • Opcode ID: 88db3983bd4ed7f03cb514a0c18a36c5a2e0261ee80d3730b42f63d3e5698cbf
                                                              • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                                              • Opcode Fuzzy Hash: 88db3983bd4ed7f03cb514a0c18a36c5a2e0261ee80d3730b42f63d3e5698cbf
                                                              • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                                              APIs
                                                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                                              • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Interlocked$DecrementIncrement$Sleep
                                                              • String ID: @COM_EVENTOBJ
                                                              • API String ID: 327565842-2228938565
                                                              • Opcode ID: 2d2e6611baaaed01bf0ac91f3b08fe096b6b0ff8b1e1267574a63fcd06cc1b28
                                                              • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                                              • Opcode Fuzzy Hash: 2d2e6611baaaed01bf0ac91f3b08fe096b6b0ff8b1e1267574a63fcd06cc1b28
                                                              • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                                              APIs
                                                              • VariantClear.OLEAUT32(?), ref: 0047031B
                                                              • VariantClear.OLEAUT32(?), ref: 0047044F
                                                              • VariantInit.OLEAUT32(?), ref: 004704A3
                                                              • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                                              • VariantClear.OLEAUT32(?), ref: 00470516
                                                                • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                                              • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                                                • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                                              • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Variant$Clear$Copy$CallDispFuncInit
                                                              • String ID: H
                                                              • API String ID: 3613100350-2852464175
                                                              • Opcode ID: 6f8afcb4607c5af54da810b5d10f04910e32cf7df3ff1b1a5cf283966db8269a
                                                              • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                                              • Opcode Fuzzy Hash: 6f8afcb4607c5af54da810b5d10f04910e32cf7df3ff1b1a5cf283966db8269a
                                                              • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                                              APIs
                                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                                              • DestroyWindow.USER32(?), ref: 00426F50
                                                              • UnregisterHotKey.USER32(?), ref: 00426F77
                                                              • FreeLibrary.KERNEL32(?), ref: 0042701F
                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                              • String ID: close all
                                                              • API String ID: 4174999648-3243417748
                                                              • Opcode ID: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                                                              • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                                              • Opcode Fuzzy Hash: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                                                              • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                                              APIs
                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                              • String ID:
                                                              • API String ID: 1291720006-3916222277
                                                              • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                              • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                                              • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                                              • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                                              APIs
                                                              • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                                              • IsMenu.USER32(?), ref: 0045FC5F
                                                              • CreatePopupMenu.USER32 ref: 0045FC97
                                                              • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                              • String ID: 0$2
                                                              • API String ID: 93392585-3793063076
                                                              • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                              • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                                              • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                                              • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                                              APIs
                                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                                              • VariantClear.OLEAUT32(?), ref: 00435320
                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                                              • VariantClear.OLEAUT32(?), ref: 004353B3
                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                                              • String ID: crts
                                                              • API String ID: 586820018-3724388283
                                                              • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                              • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                                              • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                                              • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                                              APIs
                                                                • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\copto de pago.exe,0040F545,C:\Users\user\Desktop\copto de pago.exe,004A90E8,C:\Users\user\Desktop\copto de pago.exe,?,0040F545), ref: 0041013C
                                                              • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                                              • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                                              • _wcscat.LIBCMT ref: 0044BCAF
                                                              • _wcslen.LIBCMT ref: 0044BCBB
                                                              • _wcslen.LIBCMT ref: 0044BCD1
                                                              • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                              • String ID: \*.*
                                                              • API String ID: 2326526234-1173974218
                                                              • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                              • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                                              • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                                              • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                                              APIs
                                                                • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                                              • _wcslen.LIBCMT ref: 004335F2
                                                              • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                                              • GetLastError.KERNEL32 ref: 0043362B
                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                                              • _wcsrchr.LIBCMT ref: 00433666
                                                                • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                              • String ID: \
                                                              • API String ID: 321622961-2967466578
                                                              • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                                              • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                                              • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                                                              • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wcsnicmp
                                                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                              • API String ID: 1038674560-2734436370
                                                              • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                                              • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                                              • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                                                              • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                                              • __lock.LIBCMT ref: 00417981
                                                                • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                                                • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                                                • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                                              • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                                              • __lock.LIBCMT ref: 004179A2
                                                              • ___addlocaleref.LIBCMT ref: 004179C0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                              • String ID: KERNEL32.DLL$pI
                                                              • API String ID: 637971194-197072765
                                                              • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                              • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                                              • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                                              • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove$_malloc
                                                              • String ID:
                                                              • API String ID: 1938898002-0
                                                              • Opcode ID: 0b38315dd5595bc9b6cdba2c23ba2101394e99cbfafbb6bdfa5f530b56cc0c70
                                                              • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                                              • Opcode Fuzzy Hash: 0b38315dd5595bc9b6cdba2c23ba2101394e99cbfafbb6bdfa5f530b56cc0c70
                                                              • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                                              APIs
                                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                                              • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                                              • _memmove.LIBCMT ref: 0044B555
                                                              • _memmove.LIBCMT ref: 0044B578
                                                              • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                                              • String ID:
                                                              • API String ID: 2737351978-0
                                                              • Opcode ID: acaa13feec575fcc8965567212d79990a10c5ddbc5928143d32797644f5f1a34
                                                              • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                                              • Opcode Fuzzy Hash: acaa13feec575fcc8965567212d79990a10c5ddbc5928143d32797644f5f1a34
                                                              • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                                              APIs
                                                              • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                                              • __calloc_crt.LIBCMT ref: 00415246
                                                              • __getptd.LIBCMT ref: 00415253
                                                              • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                                              • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                                              • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                                              • _free.LIBCMT ref: 0041529E
                                                              • __dosmaperr.LIBCMT ref: 004152A9
                                                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                              • String ID:
                                                              • API String ID: 3638380555-0
                                                              • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                              • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                                              • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                                              • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                                              APIs
                                                              • VariantInit.OLEAUT32(?), ref: 0046C96E
                                                                • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                                • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Variant$Copy$ClearErrorInitLast
                                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                              • API String ID: 3207048006-625585964
                                                              • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                              • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                                              • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                                              • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                                              APIs
                                                              • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                                                • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                              • inet_addr.WSOCK32(?), ref: 0046559B
                                                              • gethostbyname.WSOCK32(?), ref: 004655A6
                                                              • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                                              • _memmove.LIBCMT ref: 004656CA
                                                              • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                                              • WSACleanup.WSOCK32 ref: 00465762
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                                              • String ID:
                                                              • API String ID: 2945290962-0
                                                              • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                              • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                                              • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                                              • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                                              APIs
                                                              • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                                              • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                                              • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                                              • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                                              • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                                              • String ID:
                                                              • API String ID: 1457242333-0
                                                              • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                              • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                                              • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                                              • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                                              APIs
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ConnectRegistry_memmove_wcslen
                                                              • String ID:
                                                              • API String ID: 15295421-0
                                                              • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                              • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                                              • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                                              • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                                              APIs
                                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                              • _wcstok.LIBCMT ref: 004675B2
                                                                • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                                              • _wcscpy.LIBCMT ref: 00467641
                                                              • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                                              • _wcslen.LIBCMT ref: 00467793
                                                              • _wcslen.LIBCMT ref: 004677BD
                                                                • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                                              • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                                              • String ID: X
                                                              • API String ID: 780548581-3081909835
                                                              • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                                              • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                                              • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                                                              • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                                              APIs
                                                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                              • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                                              • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                                              • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                                              • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                                              • CloseFigure.GDI32(?), ref: 0044751F
                                                              • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                                              • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                              • String ID:
                                                              • API String ID: 4082120231-0
                                                              • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                              • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                                              • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                                              • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                                              APIs
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                                              • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                                              • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                                              • String ID:
                                                              • API String ID: 2027346449-0
                                                              • Opcode ID: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
                                                              • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                                              • Opcode Fuzzy Hash: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
                                                              • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                                              APIs
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                              • GetMenu.USER32 ref: 0047A703
                                                              • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                                              • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                                              • _wcslen.LIBCMT ref: 0047A79E
                                                              • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                                              • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                                              • String ID:
                                                              • API String ID: 3257027151-0
                                                              • Opcode ID: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
                                                              • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                                              • Opcode Fuzzy Hash: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
                                                              • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                                              APIs
                                                              • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastselect
                                                              • String ID:
                                                              • API String ID: 215497628-0
                                                              • Opcode ID: 7869ea255bd8c826c1db511583610b45135028457a69a3d51942e2ff55a69274
                                                              • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                                              • Opcode Fuzzy Hash: 7869ea255bd8c826c1db511583610b45135028457a69a3d51942e2ff55a69274
                                                              • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                                              APIs
                                                              • GetParent.USER32(?), ref: 0044443B
                                                              • GetKeyboardState.USER32(?), ref: 00444450
                                                              • SetKeyboardState.USER32(?), ref: 004444A4
                                                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessagePost$KeyboardState$Parent
                                                              • String ID:
                                                              • API String ID: 87235514-0
                                                              • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                              • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                                              • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                                              • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                                              APIs
                                                              • GetParent.USER32(?), ref: 00444633
                                                              • GetKeyboardState.USER32(?), ref: 00444648
                                                              • SetKeyboardState.USER32(?), ref: 0044469C
                                                              • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                                              • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                                              • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                                              • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessagePost$KeyboardState$Parent
                                                              • String ID:
                                                              • API String ID: 87235514-0
                                                              • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                              • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                                              • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                                              • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                                              APIs
                                                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                                              • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                                              • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                                              • DeleteObject.GDI32(?), ref: 00455736
                                                              • DeleteObject.GDI32(?), ref: 00455744
                                                              • DestroyIcon.USER32(?), ref: 00455752
                                                              • DestroyWindow.USER32(?), ref: 00455760
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                              • String ID:
                                                              • API String ID: 2354583917-0
                                                              • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                              • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                                              • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                                              • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                              • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                                              • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                                              • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                                              APIs
                                                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                                              • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$Enable$Show$MessageMoveSend
                                                              • String ID:
                                                              • API String ID: 896007046-0
                                                              • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                              • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                                              • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                                              • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                                              APIs
                                                              • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                                              • GetFocus.USER32 ref: 00448ACF
                                                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$Enable$Show$FocusMessageSend
                                                              • String ID:
                                                              • API String ID: 3429747543-0
                                                              • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                              • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                                              • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                                              • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                                              APIs
                                                                • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                                                • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                                                • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                                              • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                                              • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                                              • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                                              • String ID:
                                                              • API String ID: 3300667738-0
                                                              • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                              • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                                              • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                                              • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                                              • __swprintf.LIBCMT ref: 0045D4E9
                                                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$InformationVolume__swprintf
                                                              • String ID: %lu$\VH
                                                              • API String ID: 3164766367-2432546070
                                                              • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                              • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                                              • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                                              • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                                              • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                                              • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: Msctls_Progress32
                                                              • API String ID: 3850602802-3636473452
                                                              • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                              • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                                              • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                                              • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                                              APIs
                                                              • _malloc.LIBCMT ref: 0041F707
                                                                • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                                                • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                                                • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                                              • _free.LIBCMT ref: 0041F71A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap_free_malloc
                                                              • String ID: [B
                                                              • API String ID: 1020059152-632041663
                                                              • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                                              • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                                              • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                                              • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                                              APIs
                                                              • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                                              • __calloc_crt.LIBCMT ref: 00413DB0
                                                              • __getptd.LIBCMT ref: 00413DBD
                                                              • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                                              • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                                              • _free.LIBCMT ref: 00413E07
                                                              • __dosmaperr.LIBCMT ref: 00413E12
                                                                • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                                              • String ID:
                                                              • API String ID: 155776804-0
                                                              • Opcode ID: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                                              • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                                              • Opcode Fuzzy Hash: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                                              • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                                              APIs
                                                                • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                                                • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                                              • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                                              • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                              • String ID:
                                                              • API String ID: 1957940570-0
                                                              • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                              • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                                              • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                                              • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                                              APIs
                                                              • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                              • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                              • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                              • ExitThread.KERNEL32 ref: 00413D4E
                                                              • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                              • __freefls@4.LIBCMT ref: 00413D74
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                              • String ID:
                                                              • API String ID: 259663610-0
                                                              • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                              • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                                              • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                                              • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 004302E6
                                                              • GetWindowRect.USER32(00000000,?), ref: 00430316
                                                              • GetClientRect.USER32(?,?), ref: 00430364
                                                              • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                                              • GetWindowRect.USER32(?,?), ref: 004303C3
                                                              • ScreenToClient.USER32(?,?), ref: 004303EC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Rect$Client$Window$MetricsScreenSystem
                                                              • String ID:
                                                              • API String ID: 3220332590-0
                                                              • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                              • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                                              • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                                              • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _malloc_wcslen$_strcat_wcscpy
                                                              • String ID:
                                                              • API String ID: 1612042205-0
                                                              • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                                              • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                                              • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                                                              • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove_strncmp
                                                              • String ID: >$U$\
                                                              • API String ID: 2666721431-237099441
                                                              • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                              • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                                              • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                                              • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                                              APIs
                                                              • GetKeyboardState.USER32(?), ref: 0044C570
                                                              • SetKeyboardState.USER32(00000080), ref: 0044C594
                                                              • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                                              • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                                              • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                                              • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessagePost$KeyboardState$InputSend
                                                              • String ID:
                                                              • API String ID: 2221674350-0
                                                              • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                              • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                                              • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                                              • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcscpy$_wcscat
                                                              • String ID:
                                                              • API String ID: 2037614760-0
                                                              • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                              • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                                              • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                                              • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                              • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                              • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                              • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                              • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                              • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Variant$Copy$AllocClearErrorLastString
                                                              • String ID:
                                                              • API String ID: 960795272-0
                                                              • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                              • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                                              • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                                              • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: File$Delete$Copy__fread_nolock
                                                              • String ID:
                                                              • API String ID: 2446588422-0
                                                              • Opcode ID: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                                              • Instruction ID: e3b766f0d7570c057f36e817525b07a345c540c94ec9958bdefdc59333e68e6d
                                                              • Opcode Fuzzy Hash: 79d811be90fff68cde7f06b13108d27ea7637e4834378253289aee473bd03d8a
                                                              • Instruction Fuzzy Hash: D9517CB26083409BC320DF6AD984AAFB7E8FBD9740F10492FF68983201DA75D548CB56
                                                              APIs
                                                              • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                                              • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                              • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                              • EndPaint.USER32(?,?), ref: 00447D13
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                              • String ID:
                                                              • API String ID: 4189319755-0
                                                              • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                              • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                                              • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                                              • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                                              APIs
                                                              • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                                              • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                                              • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                                              • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$LongWindow$InvalidateRect
                                                              • String ID:
                                                              • API String ID: 1976402638-0
                                                              • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                              • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                                              • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                                              • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                                              APIs
                                                              • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                                              • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                                              • ShowWindow.USER32(?,00000000), ref: 00440B18
                                                              • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                                              • EnableWindow.USER32(?,00000001), ref: 00440B50
                                                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$Show$Enable$MessageSend
                                                              • String ID:
                                                              • API String ID: 642888154-0
                                                              • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                              • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                                              • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                                              • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Variant$Copy$ClearErrorLast
                                                              • String ID: NULL Pointer assignment$Not an Object type
                                                              • API String ID: 2487901850-572801152
                                                              • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                              • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                                              • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                                              • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                                              APIs
                                                              • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$Enable$Show$MessageSend
                                                              • String ID:
                                                              • API String ID: 1871949834-0
                                                              • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                              • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                                              • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                                              • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                              • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                                              • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                                              • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                                              APIs
                                                              • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                                              • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                                              • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                                              • SendMessageW.USER32 ref: 00471AE3
                                                              • DestroyIcon.USER32(?), ref: 00471AF4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                                              • String ID:
                                                              • API String ID: 3611059338-0
                                                              • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                              • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                                              • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                                              • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: DestroyWindow$DeleteObject$IconMove
                                                              • String ID:
                                                              • API String ID: 1640429340-0
                                                              • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                              • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                                              • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                                              • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                                              APIs
                                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                              • _wcslen.LIBCMT ref: 004438CD
                                                              • _wcslen.LIBCMT ref: 004438E6
                                                              • _wcstok.LIBCMT ref: 004438F8
                                                              • _wcslen.LIBCMT ref: 0044390C
                                                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                                              • _wcstok.LIBCMT ref: 00443931
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                                              • String ID:
                                                              • API String ID: 3632110297-0
                                                              • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                              • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                                              • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                                              • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Destroy$DeleteMenuObject$IconWindow
                                                              • String ID:
                                                              • API String ID: 752480666-0
                                                              • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                              • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                                              • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                                              • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                              • String ID:
                                                              • API String ID: 3275902921-0
                                                              • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                              • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                                              • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                                              • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                              • String ID:
                                                              • API String ID: 3275902921-0
                                                              • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                              • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                                              • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                                              • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                                              APIs
                                                              • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                              • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                                              • String ID:
                                                              • API String ID: 2833360925-0
                                                              • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                              • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                                              • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                                              • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                                              APIs
                                                              • SendMessageW.USER32 ref: 004555C7
                                                              • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                                              • DeleteObject.GDI32(?), ref: 00455736
                                                              • DeleteObject.GDI32(?), ref: 00455744
                                                              • DestroyIcon.USER32(?), ref: 00455752
                                                              • DestroyWindow.USER32(?), ref: 00455760
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                              • String ID:
                                                              • API String ID: 3691411573-0
                                                              • Opcode ID: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                                              • Instruction ID: ee39a3c17b45488341a0d6beee4a1abd3419bb98b1a9b0cd73eda499273a4889
                                                              • Opcode Fuzzy Hash: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                                                              • Instruction Fuzzy Hash: C011B6B12047419BC710DF65EDC8A2A77A8BF18322F10066AFD50DB2D2D779D849C729
                                                              APIs
                                                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                              • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                                              • LineTo.GDI32(?,?,?), ref: 004472AC
                                                              • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                                              • LineTo.GDI32(?,?,?), ref: 004472C6
                                                              • EndPath.GDI32(?), ref: 004472D6
                                                              • StrokePath.GDI32(?), ref: 004472E4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                              • String ID:
                                                              • API String ID: 372113273-0
                                                              • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                              • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                                              • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                                              • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                                              APIs
                                                              • GetDC.USER32(00000000), ref: 0044CC6D
                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CapsDevice$Release
                                                              • String ID:
                                                              • API String ID: 1035833867-0
                                                              • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                              • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                                              • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                                              • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                                              APIs
                                                              • __getptd.LIBCMT ref: 0041708E
                                                                • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                              • __amsg_exit.LIBCMT ref: 004170AE
                                                              • __lock.LIBCMT ref: 004170BE
                                                              • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                                              • _free.LIBCMT ref: 004170EE
                                                              • InterlockedIncrement.KERNEL32(030D2D08), ref: 00417106
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                                              • String ID:
                                                              • API String ID: 3470314060-0
                                                              • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                              • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                                              • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                                              • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                                              APIs
                                                              • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                                              • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                                              • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                                              • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                                                • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                                              • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                              • String ID:
                                                              • API String ID: 3495660284-0
                                                              • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                              • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                                              • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                                              • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                                              APIs
                                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Virtual
                                                              • String ID:
                                                              • API String ID: 4278518827-0
                                                              • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                              • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                                              • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                                              • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                                              APIs
                                                              • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                              • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                              • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                              • ExitThread.KERNEL32 ref: 004151ED
                                                              • __freefls@4.LIBCMT ref: 00415209
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                              • String ID:
                                                              • API String ID: 442100245-0
                                                              • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                              • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                                              • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                                              • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                                              APIs
                                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                              • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                                              • _wcslen.LIBCMT ref: 0045F94A
                                                              • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                                              • String ID: 0
                                                              • API String ID: 621800784-4108050209
                                                              • Opcode ID: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
                                                              • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                                              • Opcode Fuzzy Hash: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
                                                              • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                                              APIs
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • SetErrorMode.KERNEL32 ref: 004781CE
                                                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                                                • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                                              • SetErrorMode.KERNEL32(?), ref: 00478270
                                                              • SetErrorMode.KERNEL32(?), ref: 00478340
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                                              • String ID: \VH
                                                              • API String ID: 3884216118-234962358
                                                              • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                              • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                                              • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                                              • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                                              APIs
                                                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                                              • IsMenu.USER32(?), ref: 0044854D
                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                                              • DrawMenuBar.USER32 ref: 004485AF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Menu$Item$DrawInfoInsert
                                                              • String ID: 0
                                                              • API String ID: 3076010158-4108050209
                                                              • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                              • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                                              • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                                              • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                                              APIs
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                                              • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$_memmove_wcslen
                                                              • String ID: ComboBox$ListBox
                                                              • API String ID: 1589278365-1403004172
                                                              • Opcode ID: 0014777097789b8f84f3fe106d7e17ae724925b3d4bce213ca40c56104f0711f
                                                              • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                                              • Opcode Fuzzy Hash: 0014777097789b8f84f3fe106d7e17ae724925b3d4bce213ca40c56104f0711f
                                                              • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Handle
                                                              • String ID: nul
                                                              • API String ID: 2519475695-2873401336
                                                              • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                              • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                                              • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                                              • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                                              APIs
                                                              • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Handle
                                                              • String ID: nul
                                                              • API String ID: 2519475695-2873401336
                                                              • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                              • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                                              • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                                              • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: SysAnimate32
                                                              • API String ID: 0-1011021900
                                                              • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                              • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                                              • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                                              • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                                              APIs
                                                                • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                                                • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                                                • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                                • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                                • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                                • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                                              • GetFocus.USER32 ref: 0046157B
                                                                • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                                                • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                                              • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                                              • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                                              • __swprintf.LIBCMT ref: 00461608
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                                              • String ID: %s%d
                                                              • API String ID: 2645982514-1110647743
                                                              • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                              • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                                              • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                                              • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                              • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                                              • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                                              • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                                              • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Process$CloseCountersCurrentHandleOpen
                                                              • String ID:
                                                              • API String ID: 3488606520-0
                                                              • Opcode ID: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
                                                              • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                                              • Opcode Fuzzy Hash: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
                                                              • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                                              APIs
                                                                • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ConnectRegistry_memmove_wcslen
                                                              • String ID:
                                                              • API String ID: 15295421-0
                                                              • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                              • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                                              • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                                              • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                                              APIs
                                                              • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                                              • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                                              • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Library$FreeLoad
                                                              • String ID:
                                                              • API String ID: 2449869053-0
                                                              • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                              • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                                              • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                                              • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 004563A6
                                                              • ScreenToClient.USER32(?,?), ref: 004563C3
                                                              • GetAsyncKeyState.USER32(?), ref: 00456400
                                                              • GetAsyncKeyState.USER32(?), ref: 00456410
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AsyncState$ClientCursorLongScreenWindow
                                                              • String ID:
                                                              • API String ID: 3539004672-0
                                                              • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                              • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                                              • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                                              • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                                              APIs
                                                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                                              • Sleep.KERNEL32(0000000A), ref: 0047D455
                                                              • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                                              • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Interlocked$DecrementIncrement$Sleep
                                                              • String ID:
                                                              • API String ID: 327565842-0
                                                              • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                              • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                                              • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                                              • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                                              APIs
                                                              • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                                              • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                                              • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                                              • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfile$SectionWrite$String
                                                              • String ID:
                                                              • API String ID: 2832842796-0
                                                              • Opcode ID: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
                                                              • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                                              • Opcode Fuzzy Hash: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
                                                              • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                                              APIs
                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                                              • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Enum$CloseDeleteOpen
                                                              • String ID:
                                                              • API String ID: 2095303065-0
                                                              • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                              • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                                              • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                                              • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 00436A24
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: RectWindow
                                                              • String ID:
                                                              • API String ID: 861336768-0
                                                              • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                              • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                                              • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                                              • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                                              APIs
                                                              • SendMessageW.USER32 ref: 00449598
                                                                • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                              • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                                              • _wcslen.LIBCMT ref: 0044960D
                                                              • _wcslen.LIBCMT ref: 0044961A
                                                              • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$_wcslen$_wcspbrk
                                                              • String ID:
                                                              • API String ID: 1856069659-0
                                                              • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                              • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                                              • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                                              • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                                              APIs
                                                              • GetCursorPos.USER32(?), ref: 004478E2
                                                              • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                                              • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                                              • GetCursorPos.USER32(00000000), ref: 0044796A
                                                              • TrackPopupMenuEx.USER32(030D63C0,00000000,00000000,?,?,00000000), ref: 00447991
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CursorMenuPopupTrack$Proc
                                                              • String ID:
                                                              • API String ID: 1300944170-0
                                                              • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                              • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                                              • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                                              • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 004479CC
                                                              • GetCursorPos.USER32(?), ref: 004479D7
                                                              • ScreenToClient.USER32(?,?), ref: 004479F3
                                                              • WindowFromPoint.USER32(?,?), ref: 00447A34
                                                              • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Client$CursorFromPointProcRectScreenWindow
                                                              • String ID:
                                                              • API String ID: 1822080540-0
                                                              • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                              • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                                              • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                                              • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 00447C5D
                                                              • ScreenToClient.USER32(?,?), ref: 00447C7B
                                                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                                              • EndPaint.USER32(?,?), ref: 00447D13
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                              • String ID:
                                                              • API String ID: 659298297-0
                                                              • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                              • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                                              • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                                              • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                                              APIs
                                                              • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                                              • EnableWindow.USER32(?,00000001), ref: 00448B72
                                                              • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                                              • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                                              • EnableWindow.USER32(?,00000001), ref: 00448C09
                                                                • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                                                • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                                                • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                                                • Part of subcall function 00440D98: SendMessageW.USER32(030D1BC0,000000F1,00000000,00000000), ref: 00440E6E
                                                                • Part of subcall function 00440D98: SendMessageW.USER32(030D1BC0,000000F1,00000001,00000000), ref: 00440E9A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$EnableMessageSend$LongShow
                                                              • String ID:
                                                              • API String ID: 142311417-0
                                                              • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                              • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                                              • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                                              • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                              • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                                              • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                                              • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 00445879
                                                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                                              • _wcslen.LIBCMT ref: 004458FB
                                                              • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                              • String ID:
                                                              • API String ID: 3087257052-0
                                                              • Opcode ID: f26ab1effd119969bc5c598581689495e0ac117966367203f6a60304a78e27fd
                                                              • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                                              • Opcode Fuzzy Hash: f26ab1effd119969bc5c598581689495e0ac117966367203f6a60304a78e27fd
                                                              • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                                              APIs
                                                                • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                                              • socket.WSOCK32(00000002,00000001,00000006), ref: 004653FE
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                                              • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                                              • closesocket.WSOCK32(00000000), ref: 00465481
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                              • String ID:
                                                              • API String ID: 245547762-0
                                                              • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                              • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                                              • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                                              • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                                              APIs
                                                              • DeleteObject.GDI32(00000000), ref: 004471D8
                                                              • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                              • SelectObject.GDI32(?,00000000), ref: 00447228
                                                              • BeginPath.GDI32(?), ref: 0044723D
                                                              • SelectObject.GDI32(?,00000000), ref: 00447266
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Object$Select$BeginCreateDeletePath
                                                              • String ID:
                                                              • API String ID: 2338827641-0
                                                              • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                              • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                                              • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                                              • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                                              APIs
                                                              • Sleep.KERNEL32(00000000), ref: 00434598
                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                                              • Sleep.KERNEL32(00000000), ref: 004345D4
                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CounterPerformanceQuerySleep
                                                              • String ID:
                                                              • API String ID: 2875609808-0
                                                              • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                              • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                                              • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                                              • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                                              • MessageBeep.USER32(00000000), ref: 00460C46
                                                              • KillTimer.USER32(?,0000040A), ref: 00460C68
                                                              • EndDialog.USER32(?,00000001), ref: 00460C83
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                              • String ID:
                                                              • API String ID: 3741023627-0
                                                              • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                              • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                                              • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                                              • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Destroy$DeleteObjectWindow$Icon
                                                              • String ID:
                                                              • API String ID: 4023252218-0
                                                              • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                              • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                                              • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                                              • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                                              APIs
                                                              • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                                              • DeleteObject.GDI32(?), ref: 00455736
                                                              • DeleteObject.GDI32(?), ref: 00455744
                                                              • DestroyIcon.USER32(?), ref: 00455752
                                                              • DestroyWindow.USER32(?), ref: 00455760
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                              • String ID:
                                                              • API String ID: 1489400265-0
                                                              • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                              • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                                              • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                                              • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                                              APIs
                                                                • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                                              • DestroyWindow.USER32(?), ref: 00455728
                                                              • DeleteObject.GDI32(?), ref: 00455736
                                                              • DeleteObject.GDI32(?), ref: 00455744
                                                              • DestroyIcon.USER32(?), ref: 00455752
                                                              • DestroyWindow.USER32(?), ref: 00455760
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                              • String ID:
                                                              • API String ID: 1042038666-0
                                                              • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                              • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                                              • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                                              • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Path$ObjectStroke$DeleteFillSelect
                                                              • String ID:
                                                              • API String ID: 2625713937-0
                                                              • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                              • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                                                              • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                                                              • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                                                              APIs
                                                              • __getptd.LIBCMT ref: 0041780F
                                                                • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                                                • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                                              • __getptd.LIBCMT ref: 00417826
                                                              • __amsg_exit.LIBCMT ref: 00417834
                                                              • __lock.LIBCMT ref: 00417844
                                                              • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                              • String ID:
                                                              • API String ID: 938513278-0
                                                              • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                              • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                                              • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                                              • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                                              APIs
                                                                • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                              • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                              • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                              • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                                              • ExitThread.KERNEL32 ref: 00413D4E
                                                              • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                                              • __freefls@4.LIBCMT ref: 00413D74
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                              • String ID:
                                                              • API String ID: 2403457894-0
                                                              • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                              • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                                              • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                                              • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                                              APIs
                                                                • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                                              • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                                                • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                                                • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                                              • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                                                • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                                              • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                                              • ExitThread.KERNEL32 ref: 004151ED
                                                              • __freefls@4.LIBCMT ref: 00415209
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                              • String ID:
                                                              • API String ID: 4247068974-0
                                                              • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                              • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                                              • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                                              • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: )$U$\
                                                              • API String ID: 0-3705770531
                                                              • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                              • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                                              • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                                              • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                                              APIs
                                                                • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                                              • CoInitialize.OLE32(00000000), ref: 0046E505
                                                              • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                                              • CoUninitialize.OLE32 ref: 0046E53D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                              • String ID: .lnk
                                                              • API String ID: 886957087-24824748
                                                              • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                              • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                                              • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                                              • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: \
                                                              • API String ID: 4104443479-2967466578
                                                              • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                              • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                                              • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                                              • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: \
                                                              • API String ID: 4104443479-2967466578
                                                              • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                              • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                                              • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                                              • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: \
                                                              • API String ID: 4104443479-2967466578
                                                              • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                              • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                                              • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                                              • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                                              Strings
                                                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                              • API String ID: 708495834-557222456
                                                              • Opcode ID: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
                                                              • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                                              • Opcode Fuzzy Hash: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
                                                              • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                                              APIs
                                                                • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                                                • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                                                • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                                                • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                                                • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                                              • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                              • String ID: @
                                                              • API String ID: 4150878124-2766056989
                                                              • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                              • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                                              • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                                              • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: \$]$h
                                                              • API String ID: 4104443479-3262404753
                                                              • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                              • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                                              • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                                              • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                                              APIs
                                                              • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                              • CloseHandle.KERNEL32(?), ref: 00457E09
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                                              • String ID: <$@
                                                              • API String ID: 2417854910-1426351568
                                                              • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                                              • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                                              • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                                                              • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                                              APIs
                                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                                                • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                              • String ID:
                                                              • API String ID: 3705125965-3916222277
                                                              • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                              • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                                              • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                                              • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                                              APIs
                                                              • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                                              • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                                              • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Menu$Delete$InfoItem
                                                              • String ID: 0
                                                              • API String ID: 135850232-4108050209
                                                              • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                              • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                                              • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                                              • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                                              APIs
                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$Long
                                                              • String ID: SysTreeView32
                                                              • API String ID: 847901565-1698111956
                                                              • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                              • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                                              • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                                              • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                                              • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                                              • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressFreeLoadProc
                                                              • String ID: AU3_GetPluginDetails
                                                              • API String ID: 145871493-4132174516
                                                              • Opcode ID: 159cfda42166365942fc35f4e8310eed724addc4652cab969a8521ebf27062eb
                                                              • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                                              • Opcode Fuzzy Hash: 159cfda42166365942fc35f4e8310eed724addc4652cab969a8521ebf27062eb
                                                              • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window
                                                              • String ID: SysMonthCal32
                                                              • API String ID: 2326795674-1439706946
                                                              • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                              • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                                              • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                                              • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                                              APIs
                                                              • DestroyWindow.USER32(00000000), ref: 00450A2F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: DestroyWindow
                                                              • String ID: msctls_updown32
                                                              • API String ID: 3375834691-2298589950
                                                              • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                              • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                                              • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                                              • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: $<
                                                              • API String ID: 4104443479-428540627
                                                              • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                              • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                                              • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                                              • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$DiskFreeSpace
                                                              • String ID: \VH
                                                              • API String ID: 1682464887-234962358
                                                              • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                              • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                                              • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                                              • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$DiskFreeSpace
                                                              • String ID: \VH
                                                              • API String ID: 1682464887-234962358
                                                              • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                              • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                                              • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                                              • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$DiskFreeSpace
                                                              • String ID: \VH
                                                              • API String ID: 1682464887-234962358
                                                              • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                              • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                                              • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                                              • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$InformationVolume
                                                              • String ID: \VH
                                                              • API String ID: 2507767853-234962358
                                                              • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                              • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                                              • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                                              • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                                              • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                                              • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$InformationVolume
                                                              • String ID: \VH
                                                              • API String ID: 2507767853-234962358
                                                              • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                              • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                                              • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                                              • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                                              • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: msctls_trackbar32
                                                              • API String ID: 3850602802-1010561917
                                                              • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                              • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                                              • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                                              • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                                              APIs
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                                              • String ID: crts
                                                              • API String ID: 943502515-3724388283
                                                              • Opcode ID: 6bd881ada2ae8ff0a5326c51e5497572252972d1a55ad2f97464bff4f718433f
                                                              • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                                              • Opcode Fuzzy Hash: 6bd881ada2ae8ff0a5326c51e5497572252972d1a55ad2f97464bff4f718433f
                                                              • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                                              • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                                              • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode$LabelVolume
                                                              • String ID: \VH
                                                              • API String ID: 2006950084-234962358
                                                              • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                              • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                                              • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                                              • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                                              APIs
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • GetMenuItemInfoW.USER32 ref: 00449727
                                                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                                              • DrawMenuBar.USER32 ref: 00449761
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Menu$InfoItem$Draw_malloc
                                                              • String ID: 0
                                                              • API String ID: 772068139-4108050209
                                                              • Opcode ID: c51535a36009e0b84663db87369d5282580437b440f7bb88edfbca7c2865f555
                                                              • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                                              • Opcode Fuzzy Hash: c51535a36009e0b84663db87369d5282580437b440f7bb88edfbca7c2865f555
                                                              • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$_wcscpy
                                                              • String ID: 3, 3, 8, 1
                                                              • API String ID: 3469035223-357260408
                                                              • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                              • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                                              • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                                              • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                                              • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: ICMP.DLL$IcmpCloseHandle
                                                              • API String ID: 2574300362-3530519716
                                                              • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                              • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                                              • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                                              • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                                              • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: ICMP.DLL$IcmpCreateFile
                                                              • API String ID: 2574300362-275556492
                                                              • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                              • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                                              • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                                              • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                                              • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: ICMP.DLL$IcmpSendEcho
                                                              • API String ID: 2574300362-58917771
                                                              • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                              • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                                              • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                                              • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: RegDeleteKeyExW$advapi32.dll
                                                              • API String ID: 2574300362-4033151799
                                                              • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                              • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                                              • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                                              • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                              • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                                              • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                                              • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                                              APIs
                                                              • VariantInit.OLEAUT32(?), ref: 0047950F
                                                              • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                                              • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                                              • VariantClear.OLEAUT32(?), ref: 00479650
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Variant$AllocClearCopyInitString
                                                              • String ID:
                                                              • API String ID: 2808897238-0
                                                              • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                              • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                                              • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                                              • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                                              APIs
                                                              • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                                              • __itow.LIBCMT ref: 004699CD
                                                                • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                                              • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                                              • __itow.LIBCMT ref: 00469A97
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$__itow
                                                              • String ID:
                                                              • API String ID: 3379773720-0
                                                              • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                              • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                                              • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                                              • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 00449A4A
                                                              • ScreenToClient.USER32(?,?), ref: 00449A80
                                                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientMoveRectScreen
                                                              • String ID:
                                                              • API String ID: 3880355969-0
                                                              • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                              • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                                              • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                                              • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                              • String ID:
                                                              • API String ID: 2782032738-0
                                                              • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                              • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                                              • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                                              • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                                              APIs
                                                              • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                                              • GetWindowRect.USER32(?,?), ref: 00441722
                                                              • PtInRect.USER32(?,?,?), ref: 00441734
                                                              • MessageBeep.USER32(00000000), ref: 004417AD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Rect$BeepClientMessageScreenWindow
                                                              • String ID:
                                                              • API String ID: 1352109105-0
                                                              • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                              • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                                              • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                                              • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                                              APIs
                                                              • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                                              • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                                              • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                                              • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                                              • String ID:
                                                              • API String ID: 3321077145-0
                                                              • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                              • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                                              • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                                              • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                                              APIs
                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                                              • __isleadbyte_l.LIBCMT ref: 004208A6
                                                              • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                                              • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                              • String ID:
                                                              • API String ID: 3058430110-0
                                                              • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                              • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                                              • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                                              • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                                              APIs
                                                              • GetParent.USER32(?), ref: 004503C8
                                                              • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                                              • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                                              • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Proc$Parent
                                                              • String ID:
                                                              • API String ID: 2351499541-0
                                                              • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                              • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                                              • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                                              • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                                              APIs
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                                              • TranslateMessage.USER32(?), ref: 00442B01
                                                              • DispatchMessageW.USER32(?), ref: 00442B0B
                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Message$Peek$DispatchTranslate
                                                              • String ID:
                                                              • API String ID: 1795658109-0
                                                              • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                              • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                                              • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                                              • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                                              APIs
                                                              • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                                                • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                                                • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                                                • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                                              • GetCaretPos.USER32(?), ref: 004743B2
                                                              • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                                              • GetForegroundWindow.USER32 ref: 004743EE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                              • String ID:
                                                              • API String ID: 2759813231-0
                                                              • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                              • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                                              • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                                              • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                                              APIs
                                                                • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                                              • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                                              • _wcslen.LIBCMT ref: 00449519
                                                              • _wcslen.LIBCMT ref: 00449526
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend_wcslen$_wcspbrk
                                                              • String ID:
                                                              • API String ID: 2886238975-0
                                                              • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                              • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                                              • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                                              • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __setmode$DebugOutputString_fprintf
                                                              • String ID:
                                                              • API String ID: 1792727568-0
                                                              • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                              • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                                              • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                                              • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                                              APIs
                                                                • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                                              • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$Long$AttributesLayered
                                                              • String ID:
                                                              • API String ID: 2169480361-0
                                                              • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                              • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                                              • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                                              • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                                              APIs
                                                                • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                                                • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                                                • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                                              • lstrlenW.KERNEL32(?), ref: 00434CF6
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                                              • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: lstrcmpilstrcpylstrlen$_malloc
                                                              • String ID: cdecl
                                                              • API String ID: 3850814276-3896280584
                                                              • Opcode ID: 5248fcd12fa573e8471e03ef3ffe1589e610c1ecd3e4c73a3bae80ffd9d943a4
                                                              • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                                              • Opcode Fuzzy Hash: 5248fcd12fa573e8471e03ef3ffe1589e610c1ecd3e4c73a3bae80ffd9d943a4
                                                              • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                                              APIs
                                                                • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                                              • gethostbyname.WSOCK32(?), ref: 0046D42D
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                                              • _memmove.LIBCMT ref: 0046D475
                                                              • inet_ntoa.WSOCK32(?), ref: 0046D481
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                                              • String ID:
                                                              • API String ID: 2502553879-0
                                                              • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                              • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                                              • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                                              • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                                              APIs
                                                              • SendMessageW.USER32 ref: 00448C69
                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                                              • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                                              • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$LongWindow
                                                              • String ID:
                                                              • API String ID: 312131281-0
                                                              • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                              • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                                              • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                                              • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                                              APIs
                                                              • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                                              • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                                              • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                                              • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastacceptselect
                                                              • String ID:
                                                              • API String ID: 385091864-0
                                                              • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                              • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                                              • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                                              • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                                              APIs
                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID:
                                                              • API String ID: 3850602802-0
                                                              • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                              • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                                              • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                                              • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                                              • GetStockObject.GDI32(00000011), ref: 00430258
                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                                              • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Window$CreateMessageObjectSendShowStock
                                                              • String ID:
                                                              • API String ID: 1358664141-0
                                                              • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                              • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                                              • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                                              • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                                              • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                                              • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                              • String ID:
                                                              • API String ID: 2880819207-0
                                                              • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                              • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                                              • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                                              • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                                              APIs
                                                              • GetWindowRect.USER32(?,?), ref: 00430BA2
                                                              • ScreenToClient.USER32(?,?), ref: 00430BC1
                                                              • ScreenToClient.USER32(?,?), ref: 00430BE2
                                                              • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ClientRectScreen$InvalidateWindow
                                                              • String ID:
                                                              • API String ID: 357397906-0
                                                              • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                              • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                                              • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                                              • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                                              APIs
                                                              • __wsplitpath.LIBCMT ref: 0043392E
                                                                • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                                              • __wsplitpath.LIBCMT ref: 00433950
                                                              • __wcsicoll.LIBCMT ref: 00433974
                                                              • __wcsicoll.LIBCMT ref: 0043398A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                              • String ID:
                                                              • API String ID: 1187119602-0
                                                              • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                              • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                                              • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                                              • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                              • String ID:
                                                              • API String ID: 1597257046-0
                                                              • Opcode ID: ffb306b0524748cf2939c1f0cf37236c46535da1521513c3132486090f10cb1b
                                                              • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                                              • Opcode Fuzzy Hash: ffb306b0524748cf2939c1f0cf37236c46535da1521513c3132486090f10cb1b
                                                              • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                                              APIs
                                                              • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                                              • __malloc_crt.LIBCMT ref: 0041F5B6
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentStrings$Free__malloc_crt
                                                              • String ID:
                                                              • API String ID: 237123855-0
                                                              • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                              • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                                              • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                                              • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: DeleteDestroyObject$IconWindow
                                                              • String ID:
                                                              • API String ID: 3349847261-0
                                                              • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                              • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                                              • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                                              • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                                              APIs
                                                              • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                                              • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                                              • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                                              • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                              • String ID:
                                                              • API String ID: 2223660684-0
                                                              • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                              • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                                              • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                                              • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                                              APIs
                                                                • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                                                • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                                                • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                                                • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                                              • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                                              • LineTo.GDI32(?,?,?), ref: 00447326
                                                              • EndPath.GDI32(?), ref: 00447336
                                                              • StrokePath.GDI32(?), ref: 00447344
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                              • String ID:
                                                              • API String ID: 2783949968-0
                                                              • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                              • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                                              • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                                              • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                                              APIs
                                                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                                              • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                                              • AttachThreadInput.USER32(00000000), ref: 004364AA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                              • String ID:
                                                              • API String ID: 2710830443-0
                                                              • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                              • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                                              • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                                              • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                                              APIs
                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                                              • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                                              • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                                              • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                                                • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                                                • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                              • String ID:
                                                              • API String ID: 146765662-0
                                                              • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                              • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                                              • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                                              • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                                              APIs
                                                              • GetDesktopWindow.USER32 ref: 00472B63
                                                              • GetDC.USER32(00000000), ref: 00472B6C
                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                                              • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                              • String ID:
                                                              • API String ID: 2889604237-0
                                                              • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                              • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                                              • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                                              • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                                              APIs
                                                              • GetDesktopWindow.USER32 ref: 00472BB2
                                                              • GetDC.USER32(00000000), ref: 00472BBB
                                                              • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                                              • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                              • String ID:
                                                              • API String ID: 2889604237-0
                                                              • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                              • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                                              • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                                              • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                                              APIs
                                                              • __getptd_noexit.LIBCMT ref: 00415150
                                                                • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                                                • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                                                • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                                                • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                                                • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                                              • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                                              • __freeptd.LIBCMT ref: 0041516B
                                                              • ExitThread.KERNEL32 ref: 00415173
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                                              • String ID:
                                                              • API String ID: 1454798553-0
                                                              • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                              • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                                              • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                                              • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _strncmp
                                                              • String ID: Q\E
                                                              • API String ID: 909875538-2189900498
                                                              • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                              • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                                              • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                                              • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                                              APIs
                                                              • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                                • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                                                • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                                                • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                                                • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                                              • String ID: AutoIt3GUI$Container
                                                              • API String ID: 2652923123-3941886329
                                                              • Opcode ID: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
                                                              • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                                              • Opcode Fuzzy Hash: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
                                                              • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove_strncmp
                                                              • String ID: U$\
                                                              • API String ID: 2666721431-100911408
                                                              • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                              • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                                              • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                                              • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                                              APIs
                                                                • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                                                • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                                              • __wcsnicmp.LIBCMT ref: 00467288
                                                              • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                              • String ID: LPT
                                                              • API String ID: 3035604524-1350329615
                                                              • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                                              • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                                              • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                                                              • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: \$h
                                                              • API String ID: 4104443479-677774858
                                                              • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                              • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                                              • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                                              • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memcmp
                                                              • String ID: &
                                                              • API String ID: 2931989736-1010288
                                                              • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                              • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                                              • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                                              • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: \
                                                              • API String ID: 4104443479-2967466578
                                                              • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                              • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                                              • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                                              • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                                              APIs
                                                              • _wcslen.LIBCMT ref: 00466825
                                                              • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CrackInternet_wcslen
                                                              • String ID: |
                                                              • API String ID: 596671847-2343686810
                                                              • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                              • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                                              • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                                              • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                                              APIs
                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: '
                                                              • API String ID: 3850602802-1997036262
                                                              • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                              • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                                              • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                                              • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                                              APIs
                                                              • _strlen.LIBCMT ref: 0040F858
                                                                • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                                                • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                                              • _sprintf.LIBCMT ref: 0040F9AE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove$_sprintf_strlen
                                                              • String ID: %02X
                                                              • API String ID: 1921645428-436463671
                                                              • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                              • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                                              • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                                              • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                                              APIs
                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: Combobox
                                                              • API String ID: 3850602802-2096851135
                                                              • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                              • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                                              • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                                              • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                                              APIs
                                                              • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: LengthMessageSendTextWindow
                                                              • String ID: edit
                                                              • API String ID: 2978978980-2167791130
                                                              • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                              • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                                              • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                                              • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                                              APIs
                                                              • Sleep.KERNEL32(00000000), ref: 00476CB0
                                                              • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: GlobalMemorySleepStatus
                                                              • String ID: @
                                                              • API String ID: 2783356886-2766056989
                                                              • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                              • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                                              • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                                              • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: htonsinet_addr
                                                              • String ID: 255.255.255.255
                                                              • API String ID: 3832099526-2422070025
                                                              • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                              • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                                              • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                                              • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                                              APIs
                                                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: InternetOpen
                                                              • String ID: <local>
                                                              • API String ID: 2038078732-4266983199
                                                              • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                              • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                                              • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                                              • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: __fread_nolock_memmove
                                                              • String ID: EA06
                                                              • API String ID: 1988441806-3962188686
                                                              • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                              • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                                              • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                                              • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: u,D
                                                              • API String ID: 4104443479-3858472334
                                                              • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                              • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                                              • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                                              • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                                              APIs
                                                              • _wcslen.LIBCMT ref: 00401B11
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • _memmove.LIBCMT ref: 00401B57
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                                                • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                                                • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                                              • String ID: @EXITCODE
                                                              • API String ID: 2734553683-3436989551
                                                              • Opcode ID: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
                                                              • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                                              • Opcode Fuzzy Hash: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
                                                              • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                                              APIs
                                                              • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                                                • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                                              • wsprintfW.USER32 ref: 0045612A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: MessageSend_mallocwsprintf
                                                              • String ID: %d/%02d/%02d
                                                              • API String ID: 1262938277-328681919
                                                              • Opcode ID: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
                                                              • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                                              • Opcode Fuzzy Hash: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
                                                              • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                                              APIs
                                                              • InternetCloseHandle.WININET(?), ref: 00442663
                                                              • InternetCloseHandle.WININET ref: 00442668
                                                                • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: CloseHandleInternet$ObjectSingleWait
                                                              • String ID: aeB
                                                              • API String ID: 857135153-906807131
                                                              • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                              • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                                              • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                                              • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: _wcsncpy
                                                              • String ID: ^B$C:\Users\user\Desktop\copto de pago.exe
                                                              • API String ID: 1735881322-3391983148
                                                              • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                              • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                                              • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                                              • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                                              APIs
                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                                              • PostMessageW.USER32(00000000), ref: 00441C05
                                                                • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: FindMessagePostSleepWindow
                                                              • String ID: Shell_TrayWnd
                                                              • API String ID: 529655941-2988720461
                                                              • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                              • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                                              • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                                              • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                                              APIs
                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                                                • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: FindMessagePostSleepWindow
                                                              • String ID: Shell_TrayWnd
                                                              • API String ID: 529655941-2988720461
                                                              • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                              • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                                              • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                                              • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                                              APIs
                                                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                                                • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2051546563.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2051500572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051644217.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051671703.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051690721.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051741260.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2051822091.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_copto de pago.jbxd
                                                              Similarity
                                                              • API ID: Message_doexit
                                                              • String ID: AutoIt$Error allocating memory.
                                                              • API String ID: 1993061046-4017498283
                                                              • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                              • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                                              • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                                              • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D